Visible to the public HotSoS 2021 Program AgendaConflict Detection Enabled

 

TIMES ARE LISTED IN EDT
2021 (2022 Forthcoming)
PRINT-FRIENDLY VERSIONS BY TIME ZONE:
EDT | CDT | MDT | PDT | CEST | BST  
MONDAY, APRIL 12  
1200 - 1800 Check out the virtual platforms and test your settings
 
 
TUESDAY, APRIL 13
0900 - 0930 Networking, log into the platform and chat with other attendees
 
 
0930 - 1000 Welcome and Opening Remarks
General Chair: Adam Tagert (National Security Agency)
Program Co-Chairs: Özgür Kafali (University of Kent), Ahmad Ridley (National Security Agency)
 
1000 - 1100 KEYNOTE PRESENTATION 
Securing Data in Clouds: Making the Most of Trusted Hardware

Nick Felts
National Security Agency
 
1100 - 1115 BREAK / NETWORKING ON GATHER
 
SESSION 1: Cloud Security  
1115 - 1140 Formal Foundations for Intel SGX Data Center Attestation Primitives
Muhammed Usama Sardar, Rasha Faqeh, Christof Fetzer
TU Dresden
 
1140 - 1205 A Secure and Formally Verified Linux KVM Hypervisor
Shih-Wei Li, Xupeng Li, Ronghui Gu, Jason Nieh, John Zhuang Hui
Columbia University
 
1205 - 1250 Work-In-Progress Discussion Session: JavaScript Attacks
Ross Copeland and Drew Davidson
University of Kansas

WiP Discussant: Ahmad Ridley, National Security Agency
 
 1250 - 1400  LUNCH & NETWORKING
Preview posters in Gather
 
SESSION 2: To Err is to Be Human    
1400 - 1445 Work-In-Progress Discussion Session: Election Security
*Natalie Scala, *Josh Dehlinger, **Paul L. Goethals
*Towson University, **USMA

WiP Discussant: Kami Vaniea, University of Edinburgh
 
1445 - 1530 Work-In-Progress Discussion Session: Phishing
*Dennis Roellke, *Salvatore Stolfo, *George Litvinov, **Shlomo Herschkopp, Mark Seiden
*Columbia University, **Allure Security, Internet Archive

WiP Discussant: Kimberly Ferguson-Walter, Department of Defense
1530 - 1600 BREAK
 
SESSION 3: Student Presentations  
1600 - 1620 Analysis of the Impact of Varying Statistical RF Fingerprint Features on IoT Device Classification
Asia Mason
Morgan State University
 
1620 - 1640 MAZE: A Secure Cloud Storage Service Using Moving Target Defense and Secure Shell Protocol (SSH) Tunneling
Vasco Xu and Sherif Khattab
University of Pittsburgh
 
1640 - 1700 Performance improvement of anomaly detection on IoT network
Latha Suryavanshi Karakos and Jumoke Ladeji-Osias
Morgan State University
 
1700 - 1720 Uighurs and Facial Recognition Technology
Camille Catania
University of Kent
 
1720 - 1740 Vulnerability Evaluation and Prioritization for Cyber Resilient Systems
Omer Keskin, Nick Gannon, Brian Lopez, and Unal Tatar
University at Albany
 
1740 - 1900 The Student Presentation Happy Hour
Location: Gather Town

 
WEDNESDAY, APRIL 14
0930 - 0935 Welcome
Adam Tagert
National Security Agency
 
 
0935 - 1030 KEYNOTE PRESENTATION
Spectre Attacks: Exploiting Speculative Execution - and why the heck is
the computer speculating anyway?

Werner Haas
Cyberus Technology
 
1030 - 1045 BREAK
 
SESSION 4: Flanking the Defense  
1045 - 1110 Leveraging EM Side-Channel Information to Detect Rowhammer Attacks
*Zhenkai Zhang, */**Zihao Zhan, **Daniel Balasubramanian, Bo Li, **Peter Volgyesi, **Xenofon Koutsoukos
*Texas Tech University, **Vanderbilt, University, University of Illinois at Urbana-Champaign
 
1110 - 1135 Counting Broken Links: A Quant's View of Software Supply Chain Security
Dan Geer, Bentz Tozer, John Speed Meyers
In-Q-Tel
 
1135 - 1220† -  - 1222 Work-In-Progress Discussion Session: Device Profiling
*Tushar Jois, **Claudia Moncaliano,  Khir Henderson, *Aviel D. Rubin
*Johns Hopkins University, **JHU APL, Morgan State University

WiP Discussant: Stephanie Polczynski, Laboratory for Advanced Cybersecurity Research, Research Directorate
 
1220 - 1300 LUNCH & NETWORKING
 
1300 - 1400 KEYNOTE PRESENTATION
Why rigorous underpinnings for cyber security education and training matter? Experiences from CyBOK: the Cyber Security Body of Knowledge

Awais Rashid
University of Bristol
 
 
1400 - 1415 .BREAK
 
 
SESSION 5: Humans aren't only Users   
1415 - 1440 Can Advanced Type Systems Be Usable? An Empirical Study of Ownership, Assets, and Typestate in Obsidian
*Michael Coblenz, **Jonathan Aldrich, **Brad Myers, **Joshua Sunshine
*University of Maryland, **Carnegie Mellon University
 
1440 - 1505 Adversarial Thinking - Teaching Students to Think Like a Hacker
Frank Katz
Georgia Southern University
 
1505 - 1550 Work-In-Progress Discussion Session: Practices in Software Development
*Leysan Nurgalieva, **Alisa Frik, *Gavin Doherty
*Trinity College Dublin, Ireland, **UC Berkeley

WiP Discussant: Daniel Votipka, Tufts University
 
1550 - 1730 POSTER SESSION ON GATHER
 
2000 - 2130 SPECIAL SESSION: Hard Problems Discussions
 
THURSDAY, APRIL 15  
0930 - 0935 Welcome
Adam Tagert
National Security Agency
 
0935 - 1030

KEYNOTE PRESENTATION
Working with academia at the UK National Cyber Security Centre
Paul Waller
GCHQ

1030 - 1045 .BREAK
SESSION 6: Saving the Physical World from Cyber   
1045 - 1110 Verified Hardware/Software Co-Assurance: Enhancing Safety and Security for Critical Systems
David Hardin
Collins
 
1110 - 1135 überSpark: Practical, Provable, End-to-End Guarantees on Commodity Heterogenous Interconnected Computing Platforms
*Amit Vasudevan, **Petros Maniatis,  Ruben Martins, *Anton Dimov Hristozov, *Bruce Krogh, *Raffaele Romagnoli
*SEI, CMU; **Google Research; CSD, CMU; *ECE, CMU
 
1135 - 1220 Work-In-Progress Discussion Session: Railway Infrastructure
*Himanshu Neema, **Leqiang Wang, *Xenofon Koutsoukos, 
**CheeYee Tang, **Keith Stouffer
*Vanderbilt University, **NIST

WiP Discussant: Martín Barrère, Imperial College London
1220 - 1320 LUNCH & NETWORKING
 
SESSION 7: Go Where I Send Thee  
1320 - 1405 Work-In-Progress Discussion Session: Studying App Reviews
*Vaibhav Garg, *Hui Guo,**Nirav Ajmeri, *Munindar P. Singh
*NCSU, **University of Bristol

WiP Discussant: Jianwei Niu, University of Texas, San Antonio
 
1405 - 1430 ZeRØ: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks
*Mohamed Tarek, *Miguel Arroyo, *Evgeny Manzhosov, */**Simha Sethumadhavan
*Columbia University, **Chip Scan
 
1430 - 1455 Insights for Systems Security Engineering from Multilayer Network Models
Adam Williams, Gabriel C. Birch, Susan Caskey, Elizabeth Fleming, Thushara Gunda, Thomas Adams, Jamie Wingo
Sandia
1455 - 1525 BREAK
 
SESSION 8: Potpourri for 1,000  
1525 - 1550 AI-Powered Ransomware Detection Framework
Subash Poudyal and Dipankar Dasgupta
University of Memphis
 
1550 - 1615 On Managing Vulnerabilities in AI/ML Systems
*Jonathan Spring, *April Galyardt, *Allen Householder, **Nathan M. VanHoudnos
*CERT/CC, SEI, CMU, **SEI, CMU
 
1615 - 1700 Work-In-Progress Discussion Session: Attestation and Game Theory
*Shanto Roy, *Salah Uddin Kadir, **Yevgeniy Vorobeychik, *Aron Laszka
*University of Houston, **Washington University in St. Louis

WiP Discussant: Ryan Gabrys, Naval Information Warfare Center
1700 - 1715 Wrap Up
 
SYMPOSIUM ADJOURNED