WIP: Assessing the Effects of Source Language on Binary Similarity Tools |
|
K-ASTRO: Structure-Aware Adaptation of LLMs for Code Vulnerability Detection |
|
Concept-ROT: Poisoning Concepts in Large Language Models with Model Editing |
|
PBP: Post-training Backdoor Purification for Malware Classifiers |
|
Keynote: The Complex Science of Cybersecurity |
|
Roundtable: Life After Graduate School |
|
WiP: An Investigation of Large Language Models and Their Vulnerabilities in Spam Detection |
|
WiP: A Human Study of Cognitive Biases in CTF Challenges |
|
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations |
|
Assessing AI vs Human-Authored Spear Phishing SMS Attacks: An Empirical Study |
|
Interdisciplinary Approaches to Cybervulnerability Impact Assessment for Energy Critical Infrastructure |
|
Solving Real-World Problems is Hard: Perspectives and Lessons from an Academic, DoD Researcher, and a CEO |
|
Decoding Trust: Comprehensive Assessment of Trustworthiness in GPT Models |
|
WIP: Steerability of Autonomous Cyber-Defense Agents by Meta-Attackers |
|
WIP: BareSlice: Extending Arm CCA to Support Bare-Metal Confidential Virtual Machines |
|
Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC Adoption Rates and Identifying Migration Pathways |
|
Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation |
|
A Grammar-Based Behavioral Distance Measure between Ransomware Variants |
|
BinSub: The Simple Essence of Polymorphic Type Inference for Machine Code |
|
Vanderbilt Students Engage in National Security Research Through Immersion Program |
|
Towson University Hosts Watch Party for HoTSoS 2025 Symposium |
|
HotSoS 2025 Welcome and Opening Remarks |
|
HotSoS 2025 2025 Best Cybersecurity Paper Competition Introduction |
|
HoTSoS 2025 Announcement of Winning Poster / Closing Remarks |
|
NSA and International Partners Warn of Fast Flux as a National Security Threat |
|