Posters

file

Visible to the public TRACTION: An Infrastructure For TRusted Alert Sharing And Collaborative MitigaTION

BIO

Keywhan Chung is a Ph.D. candidate at the University of Illinois with Professor Ravishankar Iyer and Professor Kalbarczyk. He received a B.S. degree in computer engineering from Purdue University and an M.S. degree in computer engineering from the University of Illinois. As a member of the DEPEND research group, his research focuses on developing efficient measures toward secure and reliable computer systems. His current work includes looking towards potential advanced threats such as indirect or smart attacks.

file

Visible to the public Design For An Educational Cyber Range

ABSTRACT

The "Cyber Range" concept has arisen as a method for organizations to provide realistic training in penetration testing and incident response. These ranges typically utilize virtualization to reduce cost and allow for rapid reconfiguration. However, most management software is expensive or difficult to install. This paper presents a management application using open-source software with the intent of allowing educators to rapidly create virtual ranges at minimal cost.

BIO

file

Visible to the public Measures And Metrics For The Enforcement Of Critical Security Controls: A Case Study Of Boundary Defense

ABSTRACT

The center for internet security [3] publishes a set of defense actions which forms a set of defense in depth best practices known as critical security control(CSC) to detect, prevent, respond, and mitigate the cyber attacks against cyber systems and networks. However, no well defined automated measures and metrics are developed to validate the enforcement of these CSCs. Additionally, it is infeasible to directly analyze implementation of security products to verify and validate the enforcement of CSCs in those security products.

file

Visible to the public ThreatZOOM: Neural Network For Automated Vulnerability Mitigation

ABSTRACT

Increasing the variety and quantity of cyber threats becoming the evident that traditional human-in-loop approaches are no longer sufficient to keep systems safe. To address this momentous moot point, forward-thinking pioneers propose new cyber security strategy using automation to build a more efficient and cheaper defense.

file

Visible to the public A Synopsis Of Static Analysis Alerts On Open Source Software

BIO

file

Visible to the public A Bird's Eye View of Knowledge Needs Related to Penetration Testing

BIO