SaTC Pi Meeting 2017

file

Visible to the public SaTC Frontier Projects II

Abstract: The SaTC Frontier projects are center scale efforts that provide high-level visibility to grand challenge research areas in cybersecurity. These projects are collaborative, multi-university research and education activities that will help protect the nation's vast, critical infrastructure and enable a more secure informationsociety. This session will have presentations from the following frontier projects.

file

Visible to the public Safe-Guarding Runtime Monitors

Abstract: The system security community has proposed a plethora of defense mechanisms that protect programs in the presence of vulnerabilities. Runtime monitors (e.g., CFI, CPI, ASLR, stack canaries, DEP, or diversity) detect security violations (e.g., control-flow hijacking, data corruption, or memory corruption) and terminate the process. Runtime monitors must be implemented efficiently for wide-spread adoption but their runtime data must be protected against adversarial access.

file

Visible to the public Psycho-Social Aspects of Cyber-Security- Why is Human (Still) the Weakest Link?

Abstract: Why people fall victims of cyber attacks? and how attackers manage to deceive their victims? We will focus our discussion on addressing these questions but not from a technical point of view, but form a cognitive and social science perspective. The lead will introduce the importance of accounting for human's cognitive and social aspects in the design of solutions for cyber defense.

file

Visible to the public What Can Programming Languages and Cryptography do for Security?

Abstract: Research in programming languages and cryptography both emphasize formal and compositional security and are both cornerstones in the science of cybersecurity. We aim to discuss how joint work in these communities can help improve the way we construct secure systems and the way we prove them secure. We plan to discuss questions such as:

file

Visible to the public Panel: Machine Learning and Security

Abstract: Machine learning (ML) techniques have been used in cyber-security {\em research} for over twenty years, e.g., to detect malware using network, OS, and hardware-level signals.

file

Visible to the public Innovation and Impact in Cyber Security

Farnam Jahanian serves as Provost and Chief Academic Officer at Carnegie Mellon University. Prior to CMU, Jahanian led the National Science Foundation Directorate for the Computer and Information Science and Engineering (CISE) from 2011 to 2014. With the annual budget of over $900 million, he was responsible for directing CISE's research programs and cyber infrastructure initiatives.

file

Visible to the public Formal Approaches to Security-Turing wins the game?

Abstract: For this breakout session we will discuss the long-term goal of defensive deterrence (in the Federal Cybersecurity R&D Strategic Plan), focusing on the following challenges:

file

Visible to the public Felten Keynote

No Slides Presented

file

Visible to the public Federal Cybersecurity and Privacy R&D Strategic Plans-Priorities for Research

Abstract: Federal Government representatives will discuss the needs and priorities for federally funded research in cybersecurity and privacy.

file

Visible to the public Exploitable Bugs in Hardware Designs

Abstract: As hardware designs have gotten larger and more complex, there are more security-critical vulnerabilities arising from incomplete and erroneous specifications, buggy designs and hidden and unexpected interactions between components. This breakout will look at the science of anticipating, measuring and counter-acting the effects of vulnerabilities resulting from hardware design and specification errors.