Science of Security Lablet Quarterly Meeting (NCSU)
Quarterly SoS Meeting at NC State
The Science of Security Quarterly Meeting at NC State University was held on Tuesday, January 27 and Wednesday, January 28, 2015.
The meeting was held in the Duke Energy Hall (DEH) on the 2nd floor of the James B. Hunt Jr. Library on the NC State Centennial Campus.
Meeting Agenda
Tuesday, January 27 |
||
12:00 - 12:30 pm | DEH Room C/D |
Lunch |
12:30 - 1:00 pm | DEH Room A | NSA Update- Stuart Krohn - Building a Science of Security: What's New and Interesting Stephanie Askins-Yannacci - Science of Security Quarterly Update |
1:00 - 2:00 pm | DEH Room A | Keynote - Pete Loscocco Integrity Measurement: The Way Ahead, Knowing if your Systems Have Been Altered |
2:00 - 2:15 pm | Break | |
2:15 - 4:00 pm | DEH Room B | Business Managers Financial Meeting - Stephanie Yannacci |
2:15 - 2:45 pm | DEH Room A | CMU Research Update presentation I - Hanan Hibshi Assessment of Security Risk Perception in Composable Systems |
2:45 - 3:15 pm | DEH Room A | Illinois Research Update presentation I - Ravi Iyer Preemptive Intrusion Detection: Theoretical Framework and Real World Measurements |
3:15 - 3:45 pm | DEH Room A | Maryland Research Update presentation I - Poorvi Vora Protocols With Human Participants: Remote Voting |
3:45 - 4:00 pm | Break | |
4:00 - 4:30 pm | DEH Room B | CPS-VO Presentation and Q & A Session - Heather Lucas |
4:00 - 4:30 pm | DEH Room A | NCSU Research Update presentation I - William Enck Systematizing Isolation Techniques |
4:30 - 5:00 pm | DEH Room A | CMU Research Update presentation II - Christian Kästner Analyzing Highly Configurable Systems |
5:00 - 6:00 pm | DEH Room A | Closed PI Session |
Wednesday, January 28 |
||
8:00 - 9:00 am | DEH Room C/D | Breakfast |
9:00 - 9:30 am | DEH Room A | Best Scientific Cybersecurity Paper Competition - Stuart Krohn |
9:30 - 10:00 am | DEH Room A | Lindsey McGowen Customized Bibliometrics for Evaluating Computer Science Research |
10:00 - 10:15 am | Break | |
10:15 am - noon | DEH Rooms A & B | Workshop, Jeff Carver Hard Problems: Analysis of Research Methods |
Noon - 1:30 pm | DEH Room C/D | Lunch |
12:15 - 1:30 pm | DEH Room B | Poster Session |
1:30 - 2:00 pm | DEH Room A | Illinois Research Update presentation II - Matt Caesar Hypothesis Testing for Network Security |
2:00 - 2:30 pm | DEH Room A | Maryland Research Update presentation II - Peixin Gao Trust-Aware Social Recommender System Design |
2:30 - 3:00 pm | DEH Room A | NCSU Research Update presentation II - Ehab Al-Shaer On Objective Resiliency Analysis of Smart Grid Energy Management Systems |
Thursday, January 29 |
||
9:00 am - 3:00 pm | 3300 Engineering Building II | PI Annual Report work session |
Travel to NCSU Centennial Campus
Centennial Campus Visitors
Hotel Accomodations
- DoubleTree Hilton Brownstone-University
- Embassy Suites Cary
- Sheraton Raleigh Downtown
Directions to the James B. Hunt, Jr. Library
1070 Partners Way (Google Maps link)
Parking
Parking permits are available for purchase at the Centennial Campus Parking Booth on Varsity Drive on the NC State Centennial Campus. Permits are $5 per day, and you can purchase a multi-day permit to cover your time at NC State. Note: only credit/debit card payments (Master Card, Visa, Discover and American Express) are accepted - no cash. The booth is attended 7:00 am - 3:30 pm.
When you purchase your permit, please be sure to tell the attendant that you are attending an event at the Hunt Library and ask for directions to the nearest available lot/deck (large special events sometimes reserve space, but the attendant will know and direct you appropriately). There are several parking decks & lots within a 5 minute (or less) walk to the Hunt Library.
The Hunt Library is near the bottom center of the map. Click on "Parking - NCSU Deck" and "Parking - NCSU Parking Lot" to highlight parking on Centennial Campus.
Wireless Network Information
NCSU Guest Wireless Information
Questions
- If you have any questions about the technical portion of the meetings, please contact Laurie Williams (williams@csc.ncsu.edu) or Munindar Singh (mpsingh@ncsu.edu).
- If you have any questions regarding logistics, please contact David Wright (david_wright@ncsu.edu).
Posters
Presenter | Co-Authors | Poster Title | Project |
Vaira Selvakani | Rada Chirkova Nirav Ajmeri Jon Doyle Jiaming Jiang Munindar Singh |
Formal Specification and Analysis of Security - Critical Norms and Policies | Formal Specification and Analysis of Security- Critical Norms and Policies |
Alok Goel | Modeling Human Behavior from Low-Level Input Analytics | Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security | |
Manish Singh | Emerson Murphy-Hill | Complexity of Policy Specifications for Software Developers | Scientific Understanding of Policy Complexity |
Maria Riaz | Laurie Williams | Reasoning about security requirements. | Formal Specification and Analysis of Security- Critical Norms and Policies |
Olga Zielinska | Allaire Welk Christopher Mayhorn Emerson Murphy-Hill |
Are You a Big Phish or a Small Potato? Analyzing Mental Models of Phishing. | Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability |
Donghoon Kim | Mladen Vouk | Securing Scientific Workflows with a Security Analytics Platform (SAP) for the Cloud | Systematization of Knowledge from Intrusion Detection Models |
Xianqing Yu | Peng Ning Mladen Vouk |
Securing Hadoop in Cloud | Smart Isolation in Large-Scale Production Computing Infrastructures |
Anoosha Vangaveeti | Mladen Vouk | An assessment of security problems in open source software. | Resilience Requirements, Design, and Testing |
Da Young Lee | Mladen Vouk Laurie Williams |
Using Software Reliability Models for Security Assessment | Vulnerability and Resilience Prediction Models |
Jason King | Logging Mechanism Metrics for Forensics | Attack Surface and Defense-in-Depth Metrics | |
Yufan Huang | Xiaofan He Huaiyu Dai |
Systematization of metrics in intrusion detection systems | Systematization of Knowledge from Intrusion Detection Models |
Rahul Pandita | Patrick Morrison | Orthogonal Vulnerability Classification | Vulnerability and Resilience Prediction Models |
Hongying Du | Bennett Narron Nirav Ajmeri Munindar P. Singh Jon Doyle Emily Berglund |
Understanding Sanction under Variable Observability in a Secure, Collaborative Environment | Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems |
Victor Heorhiadi | Mike Reiter | SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading | Automated Synthesis of Resilient Architectures |
Katie Dey | Chris vanBuskirk | Science of Security Virtual Organization | |
William Emfinger | Gabor Karsai | Network Analysis Paradigm for Detecting and Mitigating Attacks from Malicious Actors |