Presentations

file

Visible to the public Keynote Presentation: Navigating Privacy Issues in A Data Driven World

ABSTRACT: As 2017 begins, are we entering a time of crisis or a time of opportunity for individual privacy?  Law enforcement demands for consumer data continue to grow and surveillance by intelligence agencies continues to drive civil liberties debates.  Online tracking for analytic

file

Visible to the public Keynote Presentation: Differential Privacy and Data Analysis

ABSTRACT: In this talk, we will give a friendly introduction to Differential Privacy, a rigorous methodology for analyzing data subject to provable privacy guarantees, that has recently been widely deployed in several settings.

file

Visible to the public Security of Cyber-Physical Systems: Challenges and Approaches

ABSTRACT: Cyber-physical systems (CPS) are used to monitor and control real-world systems, ranging from implantable life-critical medical devices to large safety-critical infrastructures.

file

Visible to the public Tutorial: System Monitoring for Security

ABSTRACT: Intrusive multi-step attacks, such as Advanced Persistent Threat (APT) attacks, have plagued many well-protected businesses with significant financial losses. These advanced attacks are sophisticated and stealthy, and can remain undetected for years as individual attack steps may not be suspicious enough. To counter these advanced attacks, a recent trend is to leverage ubiquitous system monitoring for collecting the attack provenance for a long period of time and perform attack investigation for identifying risky system behaviors.

file

Visible to the public An Approach to Incorporating Uncertainty in Network Security Analysis

ABSTRACT: Attack graphs used in network security analysis are analyzed to determine sequences of exploits that lead to successful acquisition of privileges or data at critical assets.

file

Visible to the public Learning a Privacy Incidents Database

ABSTRACT: A repository of privacy incidents is essential for understanding the attributes of products and policies that lead to privacy incidents. We describe our vision for a novel privacy incidents database and our progress toward building a prototype.

file

Visible to the public Global Variation in Attack Encounters and Hosting

ABSTRACT: Countries vary greatly in the extent to which their computers encounter and host attacks. Empirically identifying factors behind such variation can provide a sound basis for policies to reduce attacks worldwide.

file

Visible to the public Surveying Security Practice Adherence in Software Development

ABSTRACT: Software development teams are increasingly incorporating security practices in to their software development processes. However, little empirical evidence exists on the costs and benefits associated with the application of security practices.

file

Visible to the public On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach

ABSTRACT: Intrusion Detection Systems (IDSs) are crucial security mechanisms widely deployed for critical network protection. However, conventional IDSs become incompetent due to the rapid growth in network size and the sophistication of large scale attacks.

file

Visible to the public Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms

ABSTRACT: Cyber-Physical Systems (CPS) have unique properties that can be exploited to design new privacy-enhancing technologies that minimize the negative impact to the utility of CPS. In this paper we show two examples of these properties.