Export Citations
The 4th Annual Hot Topics in the Science of Security (HoTSoS) Symposium and Bootcamp was held April 4-5, 2017 in Hanover, Maryland. It included a mix of invited talks, tutorials, presentations of refereed papers, a panel, and a poster session.
Proceeding Downloads
Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms
Cyber-Physical Systems (CPS) have unique properties that can be exploited to design new privacy-enhancing technologies that minimize the negative impact to the utility of CPS. In this paper we show two examples of these properties.
The first example ...
Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers
- Morgan Burcham,
- Mahran Al-Zyoud,
- Jeffrey C. Carver,
- Mohammed Alsaleh,
- Hongying Du,
- Fida Gilani,
- Jun Jiang,
- Akond Rahman,
- Özgür Kafalı,
- Ehab Al-Shaer,
- Laurie Williams
Scientific advancement is fueled by solid fundamental research, followed by replication, meta-analysis, and theory building. To support such advancement, researchers and government agencies have been working towards a "science of security". As in other ...
Optimal Security Investments in a Prevention and Detection Game
Most security defenses can be breached by motivated adversaries, therefore in addition to attack-prevention technologies, firms investing in cyber-security for their information technology infrastructure need to consider attack-detection and restoration ...
Learning a Privacy Incidents Database
A repository of privacy incidents is essential for understanding the attributes of products and policies that lead to privacy incidents. We describe our vision for a novel privacy incidents database and our progress toward building a prototype. Key ...
On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach
Intrusion Detection Systems (IDSs) are crucial security mechanisms widely deployed for critical network protection. However, conventional IDSs become incompetent due to the rapid growth in network size and the sophistication of large scale attacks. To ...
Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment
The current approach to protect users from phishing attacks is to display a warning when the webpage is considered suspicious. We hypothesize that users are capable of making correct informed decisions when the warning also conveys the reasons why it is ...
Global Variation in Attack Encounters and Hosting
Countries vary greatly in the extent to which their computers encounter and host attacks. Empirically identifying factors behind such variation can provide a sound basis for policies to reduce attacks worldwide. However, the main current approach to ...
An Approach to Incorporating Uncertainty in Network Security Analysis
Attack graphs used in network security analysis are analyzed to determine sequences of exploits that lead to successful acquisition of privileges or data at critical assets. An attack graph edge corresponds to a vulnerability, tacitly assuming a ...
Surveying Security Practice Adherence in Software Development
Software development teams are increasingly incorporating security practices in to their software development processes. However, little empirical evidence exists on the costs and benefits associated with the application of security practices. Balancing ...
Index Terms
- Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
HoTSoS | 17 | 9 | 53% |
HotSoS '15 | 22 | 13 | 59% |
HotSoS '14 | 21 | 12 | 57% |
Overall | 60 | 34 | 57% |