Visible to the public (Virtual) HotSoS 2020 Program AgendaConflict Detection Enabled

 

Symposium Timezone: Central Daylight Time (CDT) PRINT-FRIENDLY VERSION

Tuedsay | Wednesday | Thursday

TUESDAY, SEPTEMBER 22
1000 - 1015 CDT Opening Remarks & Best Paper Announcement
Symposium Chairs:
Perry Alexander, The University of Kansas
Baek-Young Choi, University of Missouri – Kansas City
Drew Davidson, The University of Kansas

NSA Opening Remarks
 
1015 - 1115 Keynote Presentation: Access Control Verification for Everyone
Andrew Gacek, Amazon Web Services
 
1115 - 1130 BREAK
 
PAPER SESSION 1: CPS and Industrial Control
(20 minutes per paper with 10 minutes of flex in the block)
 
1130 - 1300 CDT Simulation Testbed for Railway Infrastructure Security and Resilience Evaluation
*Himanshu Neema, *Xenofon Koutsoukos, **Bradley Potteiger, CheeYee Tang, and Keith Stouffer
*Vanderbilt University, **Johns Hopkins Applied Physics Laboratory, National Institute of Standards and Technology
 
  @PAD: Adversarial Training of Power Systems Against Denial of Service Attacks
Ali I Ozdagli, Carlos Barreto, and Xenofon Koutsoukos
Vanderbilt University
 
  The More the Merrier: Adding Hidden Measurements for Anomaly Detection and Mitigation in Industrial Control Systems
*Jairo Giraldo, **David Urbina, CheeYee Tang, and ††Alvaro Cardenas
*University of Utah, **University of Texas at Dallas, National Institute of Standards and Technology, ††The University of California, Santa Cruz
 
  RUCKUS: A Cybersecurity Engine for Performing Autonomous Cyber-Physical System Vulnerability Discovery at Scale
Bradley Potteiger, Jacob Mills, Daniel Cohen, and Paul Velez
Johns Hopkins Applied Physics Laboratory
 
 1300 - 1400 BREAK
 
WORKS IN PROGRESS (WiP) SESSION 1  
1400 - 1530 CDT *Sohaib Kiani, *Fengjun Li, **Chao Lan, and *Bo Luo
*University of Kansas, **University of Wyoming
  Jacob Fustos, Michael Bechtel, Heechul Yun
University of Kansas
1530 - 1545 BREAK
 
1545 - 1715 POSTER SESSION
 
WEDNESDAY, SEPTEMBER 23
1000 - 1100 CDT Keynote Presentation: Is Hardware Root of Trust hard to do, and Trustworthy?
Lyle Paczkowski, Sprint
 
1100 - 1115 BREAK
 
PAPER SESSION 2: Modeling
(20 minutes per paper with 10 minutes of flex in the block)
 
1115 - 1245 CDT Exploring Hackers Assets: Topics of Interest as Indicators of Compromise
Mohammad Al-Ramahi, Izzat Alsmadi, and Joshua Davenport
Texas A&M, San Antonio
 
  Cyber Threat Modeling and Validation: Port Scanning and Detection
Eric Vugrin, Jerry Cruz, Christian Reedy, Thomas Tarman, and Ali Pinar
Sandia National Laboratories
 
  Can We Use Software Bug Reports to Identify Vulnerability Discovery Strategies?
Farzana Ahamed Bhuiyan, Raunak Shakya, and Akond Rahman
Tennessee Technological University
 
  Automated Influence and the Challenge of Cognitive Security
Sarah Rajtmajer and Daniel Susser
The Pennsylvania State University
 
1245 - 1345 BREAK
 
WORKS IN PROGRESS (WiP) SESSION 2  
1345 - 1515 CDT *Hao Xue, *Qiaozhi Wang, *Bo Luo, **Chao Lan, *Fengjun Li
*University of Kansas, **University of Wyoming
  Ryan Karl, Jonathan Takeshita, and Taeho Jung
University of Notre Dame
1515 - 1530 BREAK
 
 
1530 - 1630 Keynote Presentation: Trust Engineering via Cryptographic Protocols
Joshua Guttman, Worcester Polytechnic Institute/MITRE
 
THURSDAY, SEPTEMBER 24
1000 - 1100 CDT Keynote Presentation: Evaluating Fuzz Testing (and other technologies)
Michael Hicks, University of Maryland and Correct Computation Inc.
 
1100 - 1115 BREAK
 
PAPER SESSION 3: Systems  
1115 - 1245 CDT Neutralizing Manipulation of Critical Data by Enforcing Data-Instruction Dependency
Chandra Sharma, Nathan Miller, and George Amariucai
Kansas State University
 
  Ghostbusting: Mitigating Spectre with Intraprocess Memory Isolation
Ira Ray Jenkins, Prashant Anantharaman, Rebecca Shapiro, J. Peter Brady, Sergey Bratus, and Sean W. Smith
Dartmouth College
 
  WOLF: Automated Machine Learning Workflow Management for various Applications
*Sohaib Kiani, *Sana Awan, *Fengjun Li, *Bo Luo, and **Jun Huan
*University of Kansas, **StylingAI, Inc.
 
  A Formal Security Analysis of ZigBee (1.0 and 3.0)
*Li Li, **Proyash Podder, and *Endadul Hoque
*Syracuse University, **Florida International University
 
1245 - 1345 BREAK
 
 
WORKS IN PROGRESS (WiP) SESSION 3  
1345 - 1515 CDT Tsion Yimer, Md Tanvir Arafin, and Kevin Kornegay
Morgan State University
 
  Sana Awan, Fengjun Li, Bo Luo
University of Kansas
 
1515 - 1530 BREAK
 
1530 - 1545 Announcement of Winning Poster
Adam Tagert, National Security Agency

Closing Remarks
Perry Alexander
Baek-Young Choi
Drew Davidson
Adam Tagert
 
SYMPOSIUM ADJOURNED