Presentations

file

Visible to the public What Can Programming Languages and Cryptography do for Security?

Abstract: Research in programming languages and cryptography both emphasize formal and compositional security and are both cornerstones in the science of cybersecurity. We aim to discuss how joint work in these communities can help improve the way we construct secure systems and the way we prove them secure. We plan to discuss questions such as:

file

Visible to the public Innovation and Impact in Cyber Security

Farnam Jahanian serves as Provost and Chief Academic Officer at Carnegie Mellon University. Prior to CMU, Jahanian led the National Science Foundation Directorate for the Computer and Information Science and Engineering (CISE) from 2011 to 2014. With the annual budget of over $900 million, he was responsible for directing CISE's research programs and cyber infrastructure initiatives.

file

Visible to the public Panel: Machine Learning and Security

Abstract: Machine learning (ML) techniques have been used in cyber-security {\em research} for over twenty years, e.g., to detect malware using network, OS, and hardware-level signals.

file

Visible to the public Formal Approaches to Security-Turing wins the game?

Abstract: For this breakout session we will discuss the long-term goal of defensive deterrence (in the Federal Cybersecurity R&D Strategic Plan), focusing on the following challenges:

file

Visible to the public Felten Keynote

No Slides Presented

file

Visible to the public Federal Cybersecurity and Privacy R&D Strategic Plans-Priorities for Research

Abstract: Federal Government representatives will discuss the needs and priorities for federally funded research in cybersecurity and privacy.

file

Visible to the public Exploitable Bugs in Hardware Designs

Abstract: As hardware designs have gotten larger and more complex, there are more security-critical vulnerabilities arising from incomplete and erroneous specifications, buggy designs and hidden and unexpected interactions between components. This breakout will look at the science of anticipating, measuring and counter-acting the effects of vulnerabilities resulting from hardware design and specification errors.

file

Visible to the public Emerging Privacy Research

Abstract: Several reports over the past year have indicated that users are increasingly concerned about their privacy, and data collection practices from both corporations and governments. Consequently, privacy enhancing technologies, ranging from communication tools (e.g., Signal, Tor) to digital currencies (e.g., Zcash), have received significant attention.

file

Visible to the public Cyber Resilience

Abstract: The term resilience has been in various uses for over 400 years and has been applied to characterize the ability of something to withstand unexpected threats, where the "something" can be an individual, a community, an object, species, an ecosystem, etc.

file

Visible to the public Cyber-Security and Privacy Research for U.S. Government Agencies

Abstract: Panelists will discuss their agencies' goals for and approaches to cybersecurity and privacy research. The panelists will also compare NSF-style research to research in their agencies. Examples of types of questions that the panel may address include: What's the difference in the types of research a researcher is expected to do for the different agencies? What can graduate students and faculty learn from mission-focused research beyond what one learns from curiosity-driven NSF research? What are the elements that lead to a successful proposal?