default search action
HotSoS 2020: Lawrence, KS, USA
- Perry Alexander, Drew Davidson, Baek-Young Choi:
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2020, Lawrence, Kansas, USA, September 22-24, 2020. ACM 2020, ISBN 978-1-4503-7561-0
Abstract
- Himanshu Neema, Xenofon D. Koutsoukos, Bradley Potteiger, Chee Yee Tang, Keith Stouffer:
Simulation testbed for railway infrastructure security and resilience evaluation. 1:1-1:8 - Ali Irmak Ozdagli, Carlos A. Barreto, Xenofon D. Koutsoukos:
@PAD: adversarial training of power systems against denial-of-service attacks. 2:1-2:9 - Jairo Giraldo, David I. Urbina, Chee Yee Tang, Alvaro A. Cárdenas:
The more the merrier: adding hidden measurements to secure industrial control systems. 3:1-3:10 - Bradley Potteiger, Jacob Mills, Daniel Cohen, Paul Velez:
RUCKUS: a cybersecurity engine for performing autonomous cyber-physical system vulnerability discovery at scale. 4:1-4:10 - Mohammad Aref Al-Ramahi, Izzat Alsmadi, Joshua Davenport:
Exploring hackers assets: topics of interest as indicators of compromise. 5:1-5:4 - Eric D. Vugrin, Jerry Cruz, Christian Reedy, Thomas D. Tarman, Ali Pinar:
Cyber threat modeling and validation: port scanning and detection. 6:1-6:10 - Farzana Ahamed Bhuiyan, Raunak Shakya, Akond Rahman:
Can we use software bug reports to identify vulnerability discovery strategies? 7:1-7:10 - Sarah Michele Rajtmajer, Daniel Susser:
Automated influence and the challenge of cognitive security. 8:1-8:9 - Chandra Sharma, Nathan Miller, George T. Amariucai:
Neutralizing manipulation of critical data by enforcing data-instruction dependency. 9:1-9:11 - Ira Ray Jenkins, Prashant Anantharaman, Rebecca Shapiro, J. Peter Brady, Sergey Bratus, Sean W. Smith:
Ghostbusting: mitigating spectre with intraprocess memory isolation. 10:1-10:11 - Sohaib Kiani, Sana Awan, Jun Huan, Fengjun Li, Bo Luo:
WOLF: automated machine learning workflow management framework for malware detection and other applications. 11:1-11:8 - Li Li, Proyash Podder, Md. Endadul Hoque:
A formal security analysis of ZigBee (1.0 and 3.0). 12:1-12:11 - Justin Murphy, Elias T. Brady, Md. Shazibul Islam Shamim, Akond Rahman:
A curated dataset of security defects in scientific software projects. 13:1-13:2 - Raunak Shakya, Akond Rahman:
A preliminary taxonomy of techniques used in software fuzzing. 14:1-14:2 - Andrew Arnold, Paul Corapi, Michael Nasta, Kevin Wolgast, Thomas A. Babbitt:
A raspberry Pi sensor network for wildlife conservation. 15:1-15:3 - Kaushik Ayinala, Baek-Young Choi, Sejun Song:
Accelerating block propagation in PoW blockchain networks with pipelining and chunking. 16:1-16:2 - Adam Petz:
An infrastructure for faithful execution of remote attestation protocols. 17:1 - Grant Jurgensen, Michael Neises, Perry Alexander:
An seL4-based architecture for layered attestation. 18:1-18:2 - Hoang Hai Nguyen:
An uncertain graph-based approach for cyber-security risk assessment. 19:1-19:2 - Aidan McCarthy, Liam Furey, Keagan Smith, Daniel Hawthorne, Raymond W. Blaine:
Application of the armament cyber assessment framework: a security assessment methodology for military systems. 20:1-20:2 - Lauren Elizabeth Provost, Rebecca Labitt, Danielle Alexandre, Asher Rodriguez:
Approaches to ethical hacking: expanding conceptual frameworks for research. 21:1 - Conor Gilsenan, Noura Alomar, Andrew Huang, Serge Egelman:
Decentralized backup and recovery of TOTP secrets. 22:1-22:2 - Md. Rayhanur Rahman, William Enck, Laurie A. Williams:
Do configuration management tools make systems more secure?: an empirical research plan. 23:1-23:2 - Michael Garrett Bechtel, Heechul Yun:
Exploiting DRAM bank mapping and HugePages for effective denial-of-service attacks on shared cache in multicore. 24:1-24:2 - Ryan Gabrys, Luis Martinez, Sunny Fugate:
How to swap instructions midstream: an embedding algorithm for program steganography. 25:1-25:2 - Khir Henderson, Kevin T. Kornegay:
Improving architectures for automating network security using specification-based protocols. 26:1-26:2 - Jiani Li, Waseem Abbas, Mudassir Shabbir, Xenofon D. Koutsoukos:
Resilient multi-robot target pursuit. 27:1-27:2 - Qais Tasali, Nikesh Gyawali, Eugene Y. Vasserman:
Time series anomaly detection in medical break-the-glass. 28:1-28:2 - Nancy Mogire:
Tokens of interaction: psycho-physiological signals, a potential source of evidence of digital incidents. 29:1-29:2 - Olufogorehan Tunde-Onadele, Yuhang Lin, Jingzhu He, Xiaohui Gu:
Toward just-in-time patching for containerized applications. 30:1-30:2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.