Visible to the public HotSoS 2018 ProgramConflict Detection Enabled

MONDAY, APRIL 9 Location

1830 - 2030

Evening Reception at The StateView Hotel
 

Fusion Patio
TUESDAY, APRIL 10

0730 - 1700

Registration
 
Fusion C/D Foyer
SESSION 1 Fusion C/D
0830 - 0900 Welcome and Introduction
Symposium Co-Chairs: Laurie Williams and Munindar Singh

Opening Remarks
George Coker, National Security Agency
 
0900 - 1000 Keynote: Steve Lipner, Executive Director, SAFECode
Foundational Cybersecurity Research: Report of a Study by NASEM
1000 - 1045 BREAK and POSTER SESSION
 
Fusion A/B 
SESSION 2    
  Paper Track: Vulnerabilities and Detection (Fusion C/D)
 
Tutorial/Industry Track (Synergy B)
 
1045 - 1110 Pooria Madani and Natalija Vlajic
University of York
Robustness of Deep Autoencoder in Intrusion Detection under Adversarial Contamination
Dimitris Simos and *Rick Kuhn
SBA Research, *NIST
Tutorial: Combinatorial Security Testing Course
1110 - 1135 Inger Anne Tøndel, *Tosin Daniel Oyetoyan, *Martin Gilje Jaatun and *Daniela S. Cruzes
Norwegian University of Science and Technology, *SINTEF Digital
Understanding the Challenges to Adoption of the Microsoft Elevation
of Privilege Game

 
1135 - 1200 Ira Ray Jenkins, Sergey Bratus, Sean Smith and *Maxwell Koo
Dartmouth College, *Narf Industries
Reinventing the Privilege Drop: How Principled Preservation
of Programmer Intent Would Prevent Security Bugs

 
 1200 - 1315  LUNCH

Lunch Presentation:
Erkang Zheng, Phil Gates-Idem and Matt Lavin
LifeOmic, Inc.
Building a Virtually Air-gapped Secure Environment in AWS

Fusion C/D
SESSION 3 Fusion C/D  
1315 - 1415 Keynote: Ari Schwartz, Venable LLP
​You’ve Got a Vuln, I’ve Got a Vuln, Everybody’s Got a Vuln
1415 - 1515 Panel: Cybersecurity Framework Practitioners
Moderator: Nikola Vouk, Independent

Jeremy Maxwell, Allscripts
Andrew Porter, Merck
Alex Rogozhin, BB&T
Greg Witte, G2
1515 - 1600 BREAK and POSTER SESSION
 
Fusion A/B
SESSION 4
  Paper Track: Secure Construction (Fusion C/D)
 
Tutorial/Industry Track (Synergy B)
1600 - 1625 Yao Dong, Ana Milanova and *Julian Dolby
Rensselaer Polytechnic Institute, *IBM
SecureMR: Secure MapReduce Computation Using
Homomorphic Encryption and Program Partitioning

Larry Maccherone
Comcast
DevSecOps: Security at the Speed of Software Development
1625 - 1650 Bradley Potteiger, Zhenkai Zhang and Xenofon Koutsoukos
Vanderbilt University
Integrated Instruction Set Randomization and Control Reconfiguration
for Securing Cyber-Physical Systems

Leslie Leonard, William Glodeck
Department of Defense
HACSAW: A Trusted Framework for Cyber Situational Awareness
1650 - 1715

Iness Ben Guirat and *Harry Halpin
INSAT, *INRIA
Formal Verification of the W3C Web Authentication Protocol

David González, *Nikola Vouk
nearForm, *Independent

Compliance as Code: Policy Governed Automated Security Checkpoints

SESSION 5
1715 - 1800 BREAK
 
1800 Shuttle bus to the North Carolina Museum of Art. Meet in the hotel lobby. (Don't be late!)
 
1830 - 2100 Dinner at the North Carolina Museum of Art
 
WEDNESDAY, APRIL 11

0830 - 1530
 

Registration
 
Fusion C/D Foyer
SESSION 6 Fusion C/D
0900 - 1000 Keynote: David Burke, NAVAIR Cyber Warfare Detachment
Cyber Security for Aviation Weapon Systems
 
1000 - 1045 BREAK and POSTER SESSION
 
SESSION 7
  Paper Track: Applications and Risk Evaluation (Fusion C/D) Tutorial/Industry Track (Synergy B)
1045 - 1110


 
Martha McNeil, Thomas Llanso and Dallas Pearson
Johns Hopkins University Applied Physics Laboratory
Application of Capability-Based Cyber Risk Assessment
Methodology to a Space System

Greg Witte
G2
Tutorial: CyberSecurity Framework
1110 - 1135 Daniela S. Cruzes, Martin Gilje Jaatun and Tosin Daniel Oyetoyan
SINTEF Digital
Challenges and Approaches of Performing Canonical Action Research
in Software Security

 
1135 - 1200 Huashan Chen, *Jin-Hee Cho and Shouhuai Xu
University of Texas at San Antonio, *Army Research Lab
Quantifying the Security Effectiveness of Firewalls and DMZs

 
 
1200 - 1315 .LUNCH
 
Fusion C/D
SESSION 8 Fusion C/D
1315 - 1345 Michelle Mazurek, University of Maryland
NSA Fifth Annual Best Scientific Cybersecurity Paper Competition Winner
You Get Where You're Looking For: The Impact of Information Sources on Code Security
1345 - 1415 Daniel Gruss, Graz University of Technology
Microarchitectural Attacks: From the Basics to Arbitrary Read and Write Primitives without any Software Bugs
1415 - 1430 BREAK
 
1430 - 1530 Keynote: Ravi Sandhu, University of Texas at San Antonio
An Access Control Perspective on the Science of Security
1530 Announcement of Winning Paper and Winning Poster
Carl Landwehr and Adam Tagert

Closing Remarks
Laurie Williams and Munindar Singh
 
SYMPOSIUM ADJOURNED