HotSoS 2018 Program
  
| MONDAY, APRIL 9 | Location | |||
| 1830 - 2030 | Evening Reception at The StateView Hotel | Fusion Patio | ||
| TUESDAY, APRIL 10 | ||||
| 0730 - 1700 | Registration | Fusion C/D Foyer | ||
| SESSION 1 | Fusion C/D | |||
| 0830 - 0900 | Welcome and Introduction Symposium Co-Chairs: Laurie Williams and Munindar Singh Opening Remarks George Coker, National Security Agency | |||
| 0900 - 1000 | Keynote: Steve Lipner, Executive Director, SAFECode Foundational Cybersecurity Research: Report of a Study by NASEM  | |||
| 1000 - 1045 | BREAK and POSTER SESSION | Fusion A/B | ||
| SESSION 2 | ||||
| Paper Track: Vulnerabilities and Detection (Fusion C/D) | Tutorial/Industry Track (Synergy B) | |||
| 1045 - 1110† | Pooria Madani and Natalija Vlajic† University of York Robustness of Deep Autoencoder in Intrusion Detection under Adversarial Contamination  | †Dimitris Simos and *Rick Kuhn †SBA Research, *NIST Tutorial: Combinatorial Security Testing Course  | ||
| 1110 - 1135† | †Inger Anne Tøndel, *Tosin Daniel Oyetoyan, *Martin Gilje Jaatun and *Daniela S. Cruzes †Norwegian University of Science and Technology, *SINTEF Digital Understanding the Challenges to Adoption of the Microsoft Elevation of Privilege Game  | |||
| 1135 - 1200† | †Ira Ray Jenkins, †Sergey Bratus, †Sean Smith and *Maxwell Koo †Dartmouth College, *Narf Industries Reinventing the Privilege Drop: How Principled Preservation of Programmer Intent Would Prevent Security Bugs  | |||
|  | ||||
| 1200 - 1315 | LUNCH Lunch Presentation: †Erkang Zheng, †Phil Gates-Idem and †Matt Lavin LifeOmic, Inc. Building a Virtually Air-gapped Secure Environment in AWS  | Fusion C/D | ||
| SESSION 3 | Fusion C/D | |||
| 1315 - 1415 | Keynote: Ari Schwartz, Venable LLP You’ve Got a Vuln, I’ve Got a Vuln, Everybody’s Got a Vuln  | |||
| 1415 - 1515 | Panel: Cybersecurity Framework Practitioners Moderator: Nikola Vouk, Independent Jeremy Maxwell, Allscripts Andrew Porter, Merck Alex Rogozhin, BB&T Greg Witte, G2  | |||
| 1515 - 1600 | BREAK and POSTER SESSION | Fusion A/B | ||
| SESSION 4 | ||||
| Paper Track: Secure Construction (Fusion C/D) | Tutorial/Industry Track (Synergy B) | |||
| 1600 - 1625† | †Yao Dong, †Ana Milanova and *Julian Dolby †Rensselaer Polytechnic Institute, *IBM SecureMR: Secure MapReduce Computation Using Homomorphic Encryption and Program Partitioning  | Larry Maccherone† Comcast DevSecOps: Security at the Speed of Software Development  | ||
| 1625 - 1650 | Bradley Potteiger, Zhenkai Zhang and Xenofon Koutsoukos Vanderbilt University Integrated Instruction Set Randomization and Control Reconfiguration for Securing Cyber-Physical Systems  | Leslie Leonard, William Glodeck Department of Defense HACSAW: A Trusted Framework for Cyber Situational Awareness  | ||
| 1650 - 1715† | †Iness Ben Guirat and *Harry Halpin† †INSAT, *INRIA Formal Verification of the W3C Web Authentication Protocol  | †David González, *Nikola Vouk Compliance as Code: Policy Governed Automated Security Checkpoints | ||
| SESSION 5 | ||||
| 1715 - 1800 | BREAK | |||
| 1800 | Shuttle bus to the North Carolina Museum of Art. Meet in the hotel lobby. (Don't be late!) | |||
| 1830 - 2100 | Dinner at the North Carolina Museum of Art | |||
| WEDNESDAY, APRIL 11 | ||||
| 0830 - 1530 | Registration | Fusion C/D Foyer | ||
| SESSION 6 | Fusion C/D | |||
| 0900 - 1000 | Keynote: David Burke, NAVAIR Cyber Warfare Detachment Cyber Security for Aviation Weapon Systems | |||
| 1000 - 1045 | BREAK and POSTER SESSION | |||
| SESSION 7 | ||||
| Paper Track: Applications and Risk Evaluation (Fusion C/D) | Tutorial/Industry Track (Synergy B) | |||
| 1045 - 1110 | Martha McNeil, Thomas Llanso and Dallas Pearson Johns Hopkins University Applied Physics Laboratory Application of Capability-Based Cyber Risk Assessment Methodology to a Space System  | Greg Witte G2 Tutorial: CyberSecurity Framework | ||
| 1110 - 1135† | Daniela S. Cruzes, Martin Gilje Jaatun and Tosin Daniel Oyetoyan SINTEF Digital Challenges and Approaches of Performing Canonical Action Research in Software Security  | |||
| 1135 - 1200† | †Huashan Chen, *Jin-Hee Cho and †Shouhuai Xu †University of Texas at San Antonio, *Army Research Lab Quantifying the Security Effectiveness of Firewalls and DMZs  | |||
|  | ||||
| 1200 - 1315 | .LUNCH | Fusion C/D | ||
| SESSION 8 | Fusion C/D | |||
| 1315 - 1345 | Michelle Mazurek, University of Maryland NSA Fifth Annual Best Scientific Cybersecurity Paper Competition Winner You Get Where You're Looking For: The Impact of Information Sources on Code Security  | |||
| 1345 - 1415 | Daniel Gruss, Graz University of Technology Microarchitectural Attacks: From the Basics to Arbitrary Read and Write Primitives without any Software Bugs  | |||
| 1415 - 1430 | BREAK | |||
| 1430 - 1530 | Keynote: Ravi Sandhu, University of Texas at San Antonio An Access Control Perspective on the Science of Security  | |||
| 1530 | Announcement of Winning Paper and Winning Poster Carl Landwehr and Adam Tagert Closing Remarks Laurie Williams and Munindar Singh | |||
| SYMPOSIUM ADJOURNED | ||||
 
    