HotSoS 2022 Program Agenda

 

TIMES ARE LISTED IN CDT PRINT-FRIENDLY VERSIONS BY TIME ZONE:  
EDT | CDT | MDT | PDT | CEST | BST  
TUESDAY, MARCH 29  
  Check out the virtual platforms and test your settings  
 
 
TUESDAY, APRIL 5
0930 - 1000 Networking, log into the platform and chat with other attendees  
 
 
1000 - 1015 Welcome and Opening Remarks  

 

1015 - 1115 KEYNOTE PRESENTATION: Cybersecurity Threat Landscape   

Jason Burt  
CISA  
 

1115 - 1135 BREAK  
 
Work-in-Progress (WiP) Session 1  
1135 - 1220 Attack scenarios on Industrial Control Systems  
Stanislav Abaimov, Joseph Gardiner and Awais Rashid  

Discussant:  
 

1220 - 1305 Resilient Target Pursuit for Multi-UAV Systems  
Nicholas Potteiger, Mudassir Shabbir, Scott Eisele, Mark Wutka and Xenofon Koutsoukos  

Discussant:  
 

1305 - 1405 LUNCH & NETWORKING  
Preview posters in Gather  
 
Work-Already-Published Session 1  
1405 - 1430 Flexible Mechanism for Remote Attestation  
Sarah Helble, Ian Kretz, Peter Loscocco, John Ramsdell, Paul Rowe and Perry Alexander  

 

1430 - 1455  Demystifying Attestation in Intel Trust Domain Extensions via Formal Verification  
Muhammad Usama Sardar, Saidgani Musaev and Christof Fetzer  

 

1500 - 1515 BREAK  
 
Work-Already-Published Session 2  
1515 - 1540 Consent as a Foundation for Responsible Autonomy  
Munindar Singh  

 

1540 - 1605 Verified Cryptographic Code for Everybody  
Brett Boston, Samuel Breese, Josiah Dodds, Mike Dodds, Brian Huffman, Adam Petcher and Andrei Stefanescu  

 

1610 - 1640 NETWORKING  
Preview posters in Gather  
 
WEDNESDAY, APRIL 6
0955 - 1000 Welcome  

 

 
1000 - 1100 KEYNOTE PRESENTATION:Trustworthy AI  

Jeanette Wing  
Columbia University  
 

1100 - 1120 BREAK  
 
Work-in-Progress (WiP) Session 2  
1120 - 1205 Verification of Cyber Emulation Experiments Through Virtual Machine and Host Metrics  
Jamie Thorpe, Laura P. Swiler, Seth Hanson, Gerardo Cruz, Thomas Tarman, Trevor Rollins and Bert Debusschere  

Discussant:  
 

1205 - 1250 A Bayesian Framework for Incorporating Uncertainty in Cybersecurity Incident Response  
Hoang Hai Nguyen, Kartik Palani and David Nicol  

Discussant:  
 

1250 - 1350 LUNCH & NETWORKING  
Preview posters in Gather  
 
1350 - 1420 NSA Best Cybersecurity Paper Competition Honorable Mention: Retrofitting Fine Grain Isolation in the Firefox Renderer  
Shravan Narayan  
UC San Diego  
 
1420 - 1430 .BREAK  
 
Work-Already-Published Session 3  
1430 - 1455 You Make Me Tremble: A First Look at Attacks Against Structural Control Systems  
Abel Zambrano, Alejandro Palacio-Betancur, Luis Burbano, Andres Felipe Niño, Luis Felipe Giraldo, Mariantonieta Gutierrez Soto, Jairo Giraldo and Alvaro A. Cardenas  

 

1455 - 1520 Evaluating Mail-Based Security for Electoral Processes Using Attack Trees  
Natalie Scala, Paul Goethals, Josh Dehlinger, Yeabsira Mezgebe, Betelhem Jilcha and Isabella Bloomquist  

 

1520 - 1545 MLEFlow: Learning from History to Improve Load Balancing in Tor  
Hussein Darir, Hussein Sibai, Chin-Yu Cheng, Nikita Borisov, Geir Dullerud and Sayan Mitr  

 

1545 - 1610 FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques  
Hong Liu, Chen Zhong, Awny Alnusair and Sheikh Islam  

 

1615 - 1715 POSTER SESSION ON GATHER  
 
THURSDAY, APRIL 7  
0955 - 1000 Welcome  

 

1000 - 1100 KEYNOTE PRESENTATION  

Mark Tuttle  
Amazon  
 

1100 - 1130 NSA Best Cybersecurity Paper Competition Winner: On One-way Functions and Kolmogorov Complexity   
Yanyi Liu (Cornwell University) and Raphael Pass (Cornell Tech)  
 
1130 - 1150 BREAK  
 
Work-in-Progress (WiP) Session 3  
1150 - 1235 DNSauth - When Step Up Authentication is Not Enough  
Sam Hays, Michael Sandborn and Jules White  

Discussant: Stephanie Polczynski  
 

1235 - 1320 Detecting malicious agents in partially observed mixed-autonomy vehicular traffic  
George Gunter, Daniel Work and Carl Gunter  

Disscussant:   
 

1320 - 1420 LUNCH & NETWORKING  
 
Work-Already-Published Session 4  
1420 - 1445 Explore Capabilities and Effectiveness of Reverse Engineering Tools to Provide Memory Safety for Binary Programs  
Ruturaj Kiran Vaidya, Prasad A. Kulkarni and Michael R. Jantz  

 

1445 - 1510 Empirical Study of PLC Authentication Protocols in Industrial Control Systems  
Adeen Ayub, Hyunguk Yoo and Irfan Ahmed  

 

1510 - 1535 Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem  
Zane Ma, James Austgen, Joshua Mason, Zakir Durumeric and Michael Bailey  

 

1540 - 1555 Announcement of Winning Poster & Closing remarks  
 
SYMPOSIUM ADJOURNED