Visible to the public HotSoS 2016Conflict Detection Enabled

HotSoS 2016 proceedings are in the ACM Digital Library

TUESDAY, APRIL 19

6:00pm - 9:00pm

Evening Reception at Phipps Conservatory
 
WEDNESDAY, APRIL 20

8:00am - 9:00am

Breakfast at Cohon University Center
 
SESSION 1
9:00am - 10:30am Welcome and Introduction

Keynote: Lorrie Cranor
Adventures in Usable Privacy and Security: From Empirical Studies to Public Policy

Paper: Hui Lin, Homa Alemzadeh, Daniel Chen, Zbigniew Kalbararczyk, and Ravishankar Iyer
Safety-critical Cyber-Physical Attacks: Analysis, Detection, and Mitigation
 
10:30am - 11:00am Break
 
SESSION 2  
11:00am - 12:30pm Paper: Aron Laszka, Waseem Abbas, S. Shankar Sastry, Yevgeniy Vorobeychik, and Xenofon Koutsoukos
Optimal Thresholds for Intrusion Detection Systems

Paper: Atul Bohara, Uttam Thakore, and William Sanders
Intrusion Detection in Enterprise Systems by Combining and Clustering Diverse Monitor Data

Paper: Jeffrey Carver, Morgan Burcham, Sedef Akinli Kocak, Ayse Bener, Michael Felderer, Matthias Gander, Jason King, Jouni Markkula, Markku Oivo, Clemens Sauerwein, and Laurie Williams
Establishing a Baseline for Mesauring Advancement in the Science of Security – an Analysis of the 2015 IEEE Security & Privacy Proceedings
 
12:30pm - 2:00pm Posters and Lunch
 
SESSION 3  
2:00pm - 3:00pm Keynote: Greg Shannon
Science Challenges in the Federal Cybersecurity R&D Strategic Plan
 
3:00pm - 3:30pm Posters and Break
 
SESSION 4  
3:30pm - 5:20pm Paper: Bradley Potteiger, Goncalo Martins, and Xenofon Koutsoukos
Software and Attack Centric Integrated Threat Modeling for Quantitative Risk Assessment

Tutorial: Hanan Hibshi
Systematic Analysis of Qualitative Data in Security
 
5:30pm - 6:00pm Break
 
6:00pm - 9:00pm Dinner at Carnegie Museum of Natural History
 
THURSDAY, APRIL 21  

8:00am - 9:00am

Breakfast at Cohon University Center
 
SESSION 5  
9:00am - 10:30am Keynote: Christos Faloutsos
Anomaly Detection in Large Graphs

Paper: Kevin Bush, Antonio Roque, and Christopher Degni
Security is About Control: Insights from Cybernetics

Paper: Zhenqi Huang, Yu Wang, Sayan Mitra, and Geir Dullerud
Controller Synthesis for Linear Time-varying Systems with Adversaries
 
10:30am - 11:00am Break
 
SESSION 6  
11:00am - 12:20pm Tutorial: Tao Xie, William Enck
Text Analytics for Security
 
12:20pm - 1:20pm Lunch
 
SESSION 7  
1:20pm - 3:10pm Keynote: Matt Briggs
The Threat Environment

Paper: Carl Pearson, Allaire Welk, William Boettcher, Roger Mayer, Sean Streck, Joseph Simons-Rudolph, and Christopher Mayhorn
Difference in Trust Between Human and Automated Decision Aids

Paper: Phuong Cao, Eric Badger, Zbigniew Kalbarczyk, Ravishankar Iyer
A Framework for Generation, Replay and Analysis of Real-World Attack Variants
3:10pm - 3:30pm Ice Cream Social