SaTC Pi Meeting 2017

file

Visible to the public Emerging Privacy Research

Abstract: Several reports over the past year have indicated that users are increasingly concerned about their privacy, and data collection practices from both corporations and governments. Consequently, privacy enhancing technologies, ranging from communication tools (e.g., Signal, Tor) to digital currencies (e.g., Zcash), have received significant attention.

file

Visible to the public Cyber-Security and Privacy Research for U.S. Government Agencies

Abstract: Panelists will discuss their agencies' goals for and approaches to cybersecurity and privacy research. The panelists will also compare NSF-style research to research in their agencies. Examples of types of questions that the panel may address include: What's the difference in the types of research a researcher is expected to do for the different agencies? What can graduate students and faculty learn from mission-focused research beyond what one learns from curiosity-driven NSF research? What are the elements that lead to a successful proposal?

file

Visible to the public Cyber Resilience

Abstract: The term resilience has been in various uses for over 400 years and has been applied to characterize the ability of something to withstand unexpected threats, where the "something" can be an individual, a community, an object, species, an ecosystem, etc.

file

Visible to the public Conceiving and Running Center Scale Frontier Projects

Abstract: The SaTC Frontier projects are center scale efforts that provide high level visibility to grand challenge research areas in cybersecurity. These projects are collaborative, multi-university research and education activities that will help protect the nation's vast, critical infrastructure and enable a more secure information society. This session will have presentations from the following frontier projects.

file

Visible to the public Cloud Security

Abstract: There has been a dramatic transformation of IT infrastructure in the past decade with the adoption of cloud computing, where processes that used to run on-site at a company are now migrating into data centers and run on hardware shared with other customers. This migration encompasses computing, storage, and networking. Using hosted infrastructure increases the velocity of deployments, as it allows for rapid up- and down-scaling of systems. Recent advances in virtualization and the advent of software defined infrastructure have accelerated the pace of migration.

file

Visible to the public Challenges and Opportunities of Physically Unclonable Functions Research

Abstract: A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of computer hardware, which emerges due to variations in the fabrication processes. PUFs have become an important and promising hardware primitive for fingerprinting, authenticating, or storing cryptographic keys in computing devices. Research on PUFs aims to create or uncover devices or circuits that have the unique, stable, and unclonable characteristics so they can be used as PUFs.

file

Visible to the public Addressing the Diversity Gap in Cybersecurity with K-12 Outreach

Abstract: Finding novel ways to bring cyber security topics to young women and minorities serves to address a recognized national need for security education at the K-12 and undergraduate level, and begins to address the widening gap between the availability and demand for qualified and diverse security professionals. Designing security education interventions that are creative, socially relevant, and accessible to an underrepresented population in cyber security is a challenge that informs how education and outreach can be performed within other contexts.

file

Visible to the public Building Differentially Private Systems- Opportunities and Challenges

Abstract: Differential privacy has emerged as the gold standard for privacy preserving data analysis.

file

Visible to the public Acquisti Keynote

Alessandro Acquisti is a Professor of Information Technology and Public Policy at the Heinz College, Carnegie Mellon University (CMU) and an Andrew Carnegie Fellow (inaugural class). He is the director of the Peex (Privacy Economics Experiments) lab at CMU and the co-director of CMU CBDR (Center for Behavioral and Decision Research). Alessandro investigates the economics of privacy.

page

Visible to the public Program Agenda

SUNDAY, JANUARY 8, 2017

6:00 pm – 9:00 pm

Registration
Early Sign-Up for “Open” Breakout Sessions