HotSoS 2017 Program
DOWNLOAD AGENDA BOOKLET | VIEW FULL-LENGTH PRESENTATIONS VIDEO
MONDAY, APRIL 3 | ||
1830 - 2030 |
Evening Reception at The Hotel at Arundel Preserve |
|
TUESDAY, APRIL 4 | ||
0800 - 1730 |
Registration (open until 1730) |
|
SESSION 1 | ||
0830 - 0900 | Welcome and Introduction Symposium Co-Chairs Opening Remarks Dr. Deborah Frincke, National Security Agency |
|
0900 - 1000 | Keynote: Security of Cyber-Physical Systems: Challenges and Approaches Insup Lee, UPenn |
|
1000 - 1030 | Poster Session and Break |
|
SESSION 2 | ||
1030 - 1200 | Paper: Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms Jairo Giraldo, Alvaro A. Cárdenas, Murat Kantarcioglu University of Texas at Dallas Paper: Characterizing Scientific Reporting in Security Literature: An Analysis of ACM CCS and IEEE S&P Papers *Morgan Burcham, *Mahran Al-Zyoud, *Jeffrey C. Carver, †Mohammed Alsaleh, **Hongying Du, †Fida Gilani, ‡Jun Jiang, **Akond Rahman, **Ozgur Kafali, †Ehab Al-Shaer, **Laurie Williams *University of Alabama, †UNC Charlotte, **NC State University, ‡UNC Chapel Hill Paper: Optimal Security Investments in a Prevention and Detection Game Carlos Barreto, Alvaro A. Cárdenas, Alain Bensoussan University of Texas at Dallas |
|
1200 - 1330 | Lunch (on your own) |
|
SESSION 3 | ||
1330 - 1430 | Keynote: Navigating Privacy Issues in A Data Driven World Jules Polonetsky, Future of Privacy Forum |
|
1430 - 1530 |
Panel: Shifting the Balance in the Attack-Defend Cycle Panelists:
|
|
1530 - 1600 | Poster Session and Break | |
SESSION 4 | ||
1600 - 1730 | Parallel Tutorial Session The Bugs Framework (BF) "Hands-On" Irena Bojanova and Paul E. Black National Institute of Standards and Technology System Monitoring for Security Xusheng Xiao Case Western Reserve University |
|
1730 - 1800 | Break |
|
1800 | Shuttle bus to American Visionary Art Museum. Meet in the hotel lobby. (Don't be late!) |
|
1830 - 2100 | Dinner at the American Visionary Art Museum | |
WEDNESDAY, APRIL 5 | ||
0800 - 1730 |
Registration (open until 1530) |
|
SESSION 5 | ||
0900 - 1000 | Keynote: Differential Privacy and Data Analysis Aaron Roth, UPenn |
|
1000 - 1030 | Poster Session and Break | |
SESSION 6 | ||
1030 - 1200 | Paper: Learning a Privacy Incidents Database *Pradeep K. Murukannaiah, †Chinmaya Dabral, †Karthik Sheshadri, †Esha Sharma, †Jessica Staddon *Rochester Institute of Technology, †NC State University Paper: On the Tradeoff Between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach *Richeng Jin, †Xiaofan He, *Huaiyu Dai *NC State University, †Lamar University Paper: Use of Phishing Training to Improve Security Warning Compliance: Evidence From a Field Experiment *Weining Yang, *Aiping Xiong, †Jing Chen, *Robert W. Proctor, *Ninghui Li * Purdue University, †New Mexico State University |
|
1200 - 1330 | Lunch (on your own) | |
SESSION 7 | ||
1330 - 1345 | Best Poster Announcement "Is the Guardian Capable? A Routine Activity Theory Approach to Cyber Intrusion on Honeypot Systems" Michael H. Becker, Michel Cukier, David Maimon University of Maryland HoTSoS 2018 Laurie Williams, North Carolina State University |
|
1345 - 1515 | Paper: Global Variation in Attack Encounters and Hosting *Ghita Mezzour, †Kathleen M. Carley, †L. Richard Carley *International University of Rabat, †Carnegie Mellon University Paper: An Approach to Incorporating Uncertainty in Network Security Analysis Hoang Hai Nguyen, Kartik Palani, David M. Nicol University of Illinois at Urbana-Champaign Paper: Surveying Security Practice Adherence in Software Development Patrick Morrison, Laurie Williams North Carolina State University |
|
1515 - 1530 | Closing remarks |
|
SYMPOSIUM ADJOURNED |