Visible to the public HotSoS 2020 PostersConflict Detection Enabled

A Curated Dataset of Security Defects in Scientific Software Projects
Justin Murphy, Elias T. Brady, Shazibul Islam Shamim, and Akond Rahman
Tennessee Technological University

A Preliminary Taxonomy of Techniques Used in Software Fuzzing
Raunak Shakya & Akond Rahman
Tennessee Tech University

A Raspberry Pi Sensor Network for Wildlife Conservation
Andrew Arnold, Paul Corapi, Michael Nasta, Kevin Wolgast, Thomas A. Babbitt
United States Military Academy

Accelerating Block Propogation in PoW Blockchain Networks with Pipelining and Chunking (PiChu)
Kaushik Ayinala, Baek-Young Choi, and Sejun Song
University of Missouri

An Infrastructure for Faithful Execution of Remote Attestation Protocols
Adam Petz
University of Kansas

An seL4-based Architecture for Layered Attestation
Grant Jurgensen, Michael Neises, and Perry Alexander
University of Kansas

An Uncertain Graph-based Approach for Cyber-security Risk Assessment
Hoang Hai Nguyen
University of Illinois at Urbana-Champaign

Application of the Armament Cyber Assessment Framework
Aidan McCarthy, Liam Furey, Keagan Smith, Daniel Hawthorne, and Raymond Blaine
The United States Military Academy

Approaches to Ethical Hacking: Expanding Conceptual Frameworks for Research
Danielle Alexandre, Rebecca Labitt, and Asher Rodriguez
Simmons University

Decentralized Backup and Recovery of TOTP Secrets
Conor Gilsenan, Noura Alomar, and Andrew Huang
University of California, Berkeley

Do Configuration Management Tools Make Systems More Secure? An Empirical Research Plan
Md Rayhanur Rahman, William Enck, and Laurie Williams
North Carolina State University

Exploiting DRAM Bank Mapping and HugePages for Effective Denial-of-Service Attacks on Shared Cache in Multicore
Michael Bechtel and Heechul Yun
University of Kansas

How to Swap Instructions Midstream: An Embedding Algorithm for Program Steganography
Ryan Gabrys, Luis Martinez, and Sunny Fugate
Naval Information Warfare Center

Improving Architectures for Automating Network Security Using Specification-Based Protocols
Khir Henderson and Kevin Kornegay
Morgan State University

Resilient Multi-Robot Target Pursuit
*Jiani Li, *Waseem Abbas, *Xenofon Koutsoukos, and **Mudassir Shabbir
*Vanderbilt University and **Information Technology University

Time Series Anomaly Detection in Medical Break The Glass
Qais Tasali, Nikesh Gyawali, and Eugene Y. Vasserman
Kansas State University

Tokens Of Interaction: Psycho-physiological Signals, A Potential Source of Evidence of Digital Incidents
Nancy Mogire
University of Hawaii at Manoa

Toward Just-in-Time Patching for Containerized Applications
Olufogorehan Tunde-Onadele, Yuhang Lin, Jingzhu He, and Xiaohui Gu
North Carolina State University

Using Intel SGX to Improve Private Neural Network Training and Inference
Ryan Karl, Jonathan Takeshita, Taeho Jung
University of Notre Dame

Vulnerability Trends in Web Servers and Browsers
*M S Raunak, **Richard Kuhn, *Richard Kogut, and **Raghu Kacker
*Loyola University and **National Institute of Standards and Technology