Title Date
WIP: Assessing the Effects of Source Language on Binary Similarity Tools
K-ASTRO: Structure-Aware Adaptation of LLMs for Code Vulnerability Detection
Concept-ROT: Poisoning Concepts in Large Language Models with Model Editing
PBP: Post-training Backdoor Purification for Malware Classifiers
Keynote: The Complex Science of Cybersecurity
Roundtable: Life After Graduate School
WiP: An Investigation of Large Language Models and Their Vulnerabilities in Spam Detection
WiP: A Human Study of Cognitive Biases in CTF Challenges
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations
Assessing AI vs Human-Authored Spear Phishing SMS Attacks: An Empirical Study
Interdisciplinary Approaches to Cybervulnerability Impact Assessment for Energy Critical Infrastructure
Solving Real-World Problems is Hard: Perspectives and Lessons from an Academic, DoD Researcher, and a CEO
Decoding Trust: Comprehensive Assessment of Trustworthiness in GPT Models
WIP: Steerability of Autonomous Cyber-Defense Agents by Meta-Attackers
WIP: BareSlice: Extending Arm CCA to Support Bare-Metal Confidential Virtual Machines
Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC Adoption Rates and Identifying Migration Pathways
Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation
A Grammar-Based Behavioral Distance Measure between Ransomware Variants
BinSub: The Simple Essence of Polymorphic Type Inference for Machine Code
Vanderbilt Students Engage in National Security Research Through Immersion Program
​Towson University Hosts Watch Party for HoTSoS 2025 Symposium​
HotSoS 2025 Welcome and Opening Remarks
HotSoS 2025 2025 Best Cybersecurity Paper Competition Introduction
HoTSoS 2025 Announcement of Winning Poster / Closing Remarks
NSA and International Partners Warn of Fast Flux as a National Security Threat