| WIP: Assessing the Effects of Source Language on Binary Similarity Tools |
|
| K-ASTRO: Structure-Aware Adaptation of LLMs for Code Vulnerability Detection |
|
| Concept-ROT: Poisoning Concepts in Large Language Models with Model Editing |
|
| PBP: Post-training Backdoor Purification for Malware Classifiers |
|
| Keynote: The Complex Science of Cybersecurity |
|
| Roundtable: Life After Graduate School |
|
| WiP: An Investigation of Large Language Models and Their Vulnerabilities in Spam Detection |
|
| WiP: A Human Study of Cognitive Biases in CTF Challenges |
|
| Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations |
|
| Assessing AI vs Human-Authored Spear Phishing SMS Attacks: An Empirical Study |
|
| Interdisciplinary Approaches to Cybervulnerability Impact Assessment for Energy Critical Infrastructure |
|
| Solving Real-World Problems is Hard: Perspectives and Lessons from an Academic, DoD Researcher, and a CEO |
|
| Decoding Trust: Comprehensive Assessment of Trustworthiness in GPT Models |
|
| WIP: Steerability of Autonomous Cyber-Defense Agents by Meta-Attackers |
|
| WIP: BareSlice: Extending Arm CCA to Support Bare-Metal Confidential Virtual Machines |
|
| Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC Adoption Rates and Identifying Migration Pathways |
|
| Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation |
|
| A Grammar-Based Behavioral Distance Measure between Ransomware Variants |
|
| BinSub: The Simple Essence of Polymorphic Type Inference for Machine Code |
|
| Vanderbilt Students Engage in National Security Research Through Immersion Program |
|
| Towson University Hosts Watch Party for HoTSoS 2025 Symposium |
|
| HotSoS 2025 Welcome and Opening Remarks |
|
| HotSoS 2025 2025 Best Cybersecurity Paper Competition Introduction |
|
| HoTSoS 2025 Announcement of Winning Poster / Closing Remarks |
|
| NSA and International Partners Warn of Fast Flux as a National Security Threat |
|