skip to main content
10.1145/3055305acmotherconferencesBook PagePublication PageshotsosConference Proceedingsconference-collections
HoTSoS: Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
HoTSoS '17: Symposium and Bootcamp Hanover MD USA April 4 - 5, 2017
ISBN:
978-1-4503-5274-1
Published:
04 April 2017
In-Cooperation:
National Security Agency, Vanderbilt University, University of Maryland
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 02 Mar 2025Bibliometrics
Skip Abstract Section
Abstract

The 4th Annual Hot Topics in the Science of Security (HoTSoS) Symposium and Bootcamp was held April 4-5, 2017 in Hanover, Maryland. It included a mix of invited talks, tutorials, presentations of refereed papers, a panel, and a poster session.

Skip Table Of Content Section
research-article
Public Access
Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms

Cyber-Physical Systems (CPS) have unique properties that can be exploited to design new privacy-enhancing technologies that minimize the negative impact to the utility of CPS. In this paper we show two examples of these properties.

The first example ...

research-article
Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers

Scientific advancement is fueled by solid fundamental research, followed by replication, meta-analysis, and theory building. To support such advancement, researchers and government agencies have been working towards a "science of security". As in other ...

research-article
Public Access
Optimal Security Investments in a Prevention and Detection Game

Most security defenses can be breached by motivated adversaries, therefore in addition to attack-prevention technologies, firms investing in cyber-security for their information technology infrastructure need to consider attack-detection and restoration ...

research-article
Public Access
Learning a Privacy Incidents Database

A repository of privacy incidents is essential for understanding the attributes of products and policies that lead to privacy incidents. We describe our vision for a novel privacy incidents database and our progress toward building a prototype. Key ...

research-article
Public Access
On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach

Intrusion Detection Systems (IDSs) are crucial security mechanisms widely deployed for critical network protection. However, conventional IDSs become incompetent due to the rapid growth in network size and the sophistication of large scale attacks. To ...

research-article
Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment

The current approach to protect users from phishing attacks is to display a warning when the webpage is considered suspicious. We hypothesize that users are capable of making correct informed decisions when the warning also conveys the reasons why it is ...

research-article
Public Access
Global Variation in Attack Encounters and Hosting

Countries vary greatly in the extent to which their computers encounter and host attacks. Empirically identifying factors behind such variation can provide a sound basis for policies to reduce attacks worldwide. However, the main current approach to ...

research-article
An Approach to Incorporating Uncertainty in Network Security Analysis

Attack graphs used in network security analysis are analyzed to determine sequences of exploits that lead to successful acquisition of privileges or data at critical assets. An attack graph edge corresponds to a vulnerability, tacitly assuming a ...

research-article
Surveying Security Practice Adherence in Software Development

Software development teams are increasingly incorporating security practices in to their software development processes. However, little empirical evidence exists on the costs and benefits associated with the application of security practices. Balancing ...

Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

HoTSoS Paper Acceptance Rate 9 of 17 submissions, 53%;
Overall Acceptance Rate 34 of 60 submissions, 57%
YearSubmittedAcceptedRate
HoTSoS17953%
HotSoS '15221359%
HotSoS '14211257%
Overall603457%