NSRC Industry Day 2008 was held on 7-8 October, 2008.
Monday, October 6
• 6:30 PM – 8:00 PM : Reception, Nittany Lion Inn
Tuesday, October 7
HUB Auditorium :
• 8:30 AM : Breakfast & Registration
• 8:50 AM : Introductions, Tom La Porta, Director, NSRC
• 9:00 AM – 10:00 AM : Keynote, Greg Cirincione, Army Research Lab
Greg Cirincione is a senior engineer at the Army Research Laboratory, Adelphi, Maryland, where he leads secure MANET networking efforts. He is Program Leader for the International Technology Alliance (ITA) in Network and Information Sciences and is co-leader for Security Across a System-of-Systems technical area within the ITA. He is the Cooperative Agreement Manager for the Communications and Networks Collaborative Technology Alliance. His research interests are in the areas of policy-based security management, energy-efficient key management, and intrusion detection for mobile ad hoc and sensor networks.
Title:
- New Challenges for Secure Networking in Coalition Environments
• 10:00 AM – 10:30 AM : Overview of the Applied Research Lab at Penn State, Allan Sonsteby
• 10:30 AM – 11:00 AM : Break
• 11:00 AM – 11:30 AM : Overview of the Networking and Security Research Center, Tom La Porta
• 11:30 AM – 12:30 PM : Keynote, Steven R. Chabinsky, Deputy Director, Joint Interagency Cyber Task Force Office of the Director of National Intelligence
Steven Chabinsky currently serves on joint duty assignment as Deputy Director of the Joint Interagency Cyber Task Force, Office of the Director of National Intelligence. In this capacity, Mr. Chabinsky assists the Director of National Intelligence in fulfilling his obligation to coordinate, monitor, and provide recommendations to the President regarding implementation of the President’s Comprehensive National Cyber Security Initiative (CNCI). The CNCI is contained within National Security Presidential Directive 54/Homeland Security Presidential Directive 23. Mr. Chabinsky’s home agency is the Federal Bureau of Investigation, where he holds the position of Chief of the Cyber Intelligence Section, responsible for leading the FBI’s analysis and reporting on terrorism, foreign intelligence, and criminal matters having a cyber threat nexus.
Title:
- Thinking About Risk in a NetCentric Environment
2nd Floor Atrium and 344B, IST Building :
• 12:30 PM – 3:30 PM : Lunch, Posters, Demos
333 IST Building :
• 3:30 PM – 4:00 PM : Center Discussion, Tom La Porta
Cybertorium, IST Building :
• 4:00 PM – 4:45 PM : Secure Electronic Voting, Prof. Patrick McDaniel, Co-Director, SIIS Lab
6:30 PM : Dinner at The Tavern
Wednesday, October 8
333 IST Building :
• 9:00 AM – 1:00 PM (with lunch) : Individual Research Talks
- Trent Jaeger – CSE
- Adam Smith – CSE
- Guohong Cao – CSE
- Sencun Zhu – CSE/IST
- Jun Shu – Smeal College of Business
- James Nemes – Great Valley
- Eileen Kane – Dickinson Law School
- Gerry Michaud (Clip 1 Clip 2) – ARL
Demos
- Rootkit Resistant Disks – Kevin Butler, Stephen McLaughlin, Patrick McDaniel (sponsored by NSF and Seagate)
- Automated Cellphone Application Certification in Android (or) Mitigating Phone Software Misuse Before It Happens – William Enck, Machigar Ongtang, Patrick McDaniel (supported by NSF)
- Mobile Phone System Integrity – Divya Muthukumaran, Joshua Schiffman, Anuj Sawani, Mohamed Hassan, Vikhyath Rao, Trent Jaeger (sponsored by NSF and Samsung)
- Inventory Tracking with Mobile RFID Readers – Michael Lin, Tim Bolbrock, Qinghua Li, Hosam Rowaihy, Guohong Cao, Thomas La Porta (sponsored by The Technology Collaborative)
Posters
- CDMA2000-WiMAX Interworking – Michael Lin, Heesook Choi, Thomas La Porta (supported by Sprint)
- Bringing Down the HLR – Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, Thomas La Porta (supported by Sprint)
- Verifying Virtual Machine Integrity by Proxy – Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, Patrick McDaniel (sponsored by NSF and IBM Research)
- Scalable Asynchronous Web Content Attestation – Thomas Moyer, Kevin Butler, Patrick McDaniel, Josh Schiffman, Trent Jaeger (sponsored by NSF)
- Retrofitting Programs for Information-Flow Security – Dave King, Trent Jaeger, Boniface Hicks, Patrick McDaniel, Michael Hicks (University of Maryland), Somesh Jha (University of Wisconsin), Sanjit A. Seshia, Susmit Jha (UC Berkeley) (sponsored by AFRL/IARPA)
- Compliance Analysis of Mandatory Access Control Policies – Sandra Rueda, Dave King, Trent Jaeger, Patrick McDaniel (sponsored by IARPA and AFRL)
- System-wide Information Flow Enforcement – Guruprasad Jakka, Dave King, Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger, Patrick McDaniel (sponsored by AFRL and IARPA)
- Flexible Access Control for the Xen Hypervisor – Sandra Rueda, Joshua Schiffman, Hayawardh Vijayakumar, Trent Jaeger (sponsored by Air Force Research Lab)
- An Efficient Construction of Dual-Receiver Encryption – Youngtae Youn, Adam Smith
- Data Dissemination in Vehicular Ad-hoc Networks (VANET) – Yang Zhang, Jing Zhao, Guohong Cao
- Social Network Based Worm Containment in Cellular Networks – Zhichao Zhu, Guohong Cao, Sencun Zhu (sponsored by Narus Inc.)
- Improving Sensor Network Immunity under Worm Attacks: a Software Diversity Approach – Yi Yang, Sencun Zhu, Guohong Cao
- Distributed Utility-Based Rate Adaptation Protocols for Prioritized, Quasi-Elastic Flows – Sharanya Eswaran, Matthew P. Johnson, Archan Misra, Thomas F. La Porta (sponsored by ITA)
- Design of Link Layer Protocol for Free Space Optical Links – Srikar Tati, Thomas La Porta (sponsored by Ben Franklin Center of Exellence)
- Intelligent Resource Allocation in Wireless Networks with Network Coding – Raju Kumar, Thomas La Porta
- Exact and Fuzzy Sensor-Task Assignment – H. Rowaihy, M. Johnson, D. Pizzocaro, A. Bar-Noy, L. Kaplan, A. Preece, T. La Porta (sponsored by US ARL and UK MoD under the ITA Program)
- EndSec: An End-to-End Message Security Protocol for Mobile Telecommunication Networks – Kameswari Kotapati, Peng Liu, Thomas La Porta (sponsored by NSRC)
- Proactive Data Dissemination to Mission Sites – Fangfei Chen, Matthew P. Johnson, Amotz Bar-Noy, Iris Fermin, Thomas F. La Porta (sponsored by US Army Research laboratory and the UK Ministry of Defence)
- Cooperation with Untrusted Relays – Xiang He, Aylin Yener (sponsored by NSF and the DARPA ITMANET Program)
- Interference Management for Multiuser Two-Way Relay Networks – Min Chen, Aylin Yener (sponsored by NSF and DARPA ITMANET Program)
- Hop-by-Hop Forwarding vs Immediate Forwarding for Two-Way Relaying: Stability Regions – Ertugrul Necdet Ciftcioglu, Aylin Yener, Randall Berry (sponsored by NSF and DARPA ITMANET Program)
- Algorithms Based on Pattern Analysis for Verification and Adapter Creation for Business Process Composition – Akhil Kumar, Zhe Shan
- Flow-Based Traffic Clustering Using Unsupervised Machine Learning Techniques – Yanxin Zhang, Pushkar Patankar, George Kesidis, David Miller, Cetin Seren (sponsored by Cisco Systems, Inc.)
- Relaying Incentivization for Multihop Wireless Networks – Azin Neishaboori, Arnab Das, George Kesidis (sponsored by NSF)