Presentations

file

Visible to the public Opening Remarks - Day 3

file

Visible to the public Cyber Security R&D Challenges

file

Visible to the public Patrick McDaniel - Day One - Opening

file

Visible to the public Jim Kurose Welcome Day 1

file

Visible to the public Modular Approach to Cloud Security (MACS)

file

Visible to the public Toward More Secure and Trustworthy Cyberspace

file

Visible to the public NSF and SaTC need YOU!

Abstract: NSF relies on the scientific research and education community to guide our approach to funding. In the narrowest scope, proposal reviews by panels of researchers are essential to well-reasoned funding decisions. SaTC needs YOU to serve on proposal review panels and help us to evaluate the strengths and weaknesses of the proposals! More broadly, NSF/SaTC program directors work together to select projects to create a research funding portfolio that supports exploration across many diverse fronts in security and privacy.

file

Visible to the public Stopping 0-Days with Formal Languages

Abstract: The Internet insecurity epidemic is a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. The only path to trustworthy software that takes untrusted inputs is treating all valid or expected inputs as a formal language, and the respective input-handling routines as a recognizer for that language.

file

Visible to the public Transition to Practice (TTP) Bootcamp

Abstract: Every PI would like to see their research make an impact in the real world. Although funding Transition to Practice (TTP)-worthy projects remains a Federal cybersecurity priority across multiple funding agencies, many PI's are unclear about the logistics and means by which to transition their research into an operational cybersecurity context. Transitioning research doesn't always equate to leaving academia to form a start-up company.