HotSoS 2015 Program Agenda
2015 Symposium and Bootcamp on the Science of Security (HotSoS) Program Agenda
Agenda | Call for Papers | Organizers
The 2015 Symposium and Bootcamp on the Science of Security (HotSoS) was held April 21-22, 2015 in Urbana-Champaign, Illinois.
Artifacts from Hot SoS 2014 include presentations and posters that are linked to the agenda below. HotSoS 2015 proceedings are in the ACM Digital Library. The call for papers can be found below the agenda.
Program Agenda
MONDAY, APRIL 20, 2015 | |||
5:00 p.m. - 9:00 p.m. |
Registration |
||
6:00 p.m. - 9:00 p.m. | Welcome Reception NCSA Lobby |
||
TUESDAY, APRIL 21, 2015 | |||
7:30 a.m. - 5:00 p.m. | Registration National Center for Supercomputing Applications (NCSA) Lobby |
||
8:30 a.m. - 9:00 a.m. | Breakfast NCSA Lobby |
||
9:00 a.m. - 10:30 a.m. | Welcome, Announcements David Nicol, University of Illinois at Urbana-Champaign Kathleen Bogner, Co-Chair of SCORE committee, NSA Location: NCSA Auditorium Keynote: Is it Science or Engineering? A Sampling of Recent Research Mike Reiter, Lawrence M. Slifkin Distinguished Professor of Computer Science, University of North Carolina Location: NCSA Auditorium |
||
10:30 a.m. - 11:00 a.m. | Break NCSA Lobby |
||
11:00 a.m. - 12:30 p.m. | Paper Session 1 Session Chair: Masooda Bashir Location NCSA Auditorium Modelling User Availability in Workflow Resiliency Analysis John Mace, Charles Morisset and Aad van Moorsel Understanding Sanction Under Variable Observability in a Secure, Collaborative Environment Honying Du, Bennett Narron, Nirav Ajmeri, Emily Berglund, Jon Doyle, and Munindar Singh Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling Vijay Kothari, Jim Blythe, Ross Koppel, and Sean W. Smith |
Tutorial 1: Social Network Analysis for Science of Security Kathleen Carley, Carnegie Mellon University Location: Room 1040 NCSA |
|
12:30 p.m. - 2:00 p.m. | Poster Session and Lunch Electrical & Computer Engineering Building (ECEB), Room 3002 306 N. Wright Street, Urbana |
||
2:00 p.m. - 3:00 p.m. | Keynote: Avoiding Pseudoscience in the Science of Security Jonathan Spring, CERT Division, Software Engineering Institute, Carnegie Mellon University Location: NCSA Auditorium |
||
3:00 p.m. - 4:30 p.m. |
Paper Session 2 |
Tutorial 2: Understanding and Accounting for Human Behavior |
|
4:30 p.m. - 5:00 p.m. |
Break Light snack provided in NCSA Lobby |
||
5:00 p.m. - 6:00 p.m. | Invited Paper: Memory Trace Oblivious Program Execution for Cloud Computing Winner 2013 NSA Competition for Best Scientific Cybersecurity Paper Chang Liu, PhD Student, University of Maryland NCSA Auditorium |
||
6:30 p.m. - 9:00 p.m. | Symposium Dinner 6:30 - Refreshment service begins 7:00 - Dinner service begins Grainger Engineering Library, 2nd Floor 1301 W. Springfield Avenue, Urbana |
||
WEDNESDAY, APRIL 22, 2015 | |||
8:00 a.m. - 10:30 a.m. | Registration National Center for Supercomputing Applications (NCSA) Lobby |
||
8:00 a.m. - 8:30 a.m. | Breakfast NCSA Lobby |
||
8:30 a.m. - 10:00 a.m. | Paper Session 3 Session Chair: Geir Dullerud Location: NCSA Auditorium All Signals Go: Investigating How Individual Differences Affect Performance on a Medical Diagnosis Task Designed to Parallel a Signal Intelligence Analyst Task Allaire Welk and Christopher Mayhorn Detecting Abnormal User Behavior Through Pattern-mining Input Device-Analytics Ignacio X. Dominguez, Alok Goel, David L. Roberts, and Robert St. Amant An Integrated Computer-Aided Cognitive Task Analysis Method for Tracing Cyber-Attack Analysis Processes Chen Zhong, John Yen, Peng Liu, Robert Erbacher, Renee Etoty and Christopher Garneau |
Tutorial 3: Policy-Governed Secure Collaboration Munindar Singh, North Carolina State University Location: Room 1040 NCSA |
International Research Network for the Science of Security (IRN-SoS) Workshop: What Should be Included in a Methodologically Science of Security Paper? Laurie Williams, North Carolina State University Jeff Carver, University of Alabama Location: Room 1030 NCSA |
10:00 a.m. - 10:30 a.m. | Break NCSA Lobby |
||
10:30 a.m. - 11:30 a.m. | Keynote: The Importance of Measurement and Decision Making to a Science of Security Patrick McDaniel, Profess of Computer Science and Director of the Systems and Internet Infrastructure Security Laboratory, Penn State University Location: NCSA Auditorium |
||
11:30 a.m. - 12:30 p.m. | Boxed Lunches Location: NCSA Lobby |
||
12:30 p.m. - 2:30 p.m. | Paper Session 4 Session Chair: Nikita Borisov Location: NCSA Auditorium Challenges with Applying Vulnerability Prediction Models Patrick Morrison, Kim Herzig, Brendan Murphy, and Laurie Williams Preemptive Intrusion Detection: Theoretical Framework and Real-World Measurements Phuong Cao, Eric Badger, Zbigniew Kalbarczyk, Ravishankar Iyer and Adam Slagell Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events Jason King, Rahul Pandita and Laurie Williams An Empirical Study of Global Malware Encounters Ghita Mezzour, Kathleen M. Carley and L. Richard Carley |
12:30 p.m. -1:30 p.m. Tutorial 4: Security-Metrics-Driven Evaluation, Design, Development and Deployment |
|
1:30 p.m. - 2:30 p.m. |
1:30 p.m. - 2:30 p.m. Tutorial 5: Resilient Architectures |
||
2:30 p.m. - 3:00 p.m. |
Wrap up |
Call for Papers
OVERVIEW
The practice of "science" is an approach to knowledge discovery in which predictions can be validated though logic or repeatable empirical experiments. Viewed this way, "Science of Security" encompasses research in cyber-security that emphasizes the means of gaining confidence in its results.
Science of Security emphasizes the methodology of research in cyber-security as much as the results of that research. Science of Security is broad in its application, including development of mathematical models about which properties can be proven and/or predictions made, as well as empirical research that poses hypotheses that are tested by measurement and analysis.
The 2nd Annual Symposium and Bootcamp on the Science of Security (HotSoS) follows in the footsteps of HotSoS 2014 by soliciting contributions that either develop scientific methodologies for conducting cyber-security research, or show by example how such methodologies are used on specific research problems.
We anticipate some support for student travel, particularly student authors.
TOPICS
HotSoS 2015 welcomes papers that clearly highlight contributions to Science of Security, on any topical area of cyber-security. Papers that address issues within the NSA SoS Lablets' "Five Hard Problems" are of particular interest
* Scalability and Composability
* Policy
* Security Metrics
* Resiliency
* Human Behavior
Please forward any questions about topics or submission instructions to the HotSoS 2015 Chair, David Nicol, at hotsos-2015@illinois.edu.
IMPORTANT DATES
Submissions: January 22, 2015
Decisions: February 20, 2015
Poster Abstracts: March 1, 2015 (submit to hotsos-2015@illinois.edu)
Final Versions: March 9, 2015
Conference: April 21-22, 2015
Submissions must be made by the deadline of Friday, January 16, 2015 (midnight Central Standard Time) through Easy Chair: https://www.easychair.org/conferences/?conf=hotsos2015. The papers will be evaluted using a double-blind review.
The suggested paper length is between 6-12 pages total in double-column ACM format: http://www.acm.org/sigs/publications/proceedings-templates. Only PDF files will be accepted. Papers will be published in the ACM Digital Library.
Access the 2015 Call for Papers in a downloadable format here.
Organization
HotSoS 2015 Organizing Committee
General Chair: David Nicol, University of Illinois at Urbana-Champaign
Web Chair: Andrea Whitesell, University of Illinois at Urbana-Champaign
Publicity Chair: Kim Gudeman, University of Illinois at Urbana-Champaign
Finance Chair: Wyatt Martin, University of Illinois at Urbana-Champaign
Proceedings Chair: Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign
Local Arrangements: Andrea Whitesell, University of Illinois at Urbana-Champaign
NSA Liaisons: Heather Lucas and Stephanie Askins-Yannacci
HotSoS 2015 Program Committee
Ehab Al-Shaer, University of North Carolina Charlotte
Adam Aviv, United States Naval Academy
Travis Breaux, Carnegie Mellon University
Kevin Butler, University of Florida
Marshini Chetty, University of Maryland
Michael Clifford, National Security Agency
Michel Cukier, University of Maryland
Tudor Dumitras, University of Maryland
Serge Egelman, University of California Berkeley
William Enck, North Carolina State University
Robert Ford, Florida Institute of Technology
David Garlan, Carnegie Mellon University
Brighten Godfrey, University of Illinois at Urbana-Champaign
Donald Goff, Cyber Pack Ventures
Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign
Jonathan Katz, University of Maryland
Stuart Krohn, National Security Agency
Lucas Layman, University of Maryland
Carl Landwehr, Consultant
Sam Malek, George Mason University
Chris Mayhorn, North Carolina State University
Andy Meneely, Rochester Institute of Technology
Sayan Mitra, University of Illinois at Urbana-Champaign
Sean Peisert, University of California Davis
Jurgen Pfeffer, Carnegie Mellon University
Sean Smith, Dartmouth College
Robert St. Amant, North Carolina State University
Kevin Sullivan, University of Virginia
Kymie Tan, National Aeronautics and Space Administration
Adam Tagert, National Security Agency
Aad Van Moorsel, University of Newcastle upon Tyne
Rebecca Wright, Rutgers University
Tao Xie, University of Illinois at Urbana-Champaign