SoS VI Year End Review 2025
Date: Jan 30, 2025 9:00 am – Jan 31, 2025 1:00 pm
Location: Arizona State University in Tempe, Arizona
Dates: January 30–31, 2025
Location: Arizona State University, Tempe, Arizona
The meeting will begin at 9:00 AM on January 30 and conclude by 1:00 PM on January 31.
Please register by January 17, 2025.
Venue address:
ASU’s Global Security Initiative
Building: Orchid House at Brickyard
21 E 6th St
Tempe, AZ 85281 (map)
A receptionist will be available near the entrance to direct attendees to Conference Room 175, the main meeting space.
Accommodations:
There are several hotels within walking distance (less than a block to two blocks):
- The Westin Tempe
- Canopy by Hilton Tempe Downtown
- Omni Tempe Hotel at ASU
- Residence Inn Tempe Downtown
- Tempe Mission Palms
Program Agenda
THURSDAY, JANUARY 30, 2025
9:00am - 9:05am
Welcome and Logistics
Arizona State
9:05am - 9:15am
Opening Remarks
Shavon D. / Adam T.
VI 3: AI & Cybersecurity
9:15am - 9:45am
Leveraging Machine Learning for Binary Software Understanding
Arizona State
9:45am - 10:15am
Improving Malware Classifiers with Plausible Novel Samples
Vanderbilt
10:15am - 1045am
Improving Security and Safety of Neural Networks
ICSI
10:45am - 11:00am - BREAK
VI 2: Defensive Mechanisms
11:00am - 11:30am
Neurosymbolic Autonomous Agents for Cyber Defense
Vanderbilt
11:30am - 12:00pm
Resilient Systems Through Adaptive Architecture
Carnegie Mellon
12:00pm - 1:00pm - LUNCH
1:00pm - 2:00pm - TBA
2:00pm - 215pm - BREAK
VI 2: Defensive Mechanisms (cont.)
2:15pm - 2:45pm
Towards Trustworthy Autonomous Cyber Defense for Dynamic Intrusion Response
Carnegie Mellon
2:45pm - 3:15pm
Vulnerabilities for Social Attack Surface
Univ. of Kansas
3:15pm - 3:30pm - BREAK
3:30pm - 4:30pm - CLOSED PI MEETING
FRIDAY, JANUARY 31, 2025
VI 1: Trusted Systems
9:00am - 9:30am
Advancing Security and Privacy of Bluetooth IoT
Ohio State
9:30am - 10:00am
Predictable and Scalable Remote Attestation
Univ. of Kansas
10:00am - 10:15am - BREAK
10:15am - 10:45am
Quantitative Threat Modeling and Risk Assessment in the Socio-Technical Critical Infrastructure
Towson
10:45am - 11:15am
Continuous Reasoning with Gradual Verification
Carnegie Mellon
11:15am - 11:30am - BREAK
11:30am - 12:30pm - VI Breakout Meetings
12:30pm - 12:55pm
VI Briefouts
PI's
12:55pm - 1:00pm
Closing Remarks
Shavon / Adam
Submitted by Katie Dey
on
Dates: January 30–31, 2025
Location: Arizona State University, Tempe, Arizona
The meeting will begin at 9:00 AM on January 30 and conclude by 1:00 PM on January 31.
Please register by January 17, 2025.
Venue address:
ASU’s Global Security Initiative
Building: Orchid House at Brickyard
21 E 6th St
Tempe, AZ 85281 (map)
A receptionist will be available near the entrance to direct attendees to Conference Room 175, the main meeting space.
Accommodations:
There are several hotels within walking distance (less than a block to two blocks):
- The Westin Tempe
- Canopy by Hilton Tempe Downtown
- Omni Tempe Hotel at ASU
- Residence Inn Tempe Downtown
- Tempe Mission Palms
Program Agenda
THURSDAY, JANUARY 30, 2025 | ||
9:00am - 9:05am | Welcome and Logistics | Arizona State |
9:05am - 9:15am | Opening Remarks | Shavon D. / Adam T. |
VI 3: AI & Cybersecurity |
||
9:15am - 9:45am | Leveraging Machine Learning for Binary Software Understanding | Arizona State |
9:45am - 10:15am | Improving Malware Classifiers with Plausible Novel Samples | Vanderbilt |
10:15am - 1045am | Improving Security and Safety of Neural Networks | ICSI |
10:45am - 11:00am - BREAK |
||
VI 2: Defensive Mechanisms |
||
11:00am - 11:30am | Neurosymbolic Autonomous Agents for Cyber Defense | Vanderbilt |
11:30am - 12:00pm | Resilient Systems Through Adaptive Architecture | Carnegie Mellon |
12:00pm - 1:00pm - LUNCH |
||
1:00pm - 2:00pm - TBA |
||
2:00pm - 215pm - BREAK |
||
VI 2: Defensive Mechanisms (cont.) |
||
2:15pm - 2:45pm | Towards Trustworthy Autonomous Cyber Defense for Dynamic Intrusion Response | Carnegie Mellon |
2:45pm - 3:15pm | Vulnerabilities for Social Attack Surface | Univ. of Kansas |
3:15pm - 3:30pm - BREAK |
||
3:30pm - 4:30pm - CLOSED PI MEETING |
||
FRIDAY, JANUARY 31, 2025 | ||
VI 1: Trusted Systems |
||
9:00am - 9:30am | Advancing Security and Privacy of Bluetooth IoT | Ohio State |
9:30am - 10:00am | Predictable and Scalable Remote Attestation | Univ. of Kansas |
10:00am - 10:15am - BREAK |
||
10:15am - 10:45am | Quantitative Threat Modeling and Risk Assessment in the Socio-Technical Critical Infrastructure | Towson |
10:45am - 11:15am | Continuous Reasoning with Gradual Verification | Carnegie Mellon |
11:15am - 11:30am - BREAK |
||
11:30am - 12:30pm - VI Breakout Meetings |
||
12:30pm - 12:55pm | VI Briefouts | PI's |
12:55pm - 1:00pm | Closing Remarks | Shavon / Adam |