HotSoS 2014 Agenda
2014 Symposium and Bootcamp on the Science of Security (HotSoS) Program Agenda
The 2014 Symposium and Bootcamp on the Science of Security (HotSoS) was held April 8-9, 2014 in Raleigh, North Carolina.
Over 130 leaders from government, industry, and the academic community met to discuss new and ongoing programs in security science. The presentations emphasized a broad range of topics including computing architectures, networks, software engineering practices, models of human interaction and behavior, organizational models, and evaluation methodologies.
Artifacts from Hot SoS 2014 include presentations and posters that are linked to the agenda below. The call for papers can be found at http://cps-vo.org/hotsos2014/cfp.
Monday, April 7, 2014
5:00 - 9:00 |
Registration - Esplanade Gallery |
6:00 - 9:00pm |
Welcome Reception
|
Tuesday, April 8, 2014
7:30 - 5:00 |
Registration - Esplanade Gallery |
|||
8:00 - 9:00 |
Breakfast |
|||
9:00 - 10:30 |
Welcome, Announcements |
|||
Keynote: The Science of Computer Security Perspectives and Prospects |
||||
10:30 - 11:00 |
Break |
|||
11:00 - 12:30 |
Research Paper Session: Architecture and Analysis |
Tutorial: Engineering Privacy: Example Challenges of Transitioning Science to Practice |
||
In-Nimbo Sandboxing |
||||
Architecture-Based Self-Protection: Composing and Reasoning about Denial-of-Service Mitigations |
||||
A Rewriting-based Forwards Semantics for Maude-NPA |
||||
12:30 - 1:30 |
Lunch |
|||
1:30 - 3:00 |
Industry Panel: Our Perspective on the Science of Security |
|||
3:00 - 3:30 |
Break |
|||
3:30 - 5:00 |
Research Paper Session: Sociotechnical Systems |
Research Work in Progress |
International Research Network for the Science of Security (IRN-SoS) -- Kick-off Meeting |
|
Open vs. Closed Systems for Accountability |
||||
Log Your CRUD: Design Principles for Software Logging Mechanisms |
||||
A New Approach to Modeling and Analyzing Security of Networked Systems |
||||
6:00 - 9:00 |
Poster Session and Reception |
Wednesday, April 9, 2014
8:00 - 10:30 |
Registration - Esplanade Gallery |
|||
8:00 - 9:00 |
Breakfast |
|||
9:00 - 10:30 |
Announcements |
|||
Keynote: What the Science of Security might learn from the Evolution of the Discipline of Empirical Software Engineering |
||||
10:30 - 11:00 |
Break |
|||
11:00 - 12:30 |
Research Paper Session: Human Aspects |
Tutorial: Let's Play Poker: Effort and Software Security Risk Estimation in Software Engineering |
||
Less is More? Investigating the Role of Examples in Security Studies using Analogical Transfer |
||||
Phishing in International Waters: Exploring Cross-Cultural Differences in Phishing Conceptualizations between Chinese, Indian, and American Samples |
||||
Human Factors in Webserver Log File Analysis: A Controlled Experiment on Investigating Malicious Activity |
||||
12:30 - 1:30 |
Lunch |
|||
1:30 - 2:45 |
Invited Talks
Location: Oak Forest Ballroom |
|||
2:45 - 3:15 |
Break |
|||
3:15 - 4:45 |
Research Paper Session: Adaptivity and Dynamics |
Tutorial: Authentication and Access-Control in Distributed Systems |
Tutorial: Understanding the 'H' in Science of Security HCI Research: Methods and Lessons Learned from Investigations of Phishing |
|
Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics |
||||
Analyzing an Adaptive Reputation Metric for Anonymity Systems |
||||
Proving Abstractions of Dynamical Systems through Numerical Simulations |
Hot SoS