HotSoS 2020 Program Agenda
  PRINT-FRIENDLY VERSION
| MONDAY, SEPTEMBER 21 | ||||
| 1730 - 1930 | Evening Reception at The Burge Union | 1565 Irving Hill Rd. Lawrence, KS  | 
||
| TUESDAY, SEPTEMBER 22 | ||||
| 0800 - 1730 | Registration | Continental Breakfast (until 0830) | 
|||
| 0830 - 0845 | Chair's Opening Remarks Symposium Chairs: Perry Alexander, Baek-Young Choi, and Drew Davidson NSA Opening Remarks  | 
|||
| 0845 - 0945 | Keynote Presentation: Access Control Verification for Everyone Andrew Gacek, Amazon Web Services  | 
|||
| 0945 - 1000 | BREAK | 
|||
| PAPER SESSION 1: CPS and Industrial Control (20 minutes per paper with 10 minutes of flex in the block)  | 
||||
| 1000 - 1130 | Simulation Testbed for Railway Infrastructure Security and Resilience Evaluation *Himanshu Neema, *Xenofon Koutsoukos, **Bradley Potteiger, and †Cheeyee Tang *Vanderbilt University, **Johns Hopkins Applied Physics Lab, †National Institute of Standards and Technology  | 
|||
| @PAD: Adversarial Training of Power Systems Against Denial of Service Attacks Ali Ozdagli, Carlos Barreto, and Xenofon Koutsoukos Vanderbilt University  | 
||||
| The More the Merrier: Adding Hidden Measurements for Anomaly Detection and Mitigation in Industrial Control Systems *Jairo Giraldo, **David Urbina, †Cheeyee Tang, and ††Alvaro Cardenas *University of Utah, **University of Texas at Dallas, †National Institute of Standards and Technology, ††The University of California, Santa Cruz  | 
||||
| RUCKUS: A Cybersecurity Engine for Performing Autonomous Cyber-Physical System Vulnerability Discovery at Scale Bradley Potteiger, Jacob Mills, Daniel Cohen, and Paul Velez Johns Hopkins Applied Physics Lab  | 
||||
![]()  | 
||||
| 1130 - 1300 | LUNCH | 
|||
| 1300 - 1400 | Keynote Presentation: Is Hardware Root of Trust hard to do, and Trustworthy? Lyle Paczkowski, Sprint  | 
|||
| 1400 - 1415 | BREAK | 
|||
| WORKS IN PROGRESS (WiP) SESSION 1 | ||||
| 1415 - 1500 | *Hao Xue, *Qiaozhi Wang, *Bo Lou, **Chao Lan, *Fenjun Li *University of Kansas, **University of Wyoming  | 
|||
| 1500 - 1545 | Jacob Fustos, Heechul Yun University of Kansas  | 
|||
![]()  | 
||||
| 1545 - 1600 | BREAK | 
|||
| PAPER SESSION 2: Modeling (20 minutes per paper with 10 minutes of flex in the block)  | 
||||
| 1600 - 1730 | Exploring Hackers Assets: Topics of Interest as Indicators of Compromise Mohammad Alramahi, Izzat Alsmadi, and Joshua Davenport Texas A&M, San Antonio  | 
|||
| Cyber Threat Modeling and Validation: Port Scanning and Detection Eric Vugrin, Jerry Cruz, Christian Reedy, Thomas Tarman, and Ali Pinar Sandia National Laboratories  | 
||||
| Can We Use Software Bug Reports to Identify Software Vulnerability Strategies Farzana Ahamed Bhuiyan, Raunak Shakya, and Akond Rahman Tennessee Technological University  | 
||||
| Automated Influence and the Challenge of Cognitive Security Sarah Rajtmajer and Daniel Susser Pennsylvania State University  | 
||||
![]()  | 
||||
| 1730 - 1900 | POSTER SESSION | 
|||
| WEDNESDAY, SEPTEMBER 23 | ||||
| 0800 - 1630 | Registration | Contintental Breakfast (until 0830) | 
|||
| 0830 - 0930 | Keynote Presentation: Trust Engineering with Cryptographic Protocols Joshua Guttman, WPI/MITRE  | 
|||
| 0930 - 0945 | BREAK | 
|||
| WORKS IN PROGRESS (WiP) SESSION 2 | ||||
| 0945 - 1030 | *Sohaib Kiani, *Fengjun Li, **Chao Lan, and *Bo Luo *University of Kansas, **University of Wyoming  | 
|||
| 1030 - 1115† - - 1222 | Ryan Karl, Jonathan Takeshita, and Taeho Jung University of Notre Dame  | 
|||
![]()  | 
||||
| 1115 - 1130 | BREAK | 
|||
| 1130 - 1230 | Keynote Presentation: Evaluating Fuzz Testing (and other technologies) Michael Hicks, University of Maryland  | 
|||
| 1230 - 1400 | .LUNCH | 
|||
| WORKS IN PROGRESS (WiP) SESSION 3 | ||||
| 1400 - 1445 | Tsion Yimer, Md Tanvir Arafin, and Kevin Kornegay Morgan State University  | 
|||
| 1445 - 1530 | Sana Awan, Fenjun Li, Bo Luo University of Kansas  | 
|||
![]()  | 
||||
| 1530 - 1545 | BREAK | 
|||
| PAPER SESSION 3: Systems | ||||
| 1545 - 1715 | Neutralizing Manipulation of Critical Data by Enforcing Data-Instruction Dependency Chandra Sharma, Nathan Miller, and George Amariucai Kansas State University  | 
|||
| Ghostbusting: Mitigating Spectre with Intraprocess Memory Isolation Ira Jenkins, Prashant Anantharaman, Rebecca Shapiro, J Peter Brady, Sergey Bratus, and Sean Smith Dartmouth College  | 
||||
| WOLF: Automated Machine Learning Workflow Management Framework for Malware Detection and Other Applications Sohaib Kiani, Sana Awan, Fengjun Li, and Bo Luo University of Kansas  | 
||||
| A Formal Security Analysis of Zigbee *Li Li, **Proyash Podder, and *Endadul Hoque *Syracuse University, **Florida International University  | 
||||
![]()  | 
||||
1715 - 1730  | 
 Announcement of Winning Paper and Winning Poster Closing Remarks  | 
|||
| SYMPOSIUM ADJOURNED | ||||
    
            