Abstract: Several reports over the past year have indicated that users are increasingly concerned about their privacy, and data collection practices from both corporations and governments. Consequently, privacy enhancing technologies, ranging from communication tools (e.g., Signal, Tor) to digital currencies (e.g., Zcash), have received significant attention.
Abstract: Panelists will discuss their agencies' goals for and approaches to cybersecurity and privacy research. The panelists will also compare NSF-style research to research in their agencies. Examples of types of questions that the panel may address include: What's the difference in the types of research a researcher is expected to do for the different agencies? What can graduate students and faculty learn from mission-focused research beyond what one learns from curiosity-driven NSF research? What are the elements that lead to a successful proposal?
Abstract: The term resilience has been in various uses for over 400 years and has been applied to characterize the ability of something to withstand unexpected threats, where the "something" can be an individual, a community, an object, species, an ecosystem, etc.
Abstract: The SaTC Frontier projects are center scale efforts that provide high level visibility to grand challenge research areas in cybersecurity. These projects are collaborative, multi-university research and education activities that will help protect the nation's vast, critical infrastructure and enable a more secure information society. This session will have presentations from the following frontier projects.
Abstract: There has been a dramatic transformation of IT infrastructure in the past decade with the adoption of cloud computing, where processes that used to run on-site at a company are now migrating into data centers and run on hardware shared with other customers. This migration encompasses computing, storage, and networking. Using hosted infrastructure increases the velocity of deployments, as it allows for rapid up- and down-scaling of systems. Recent advances in virtualization and the advent of software defined infrastructure have accelerated the pace of migration.
Abstract: A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of computer hardware, which emerges due to variations in the fabrication processes. PUFs have become an important and promising hardware primitive for fingerprinting, authenticating, or storing cryptographic keys in computing devices. Research on PUFs aims to create or uncover devices or circuits that have the unique, stable, and unclonable characteristics so they can be used as PUFs.
Abstract: Finding novel ways to bring cyber security topics to young women and minorities serves to address a recognized national need for security education at the K-12 and undergraduate level, and begins to address the widening gap between the availability and demand for qualified and diverse security professionals. Designing security education interventions that are creative, socially relevant, and accessible to an underrepresented population in cyber security is a challenge that informs how education and outreach can be performed within other contexts.
Alessandro Acquisti is a Professor of Information Technology and Public Policy at the Heinz College, Carnegie Mellon University (CMU) and an Andrew Carnegie Fellow (inaugural class). He is the director of the Peex (Privacy Economics Experiments) lab at CMU and the co-director of CMU CBDR (Center for Behavioral and Decision Research). Alessandro investigates the economics of privacy.