HotSoS 2022 Program Agenda
TIMES ARE LISTED IN CDT | PRINT-FRIENDLY VERSIONS BY TIME ZONE: EDT | CDT | MDT | PDT | CEST | BST |
||
TUESDAY, MARCH 29 | |||
Check out the virtual platforms and test your settings |
|||
TUESDAY, APRIL 5 | |||
0930 - 1000 | Networking, log into the platform and chat with other attendees |
||
1000 - 1015 | Welcome and Opening Remarks |
||
1015 - 1115 | KEYNOTE PRESENTATION: Cybersecurity Threat Landscape Jason Burt CISA |
||
1115 - 1135 |
BREAK |
||
Work-in-Progress (WiP) Session 1 | |||
1135 - 1220 | Attack scenarios on Industrial Control Systems Stanislav Abaimov, Joseph Gardiner and Awais Rashid Discussant: |
||
1220 - 1305 | Resilient Target Pursuit for Multi-UAV Systems Nicholas Potteiger, Mudassir Shabbir, Scott Eisele, Mark Wutka and Xenofon Koutsoukos Discussant: |
||
1305 - 1405 | LUNCH & NETWORKING Preview posters in Gather |
||
Work-Already-Published Session 1 | |||
1405 - 1430 | Flexible Mechanism for Remote Attestation Sarah Helble, Ian Kretz, Peter Loscocco, John Ramsdell, Paul Rowe and Perry Alexander |
||
1430 - 1455 | Demystifying Attestation in Intel Trust Domain Extensions via Formal Verification Muhammad Usama Sardar, Saidgani Musaev and Christof Fetzer |
||
1500 - 1515 | BREAK |
||
Work-Already-Published Session 2 | |||
1515 - 1540 | Consent as a Foundation for Responsible Autonomy Munindar Singh |
||
1540 - 1605 | Verified Cryptographic Code for Everybody Brett Boston, Samuel Breese, Josiah Dodds, Mike Dodds, Brian Huffman, Adam Petcher and Andrei Stefanescu |
||
1610 - 1640 | NETWORKING Preview posters in Gather |
||
WEDNESDAY, APRIL 6 | |||
0955 - 1000 | Welcome |
||
1000 - 1100 | KEYNOTE PRESENTATION:Trustworthy AI Jeanette Wing Columbia University |
||
1100 - 1120 | BREAK |
||
Work-in-Progress (WiP) Session 2 | |||
1120 - 1205 | Verification of Cyber Emulation Experiments Through Virtual Machine and Host Metrics Jamie Thorpe, Laura P. Swiler, Seth Hanson, Gerardo Cruz, Thomas Tarman, Trevor Rollins and Bert Debusschere Discussant: |
||
1205 - 1250 | A Bayesian Framework for Incorporating Uncertainty in Cybersecurity Incident Response Hoang Hai Nguyen, Kartik Palani and David Nicol Discussant: |
||
1250 - 1350 | LUNCH & NETWORKING Preview posters in Gather |
||
1350 - 1420 | NSA Best Cybersecurity Paper Competition Honorable Mention: Retrofitting Fine Grain Isolation in the Firefox Renderer Shravan Narayan UC San Diego |
||
1420 - 1430 | .BREAK |
||
Work-Already-Published Session 3 | |||
1430 - 1455 | You Make Me Tremble: A First Look at Attacks Against Structural Control Systems Abel Zambrano, Alejandro Palacio-Betancur, Luis Burbano, Andres Felipe Niño, Luis Felipe Giraldo, Mariantonieta Gutierrez Soto, Jairo Giraldo and Alvaro A. Cardenas |
||
1455 - 1520 | Evaluating Mail-Based Security for Electoral Processes Using Attack Trees Natalie Scala, Paul Goethals, Josh Dehlinger, Yeabsira Mezgebe, Betelhem Jilcha and Isabella Bloomquist |
||
1520 - 1545 | MLEFlow: Learning from History to Improve Load Balancing in Tor Hussein Darir, Hussein Sibai, Chin-Yu Cheng, Nikita Borisov, Geir Dullerud and Sayan Mitr |
||
1545 - 1610 | FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques Hong Liu, Chen Zhong, Awny Alnusair and Sheikh Islam |
||
1615 - 1715 | POSTER SESSION ON GATHER |
||
THURSDAY, APRIL 7 | |||
0955 - 1000 | Welcome |
||
1000 - 1100 |
KEYNOTE PRESENTATION |
||
1100 - 1130 | NSA Best Cybersecurity Paper Competition Winner: On One-way Functions and Kolmogorov Complexity Yanyi Liu (Cornwell University) and Raphael Pass (Cornell Tech) |
||
1130 - 1150 | BREAK |
||
Work-in-Progress (WiP) Session 3 | |||
1150 - 1235 | DNSauth - When Step Up Authentication is Not Enough Sam Hays, Michael Sandborn and Jules White Discussant: Stephanie Polczynski |
||
1235 - 1320 | Detecting malicious agents in partially observed mixed-autonomy vehicular traffic George Gunter, Daniel Work and Carl Gunter Disscussant: |
||
1320 - 1420 | LUNCH & NETWORKING |
||
Work-Already-Published Session 4 | |||
1420 - 1445 | Explore Capabilities and Effectiveness of Reverse Engineering Tools to Provide Memory Safety for Binary Programs Ruturaj Kiran Vaidya, Prasad A. Kulkarni and Michael R. Jantz |
||
1445 - 1510 | Empirical Study of PLC Authentication Protocols in Industrial Control Systems Adeen Ayub, Hyunguk Yoo and Irfan Ahmed |
||
1510 - 1535 | Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem Zane Ma, James Austgen, Joshua Mason, Zakir Durumeric and Michael Bailey |
||
1540 - 1555 | Announcement of Winning Poster & Closing remarks |
||
SYMPOSIUM ADJOURNED |