Visible to the public HotSoS 2020 PostersConflict Detection Enabled

A Preliminary Taxonomy of Techniques Used in Software Fuzzing
Raunak Shakya & Akond Rahman
Tennessee Tech University

Tokens Of Interaction Psycho-physiological Signals A Potential Source of Evidence of Digital Incidents
Nancy Mogire
University of Hawaii at Manoa

A Curated Dataset of Security Defects in Scientific Software Projects
Justin Murphy, Shazibul Islam Shamim, Elyas T. Brady, and Akond Rahman
Tennessee Technological University

Application of the Army Cyber Assessment Framework
Aidan McCarthy, Liam Furey, Keagan Smith, Daniel Hawthorne, and Raymond Blaine
The United States Military Academy

A Raspberry Pi Sensor Network for Wildlife Conservation
Andrew Arnold, Paul Corapi, Michael Nasta, Kevin Wolgast, Thomas A. Babbitt
United States Military Academy

OPatch: Beyond Patch Tuesday for Containerized Applications
Olufogorehan Tunde-Onadele, Yuhang Lin, Jingzhu He, and Xiaohui Gu
North Carolina State University

Do Configuration Management Tools Make Systems More Secure? An Empirical Research Plan
Md Rayhanur Rahman, William Enck, and Laurie Williams
North Carolina State University

An Uncertain Graph-based Approach for Cyber-security Risk Assessment
Hoang Hai Nguyen
University of Illinois at Urbana-Champaign

Memory-aware Denial-of-Service Attacks on Shared Cache in Multicore Real-Time Systems
Michael Bechtel and Heechul Yun
University of Kansas

Resilient Multi-Robot Target Pursuit
*Jiani Li, *Waseem Abbas, *Xenofon Koutsoukos, and **Mudassir Shabbir
*Vanderbilt University and **Information Technology University

An seL4-based Architecture for Layered Attestation
Grant Jurgensen, Michael Neises, and Perry Alexander
University of Kansas

Decentralized Backup and Recovery of TOTP Secrets
Conor Gilsenan, Noura Alomar, and Andrew Huang
University of California, Berkeley

Using Intel SGX to Improve Private Neural Network Training and Inference
Ryan Karl, Jonathan Takeshita, Taeho Jung
University of Notre Dame

An Infrastructure for Faithful Execution of Remote Attestation Protocols
Adam Petz
University of Kansas

Time Series Anomaly Detection in Medical Break The Glass
Qais Tasali, Nikesh Gyawali, and Eugene Y. Vasserman
Kansas State University

Approaches to Ethical Hacking: Expanding Conceptual Frameworks for Research
Danielle Alexandre, Rebecca Labitt, and Asher Rodriguez
Simmons University

Improving Architectures for Automating Network Security Using Specification-Based Protocols
Khir Henderson and Kevin Kornegay
Morgan State University

How to Swap Instructions Midstream: An Embedding Algorithm for Program Steganography
Ryan Gabrys, Luis Martinez, and Sunny Fugate
Naval Information Warfare Center

Vulnerability Trends in Web Servers and Browsers
*M S Raunak, *Richard Kogut, **Richard Kuhn, and **Raghu Kacker
*Loyola University and **National Institute of Standards and Technology

Accelerating Block Propogation in PoW Blockchain Networks with Pipelining and Chunking (PiChu)
Kaushik Ayinala, Baek-Young Choi, and Sejun Song
University of Missouri