Program Agenda

Visible to the public 

SYMPOSIUM
September 22-23, 2020

The symposium will feature invited talks, panels, tutorials, and refereed papers and posters. The program will begin in the morning on Tuesday, September 22 and will conclude on the afternoon of Wednesday, September 23. The symposium will be held at the Burge Union at the Kansas University Central District in Lawrence, Kansas. 

RECEPTION
Monday, September 21

Symposium festivities will kick off with a reception on the evening of Monday, September 21. Please join us in Burge Union Center for appetizers and badge collection.

Address: 1565 Irving Hill Rd, Lawrence, KS 66045

The Burge Union Center is located in the heart of the Kansas University Central District. The Reception will feature a selection of hors d'oeuvres including vegetarian and vegan options.

BANQUET
Tuesday, September 22

The banquet will be held at the DeBruce Center, which is a short walk from the Burge Union.

 

Visible to the public 

PRINT-FRIENDLY VERSION

MONDAY, SEPTEMBER 21  
1730 - 1930 Evening Reception at The Burge Union 1565 Irving Hill Rd.
Lawrence, KS
TUESDAY, SEPTEMBER 22
0800 - 1730 Registration | Continental Breakfast (until 0830)
 
 
0830 - 0845 Chair's Opening Remarks
Symposium Chairs: Perry Alexander, Baek-Young Choi, and Drew Davidson

NSA Opening Remarks
 
0845 - 0945 Keynote Presentation: Access Control Verification for Everyone
Andrew Gacek, Amazon Web Services
 
0945 - 1000 BREAK
 
PAPER SESSION 1: CPS and Industrial Control
(20 minutes per paper with 10 minutes of flex in the block)
 
1000 - 1130 Simulation Testbed for Railway Infrastructure Security and Resilience Evaluation
*Himanshu Neema, *Xenofon Koutsoukos, **Bradley Potteiger, and Cheeyee Tang
*Vanderbilt University, **Johns Hopkins Applied Physics Lab, National Institute of Standards and Technology
 
  @PAD: Adversarial Training of Power Systems Against Denial of Service Attacks
Ali Ozdagli, Carlos Barreto, and Xenofon Koutsoukos
Vanderbilt University
 
  The More the Merrier: Adding Hidden Measurements for Anomaly Detection and Mitigation in Industrial Control Systems
*Jairo Giraldo, **David Urbina, Cheeyee Tang, and ††Alvaro Cardenas
*University of Utah, **University of Texas at Dallas, National Institute of Standards and Technology, ††The University of California, Santa Cruz
 
  RUCKUS: A Cybersecurity Engine for Performing Autonomous Cyber-Physical System Vulnerability Discovery at Scale
Bradley Potteiger, Jacob Mills, Daniel Cohen, and Paul Velez
Johns Hopkins Applied Physics Lab
 
 1130 - 1300  LUNCH
 
1300 - 1400 Keynote Presentation: Is Hardware Root of Trust hard to do, and Trustworthy?
Lyle Paczkowski, Sprint
 
1400 - 1415 BREAK
 
WORKS IN PROGRESS (WiP) SESSION 1    
1415 - 1500 *Hao Xue, *Qiaozhi Wang, *Bo Lou, **Chao Lan, *Fenjun Li
*University of Kansas, **University of Wyoming
 
1500 - 1545 Jacob Fustos, Heechul Yun
University of Kansas
 
1545 - 1600 BREAK
 
PAPER SESSION 2: Modeling
(20 minutes per paper with 10 minutes of flex in the block)
 
1600 - 1730 Exploring Hackers Assets: Topics of Interest as Indicators of Compromise
Mohammad Alramahi, Izzat Alsmadi, and Joshua Davenport
Texas A&M, San Antonio
 
  Cyber Threat Modeling and Validation: Port Scanning and Detection
Eric Vugrin, Jerry Cruz, Christian Reedy, Thomas Tarman, and Ali Pinar
Sandia National Laboratories
 
  Can We Use Software Bugs to Identify Software Vulnerability Strategies
Farzana Ahamed Bhuiyan, Raunak Shakya, and Akond Rahman
Tennessee Technological University
 
  Automated Influence and the Challenge of Cognitive Security
Sarah Rajtmajer and Daniel Susser
Pennsylvania State University
 
1730 - 1900 POSTER SESSION
 
WEDNESDAY, SEPTEMBER 23
0800 - 1630 Registration | Contintental Breakfast (until 0830)
 
 
0830 - 0930 Keynote Presentation: Trust Engineering with Cryptographic Protocols
Joshua Guttman, WPI/MITRE
 
0930 - 0945 BREAK
 
WORKS IN PROGRESS (WiP) SESSION 2  
0945 - 1030 *Sohaib Kiani, *Fengjun Li, **Chao Lan, and *Bo Luo
*University of Kansas, **University of Wyoming
 
1030 - 1115† -  - 1222 Ryan Karl, Jonathan Takeshita, and Taeho Jung
University of Notre Dame
 
1115 - 1130 BREAK
 
1130 - 1230 Keynote Presentation: Evaluating Fuzz Testing (and other technologies)
Michael Hicks, University of Maryland
 
 
1230 - 1400 .LUNCH
 
 
WORKS IN PROGRESS (WiP) SESSION 3  
1400 - 1445 Tsion Yimer, Md Tanvir Arafin, and Kevin Kornegay
Morgan State University
 
1445 - 1530 Sana Awan, Fenjun Li, Bo Luo
University of Kansas
 
1530 - 1545 BREAK
 
PAPER SESSION 3: Systems  
1545 - 1715 Neutralizing Manipulation of Critical Data by Enforcing Data-Instruction Dependency
Chandra Sharma, Nathan Miller, and George Amariucai
Kansas State University
 
  Ghostbusting: Mitigating Spectre with Intraprocess Memory Isolation
Ira Jenkins, Prashant Anantharaman, Rebecca Shapiro, J Peter Brady, Sergey Bratus, and Sean Smith
Dartmouth College
 
  WOLF: Automated Machine Learning Workflow Management Framework for Malware Detection and Other Applications
Sohaib Kiani, Sana Awan, Fengjun Li, and Bo Luo
University of Kansas
 
  A Formal Security Analysis of Zigbee
*Li Li, **Proyash Podder, and *Endadul Hoque
*Syracuse University, **Florida International University
 

1715 - 1730

Announcement of Winning Paper and Winning Poster
Adam Tagert

Closing Remarks
Perry Alexander

SYMPOSIUM ADJOURNED