Visible to the public HotSoS 2022 Program AgendaConflict Detection Enabled

 

TIMES ARE LISTED IN CDT PRINT-FRIENDLY VERSIONS BY TIME ZONE:
EDT | CDT | MDT | PDT | CEST | BST  
TUESDAY, MARCH 29  
  Check out the virtual platforms and test your settings
 
 
TUESDAY, APRIL 5
0930 - 1000 Networking, log into the platform and chat with other attendees
 
 
1000 - 1015 Welcome and Opening Remarks

 
1015 - 1115 KEYNOTE PRESENTATION: Cybersecurity Threat Landscape 

Jason Burt
CISA
 
1115 - 1135

BREAK
 

Work-in-Progress (WiP) Session 1  
1135 - 1220 Attack scenarios on Industrial Control Systems
Stanislav Abaimov, Joseph Gardiner and Awais Rashid

Discussant:
 
1220 - 1305 Resilient Target Pursuit for Multi-UAV Systems
Nicholas Potteiger, Mudassir Shabbir, Scott Eisele, Mark Wutka and Xenofon Koutsoukos

Discussant:
 
 1305 - 1405  LUNCH & NETWORKING
Preview posters in Gather
 
Work-Already-Published Session 1  
1405 - 1430 Flexible Mechanism for Remote Attestation
Sarah Helble, Ian Kretz, Peter Loscocco, John Ramsdell, Paul Rowe and Perry Alexander

 
1430 - 1455  Demystifying Attestation in Intel Trust Domain Extensions via Formal Verification
Muhammad Usama Sardar, Saidgani Musaev and Christof Fetzer

 
1500 - 1515 BREAK
 
Work-Already-Published Session 2  
1515 - 1540 Consent as a Foundation for Responsible Autonomy
Munindar Singh

 
1540 - 1605 Verified Cryptographic Code for Everybody
Brett Boston, Samuel Breese, Josiah Dodds, Mike Dodds, Brian Huffman, Adam Petcher and Andrei Stefanescu

 
1610 - 1640 NETWORKING
Preview posters in Gather
 
WEDNESDAY, APRIL 6
0955 - 1000 Welcome


 
 
1000 - 1100 KEYNOTE PRESENTATION:Trustworthy AI

Jeanette Wing
Columbia University
 
1100 - 1120 BREAK
 
Work-in-Progress (WiP) Session 2  
1120 - 1205 Verification of Cyber Emulation Experiments Through Virtual Machine and Host Metrics
Jamie Thorpe, Laura P. Swiler, Seth Hanson, Gerardo Cruz, Thomas Tarman, Trevor Rollins and Bert Debusschere

Discussant:
 
1205 - 1250 A Bayesian Framework for Incorporating Uncertainty in Cybersecurity Incident Response
Hoang Hai Nguyen, Kartik Palani and David Nicol

Discussant:
 
1250 - 1350 LUNCH & NETWORKING
Preview posters in Gather
 
1350 - 1420 NSA Best Cybersecurity Paper Competition Honorable Mention: Retrofitting Fine Grain Isolation in the Firefox Renderer
Shravan Narayan
UC San Diego
 
1420 - 1430 .BREAK
 
Work-Already-Published Session 3  
1430 - 1455 You Make Me Tremble: A First Look at Attacks Against Structural Control Systems
Abel Zambrano, Alejandro Palacio-Betancur, Luis Burbano, Andres Felipe Niño, Luis Felipe Giraldo, Mariantonieta Gutierrez Soto, Jairo Giraldo and Alvaro A. Cardenas

 
1455 - 1520 Evaluating Mail-Based Security for Electoral Processes Using Attack Trees
Natalie Scala, Paul Goethals, Josh Dehlinger, Yeabsira Mezgebe, Betelhem Jilcha and Isabella Bloomquist

 
1520 - 1545 MLEFlow: Learning from History to Improve Load Balancing in Tor
Hussein Darir, Hussein Sibai, Chin-Yu Cheng, Nikita Borisov, Geir Dullerud and Sayan Mitr

 
1545 - 1610 FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques
Hong Liu, Chen Zhong, Awny Alnusair and Sheikh Islam

 
1615 - 1715 POSTER SESSION ON GATHER
 
THURSDAY, APRIL 7  
0955 - 1000 Welcome


 
1000 - 1100

KEYNOTE PRESENTATION

Mark Tuttle
Amazon

 

1100 - 1130 NSA Best Cybersecurity Paper Competition Winner: On One-way Functions and Kolmogorov Complexity 
Yanyi Liu (Cornwell University) and Raphael Pass (Cornell Tech)
 
1130 - 1150 BREAK
 
Work-in-Progress (WiP) Session 3  
1150 - 1235 DNSauth - When Step Up Authentication is Not Enough
Sam Hays, Michael Sandborn and Jules White

Discussant: Stephanie Polczynski
 
1235 - 1320 Detecting malicious agents in partially observed mixed-autonomy vehicular traffic
George Gunter, Daniel Work and Carl Gunter

Disscussant: 
 
1320 - 1420 LUNCH & NETWORKING
 
Work-Already-Published Session 4  
1420 - 1445 Explore Capabilities and Effectiveness of Reverse Engineering Tools to Provide Memory Safety for Binary Programs
Ruturaj Kiran Vaidya, Prasad A. Kulkarni and Michael R. Jantz

 
1445 - 1510 Empirical Study of PLC Authentication Protocols in Industrial Control Systems
Adeen Ayub, Hyunguk Yoo and Irfan Ahmed

 
1510 - 1535 Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem
Zane Ma, James Austgen, Joshua Mason, Zakir Durumeric and Michael Bailey

 
1540 - 1555 Announcement of Winning Poster & Closing remarks
 
SYMPOSIUM ADJOURNED