SoS VI Mid Year Review 2025

Date: Jul 22, 2025 8:00 am – Jul 23, 2025 4:00 pm
Location: Towson University Cyber Center, Towson, MD

Please register by July 11, 2025.

Venue address: 

Towson University Cyber Center
10 West Burke Avenue
Towson, MD 21286 (map)

The closest parking garage to the location is Towsontown Garage. To navigate there, input the name of the garage into any navigation app and it should bring you to the location.  Parking will be in department guest or visitor parking spaces only. ParkMobile App Zone #: 8001. 

Accommodations:

Home 2 Suites by Hilton
21 W Susquehanna Ave, Towson, MD 21204

Hampton Inn
21 W Susquehanna Ave, Towson, MD 21204

Sheraton Baltimore North  
903 Dulaney Valley Rd, Towson, MD 21204

Program Agenda

Times are listed in EST

TUESDAY, JULY 22, 2025
9:00am - 9:15am Welcome and Logistics Towson
9:15am - 9:30am Opening Remarks / Networking Shavon D. / Adam T.
9:30am - 10:30am Guest Speaker: Harvey Rishikof
Title TBD
10:30am - 10:45am BREAK

VI 1: Trusted Systems

10:45am - 11:30am Quantitative Threat Modeling and Risk Assessment in the Socio-Technical Critical Infrastructure Towson
11:30am - 12:15pm Predictable & Scalable Remote Attestation Univ. of Kansas
12:15pm - 1:15pm LUNCH
1:15pm - 2:00pm Advancing Security & Privacy of Bluetooth IoT Ohio State
2:00pm - 2:45pm Continuous Reasoning with Gradual Verification Carnegie Mellon
2:45pm - 3:00pm BREAK

VI 2: Defensive Mechanisms

3:00pm - 3:45pm Neurosymbolic Autonomous Agents for Cyber Defense Vanderbilt
3:45pm - 4:30pm Resilient Systems through Adaptive Architecture Carnegie Mellon
4:30pm - 5:00pm Closed PI Meeting
Followed by Optional Site Tour
WEDNESDAY, JULY 23, 2025
9:00am - 10:00am Speed VI Syncs
10:00am - 10:15am BREAK

VI 2: Defensive Mechanisms (cont.)

10:15am - 11:00am Towards Trustworthy Autonomous Cyber Defense for Dynamic Intrusion Response Carnegie Mellon
11:00am - 11:45am Vulnerabilities for Social Attack Surface Univ. of Kansas
11:45am - 1:15pm LUNCH

VI 3: AI & Cybersecurity

1:15pm - 2:00pm Improving Malware Classifiers with Plausible Novel Samples Vanderbilt
2:00pm - 2:45pm Leveraging Machine Learning for Binary Software Understanding Arizona State
2:45pm - 3:15pm Improving Security and Safety of Neural Networks ICSI
3:15pm - 3:30pm BREAK
3:30pm - 4:15pm PI and Research Liaison Syncs
4:15pm - 4:30 pm Transition
4:30pm - 5:00pm Open Discussion/Reflection/Closing Remarks ALL; Adam Tagert/Shavon Donnell

 

Submitted by Katie Dey on