skip to main content
10.1145/2746194acmotherconferencesBook PagePublication PageshotsosConference Proceedingsconference-collections
HotSoS '15: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security
ACM2015 Proceeding
  • General Chair:
  • David Nicol
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
HotSoS '15: Symposium and Bootcamp on the Science of Security Urbana Illinois April 21 - 22, 2015
ISBN:
978-1-4503-3376-4
Published:
21 April 2015
Sponsors:
US Army Research Office, NSF, University of Illinois at Urbana-Champaign, National Security Agency

Bibliometrics
Skip Abstract Section
Abstract

The Symposium and Bootcamp on the Science of Security (HotSoS), is a research event centered on the Science of Security (SoS). HotSoS 2015 follows on the heels of HotSoS 2014, establishing what we expect will be an annual pattern for bringing together researchers in the Science of Security.

The motivation behind the study of the Science of Security is to focus on systems' security properties as fist-class objects of study. The challenges are in defining those properties precisely within some kind of modeling framework, prove theorems about those properties and how they are achieved, identify metrics and means of empirically gathering, estimating, and/or inferring them in an experimental context, design effective experiments to gather those metrics and make statistically significant inferences about them, and close the loop by validating the abstract models with experiments.

Skip Table Of Content Section
research-article
Integrity assurance in resource-bounded systems through stochastic message authentication

Assuring communication integrity is a central problem in security. However, overhead costs associated with cryptographic primitives used towards this end introduce significant practical implementation challenges for resource-bounded systems, such as ...

research-article
Active cyber defense dynamics exhibiting rich phenomena

The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In ...

research-article
Open Access
Towards a science of trust

The diverse views of science of security have opened up several alleys towards applying the methods of science to security. We pursue a different kind of connection between science and security. This paper explores the idea that security is not just a ...

research-article
Challenges with applying vulnerability prediction models

Vulnerability prediction models (VPM) are believed to hold promise for providing software engineers guidance on where to prioritize precious verification resources to search for vulnerabilities. However, while Microsoft product teams have adopted defect ...

research-article
Preemptive intrusion detection: theoretical framework and real-world measurements

This paper presents a Factor Graph based framework called AttackTagger for highly accurate and preemptive detection of attacks, i.e., before the system misuse. We use security logs on real incidents that occurred over a six-year period at the National ...

research-article
Enabling forensics by proposing heuristics to identify mandatory log events

Software engineers often implement logging mechanisms to debug software and diagnose faults. As modern software manages increasingly sensitive data, logging mechanisms also need to capture detailed traces of user activity to enable forensics and hold ...

research-article
Modelling user availability in workflow resiliency analysis

Workflows capture complex operational processes and include security constraints limiting which users can perform which tasks. An improper security policy may prevent certain tasks being assigned and may force a policy violation. Deciding whether a ...

research-article
Open Access
An empirical study of global malware encounters

The number of trojans, worms, and viruses that computers encounter varies greatly across countries. Empirically identifying factors behind such variation can provide a scientific empirical basis to policy actions to reduce malware encounters in the most ...

research-article
An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes

As cyber-attacks become more sophisticated, cyber-attack analysts are required to process large amounts of network data and to reason under uncertainty with the aim of detecting cyber-attacks. Capturing and studying the fine-grained analysts' cognitive ...

research-article
All signals go: investigating how individual differences affect performance on a medical diagnosis task designed to parallel a signals intelligence analyst task

Signals intelligence analysts play a critical role in the United States government by providing essential information regarding potential threats to national security to government leaders. Analysts perform complex decision-making tasks that involve ...

research-article
Detecting abnormal user behavior through pattern-mining input device analytics
Article No.: 11, pp 1–13https://doi.org/10.1145/2746194.2746205

This paper presents a method for detecting patterns in the usage of a computer mouse that can give insights into user's cognitive processes. We conducted a study using a computer version of the Memory game (also known as the Concentration game) that ...

research-article
Understanding sanction under variable observability in a secure, collaborative environment
Article No.: 12, pp 1–10https://doi.org/10.1145/2746194.2746206

Norms are a promising basis for governance in secure, collaborative environments---systems in which multiple principals interact. Yet, many aspects of norm-governance remain poorly understood, inhibiting adoption in real-life collaborative systems. This ...

research-article
Measuring the security impacts of password policies using cognitive behavioral agent-based modeling

Agent-based modeling can serve as a valuable asset to security personnel who wish to better understand the security landscape within their organization, especially as it relates to user behavior and circumvention. In this paper, we argue in favor of ...

poster
Effectiveness of a phishing warning in field settings

We have begun to investigate the effectiveness of a phishing warning Chrome extension in a field setting of everyday computer use. A preliminary experiment has been conducted in which participants installed and used the extension. They were required to ...

poster
An architecture style for Android security analysis: poster

Modern frameworks are required to be extendable as well as secure. However, these two qualities are often at odds. In this poster we describe an approach that uses a combination of static analysis and run-time management, based on software architecture ...

poster
PREDICT: an important resource for the science of security

The Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT) was established by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) to provide real network operational data and to provide a ...

poster
Characterizing complexity of highly-configurable systems with variational call graphs: analyzing configuration options interactions complexity in function calls

Security has consistently been the focus of attention in many highly-configurable software systems. Several vulnerabilities on widely-used systems, such as the Linux kernel and OpenSSL, are reported every day in the National Vulnerability Database (NVD)...

poster
Towards quantification of firewall policy complexity

Developing metrics for quantifying the security and usability aspects of a system has been of constant interest to the cybersecurity research community. Such metrics have the potential to provide valuable insight on security and usability of a system ...

poster
Packer classifier based on PE header information

Run-time binary packers are used in malware manufacturing to obfuscate the contents of the executable files. Such packing has proved an obstacle for antivirus software that relies on signatures, as the binary contents of packed malware often bears no ...

poster
Detecting insider threats in software systems using graph models of behavioral paths

Insider threats are a well-known problem, and previous studies have shown that it has a huge impact over a wide range of sectors like financial services, governments, critical infrastructure services and the telecommunications sector. Users, while ...

poster
Quantitative security metrics with human in the loop

The human factor is often regarded as the weakest link in cybersecurity systems. The investigation of several security breaches reveals an important impact of human errors in exhibiting security vulnerabilities. Although security researchers have long ...

poster
Exploring expert and novice mental models of phishing

Mental models are internal representations of a concept or system that develop with experience. By rating pairs of concepts on the strength of their relationship, networks can be created showing an in-depth analysis of how information is organized. We ...

poster
Building a security practices evaluation framework

Software development teams need guidance on choosing security practices so they can develop code securely. The academic and practitioner literature on software development security practices is large, and expanding. However, published empirical evidence ...

poster
Towards an unified security testbed and security analytics framework

This paper presents the architecture of an end-to-end security testbed and security analytics framework, which aims to: i) understand real-world exploitation of known security vulnerabilities and ii) preemptively detect multi-stage attacks, i.e., before ...

poster
Mismorphism: a semiotic model of computer security circumvention (poster abstract)

In real world domains, from healthcare to power to finance, we deploy computer systems intended to streamline and improve the activities of human agents in the corresponding non-cyber worlds. However, talking to actual users (instead of just computer ...

poster
Gamifying software security education and training via secure coding duels in code hunt

Sophistication and flexibility of software development make it easy to leave security vulnerabilities in software applications for attackers. It is critical to educate and train software engineers to avoid introducing vulnerabilities in software ...

poster
Systematization of metrics in intrusion detection systems

Intrusion detection assumes paramount importance in this information era due to its capability of providing security protection to information systems. In addition to advancing the specific intrusion detection techniques, substantial efforts have been ...

poster
Optimisation of data collection strategies for model-based evaluation and decision-making: poster

Probabilistic and stochastic models are routinely used in performance, dependability and, more recently, security evaluation. Determining appropriate values for model parameters is a long-standing problem in the practical use of such models. With the ...

Contributors
  • University of Illinois Urbana-Champaign
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

HotSoS '15 Paper Acceptance Rate13of22submissions,59%Overall Acceptance Rate34of60submissions,57%
YearSubmittedAcceptedRate
HoTSoS17953%
HotSoS '15221359%
HotSoS '14211257%
Overall603457%