SaTC Pi Meeting 2017

file

Visible to the public NSF and SaTC need YOU!

Abstract: NSF relies on the scientific research and education community to guide our approach to funding. In the narrowest scope, proposal reviews by panels of researchers are essential to well-reasoned funding decisions. SaTC needs YOU to serve on proposal review panels and help us to evaluate the strengths and weaknesses of the proposals! More broadly, NSF/SaTC program directors work together to select projects to create a research funding portfolio that supports exploration across many diverse fronts in security and privacy.

file

Visible to the public Stopping 0-Days with Formal Languages

Abstract: The Internet insecurity epidemic is a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. The only path to trustworthy software that takes untrusted inputs is treating all valid or expected inputs as a formal language, and the respective input-handling routines as a recognizer for that language.

file

Visible to the public Transition to Practice (TTP) Bootcamp

Abstract: Every PI would like to see their research make an impact in the real world. Although funding Transition to Practice (TTP)-worthy projects remains a Federal cybersecurity priority across multiple funding agencies, many PI's are unclear about the logistics and means by which to transition their research into an operational cybersecurity context. Transitioning research doesn't always equate to leaving academia to form a start-up company.

file

Visible to the public Semantics-Aware Security Research

Abstract: The pervasiveness of human-generated text data presents a unique opportunity for security researchers to better understand, and effectively defend against emerging threats. For instance, tweets, technical posts, white papers and research articles in the public domain are a gold mine for collecting valuable Cyber threat Intelligence.

file

Visible to the public Security of Cyber-Physical Systems

Abstract: Cyber-Physical Systems (CPS) are yielding novel problems and solutions for security researchers. CPSs connect computerized controllers and human supervisors with physical systems used in the energy, transportation, water, manufacturing, and other sectors. Recent attacks against CPS have prompted unprecedented investigation into new threats and mitigations against CPSs. Modern CPSs are founded on control theory, real-time systems, and obscure, often ad-hoc programming practices.

file

Visible to the public Secure Computation Progress, Methods, Challenges, and Open Questions

Abstract: Over the past decade, there has been remarkable progress in using cryptography to enable verifiable and privacy-preserving multi-party computation. The goal of this breakout is to assess the current state-of-the-art and reach consensus on what problems have largely been solved, what problems are ripe for solutions within the next year or two, and what long-term challenges remain.

file

Visible to the public SaTC Frontier Projects I

Abstract: The SaTC Frontier projects are center scale efforts that provide high level visibility to grand challenge research areas in cybersecurity. These projects are collaborative, multi-university research and education activities that will help protect the nation's vast, critical infrastructure and enable a more secure information society. This session will have presentations from the following frontier projects.