HotSoS 2018 Program
MONDAY, APRIL 9 | Location | |||
1830 - 2030 |
Evening Reception at The StateView Hotel |
Fusion Patio |
||
TUESDAY, APRIL 10 | ||||
0730 - 1700 |
Registration |
Fusion C/D Foyer | ||
SESSION 1 | Fusion C/D | |||
0830 - 0900 | Welcome and Introduction Symposium Co-Chairs: Laurie Williams and Munindar Singh Opening Remarks George Coker, National Security Agency |
|||
0900 - 1000 | Keynote: Steve Lipner, Executive Director, SAFECode Foundational Cybersecurity Research: Report of a Study by NASEM |
|||
1000 - 1045 | BREAK and POSTER SESSION |
Fusion A/B | ||
SESSION 2 | ||||
Paper Track: Vulnerabilities and Detection (Fusion C/D) |
Tutorial/Industry Track (Synergy B) |
|||
1045 - 1110† | Pooria Madani and Natalija Vlajic† University of York Robustness of Deep Autoencoder in Intrusion Detection under Adversarial Contamination |
†Dimitris Simos and *Rick Kuhn †SBA Research, *NIST Tutorial: Combinatorial Security Testing Course |
||
1110 - 1135† | †Inger Anne Tøndel, *Tosin Daniel Oyetoyan, *Martin Gilje Jaatun and *Daniela S. Cruzes †Norwegian University of Science and Technology, *SINTEF Digital Understanding the Challenges to Adoption of the Microsoft Elevation of Privilege Game |
|||
1135 - 1200† | †Ira Ray Jenkins, †Sergey Bratus, †Sean Smith and *Maxwell Koo †Dartmouth College, *Narf Industries Reinventing the Privilege Drop: How Principled Preservation of Programmer Intent Would Prevent Security Bugs |
|||
1200 - 1315 | LUNCH Lunch Presentation: †Erkang Zheng, †Phil Gates-Idem and †Matt Lavin LifeOmic, Inc. Building a Virtually Air-gapped Secure Environment in AWS |
Fusion C/D | ||
SESSION 3 | Fusion C/D | |||
1315 - 1415 | Keynote: Ari Schwartz, Venable LLP You’ve Got a Vuln, I’ve Got a Vuln, Everybody’s Got a Vuln |
|||
1415 - 1515 | Panel: Cybersecurity Framework Practitioners Moderator: Nikola Vouk, Independent Jeremy Maxwell, Allscripts Andrew Porter, Merck Alex Rogozhin, BB&T Greg Witte, G2 |
|||
1515 - 1600 | BREAK and POSTER SESSION |
Fusion A/B | ||
SESSION 4 | ||||
Paper Track: Secure Construction (Fusion C/D) |
Tutorial/Industry Track (Synergy B) | |||
1600 - 1625† | †Yao Dong, †Ana Milanova and *Julian Dolby †Rensselaer Polytechnic Institute, *IBM SecureMR: Secure MapReduce Computation Using Homomorphic Encryption and Program Partitioning |
Larry Maccherone† Comcast DevSecOps: Security at the Speed of Software Development |
||
1625 - 1650 | Bradley Potteiger, Zhenkai Zhang and Xenofon Koutsoukos Vanderbilt University Integrated Instruction Set Randomization and Control Reconfiguration for Securing Cyber-Physical Systems |
Leslie Leonard, William Glodeck Department of Defense HACSAW: A Trusted Framework for Cyber Situational Awareness |
||
1650 - 1715† | †Iness Ben Guirat and *Harry Halpin† †INSAT, *INRIA Formal Verification of the W3C Web Authentication Protocol |
†David González, *Nikola Vouk Compliance as Code: Policy Governed Automated Security Checkpoints |
||
SESSION 5 | ||||
1715 - 1800 | BREAK |
|||
1800 | Shuttle bus to the North Carolina Museum of Art. Meet in the hotel lobby. (Don't be late!) |
|||
1830 - 2100 | Dinner at the North Carolina Museum of Art |
|||
WEDNESDAY, APRIL 11 | ||||
0830 - 1530 |
Registration |
Fusion C/D Foyer | ||
SESSION 6 | Fusion C/D | |||
0900 - 1000 | Keynote: David Burke, NAVAIR Cyber Warfare Detachment Cyber Security for Aviation Weapon Systems |
|||
1000 - 1045 | BREAK and POSTER SESSION |
|||
SESSION 7 | ||||
Paper Track: Applications and Risk Evaluation (Fusion C/D) | Tutorial/Industry Track (Synergy B) | |||
1045 - 1110 |
Martha McNeil, Thomas Llanso and Dallas Pearson Johns Hopkins University Applied Physics Laboratory Application of Capability-Based Cyber Risk Assessment Methodology to a Space System |
Greg Witte G2 Tutorial: CyberSecurity Framework |
||
1110 - 1135† | Daniela S. Cruzes, Martin Gilje Jaatun and Tosin Daniel Oyetoyan SINTEF Digital Challenges and Approaches of Performing Canonical Action Research in Software Security |
|||
1135 - 1200† | †Huashan Chen, *Jin-Hee Cho and †Shouhuai Xu †University of Texas at San Antonio, *Army Research Lab Quantifying the Security Effectiveness of Firewalls and DMZs |
|||
1200 - 1315 | .LUNCH |
Fusion C/D | ||
SESSION 8 | Fusion C/D | |||
1315 - 1345 | Michelle Mazurek, University of Maryland NSA Fifth Annual Best Scientific Cybersecurity Paper Competition Winner You Get Where You're Looking For: The Impact of Information Sources on Code Security |
|||
1345 - 1415 | Daniel Gruss, Graz University of Technology Microarchitectural Attacks: From the Basics to Arbitrary Read and Write Primitives without any Software Bugs |
|||
1415 - 1430 | BREAK |
|||
1430 - 1530 | Keynote: Ravi Sandhu, University of Texas at San Antonio An Access Control Perspective on the Science of Security |
|||
1530 | Announcement of Winning Paper and Winning Poster Carl Landwehr and Adam Tagert Closing Remarks Laurie Williams and Munindar Singh |
|||
SYMPOSIUM ADJOURNED |