NSRC Industry Day 2010 will be held on 24-26th October, 2010, with the reception on 24th October, 2010.
Note to attendees: Please fill out the registration form (.doc format) and send it through e-mail to Dr. Laporta
Sunday, October 24
Faculty Staff Club, Nittany Lion Inn :
- 6:30 PM – 8:30 PM: Reception
Monday, October 25
Ballroom, Nittany Lion Inn :
- 8:30 AM : Registration and Breakfast
- 8:50 AM : Introductions – Thomas La Porta, Director, NSRC
- 9:00 AM – 9:15 AM : Overview of Research in The College of Engineering – Anthony Atchley, Associate Dean, College of Engineering
- 9:15 AM – 10:15 AM : Keynote, Dr. Kamal Jabbour, Air Force Research Laboratory, Information Directorate, Rome, NY
Dr. Kamal Jabbour, a member of the scientific and technical cadre of senior executives, is the Air Force Senior Scientist for Information Assurance, Information Directorate, Air Force Research Laboratory, Rome, N.Y. He serves as the principal scientific authority and independent researcher in the field of information assurance, including defensive information warfare and offensive information warfare technology. He conceives, plans, and advocates major research and development activities, monitors and guides the quality of scientific and technical resources, and provides expert technical consultation to other Air Force organizations, Department of Defense and government agencies, universities and industry.
Title:
- The Science and Technology of Cyber Operations
Abstract:
- We examine the landscape of cyber operations from a science and technology perspective, and analyze the vulnerabilities and threats at all six stages of the information lifecycle – information generation, information processing, information storage, information transmission, information consumption and information destruction. We present a framework for a science of mission assurance that seeks to represent mathematically the dependence of cyberspace of critical functions and verify formally their implementation, and propose a way forward to tackle existing challenges.
- 10:15 AM – 10:45 AM : Break
- 10:45 AM – 11:45 AM : Keynote, Dr. Robert Cunningham, MIT Lincoln Laboratory
Dr. Robert Cunningham is the Group Leader of the Cyber Systems and Technology Group. Today Rob pursues research in attack detection algorithms that do not require advance knowledge of the method of the attack, systems that fuse alerts to provide situational awareness, and in designing tamper-resistant systems. Dr. Cunningham has worked broadly with technology throughout his career, exploring seismic analysis for nuclear treaty verification, standardizing parallel and distributed computing design patterns, and exploiting multi-band imagery. Dr. Cunningham has participated in several national panels evaluating and defining research approaches to cyber security problems and has received a commendation from the director of the National Security Agency for his efforts. He is a senior member of the IEEE, has led the Laboratory’s Advanced Concepts Committee, and served as a member of the Laboratory’s New Technology Initiatives Board. When not tinkering with technology, Rob is out camping with the Boy Scouts or riding his bike.
Title:
- Why Measuring Security is Hard
Abstract:
- For many years, we’ve been trying to measure “security” so that we can increase accountability, demonstrate compliance, and determine whether and by how much our investments in products and processes are making our systems more secure. This presentation investigates why security measurement is difficult and what strategies might help address our needs.
- 11:45 PM – 12:30 PM : Overview of the Networking and Security Research Center, Thomas La Porta, Director, NSRC
IST Building 2nd Floor Atrium and 3rd Floor :
- 12:30 PM – 3:00 PM : Buffet Lunch, Student Posters and Demonstrations
Room 333 IST Building :
- Faculty Talks
- 3:00 PM : Trent Jaeger, CSE
- 3:30 PM : Phil La Plante, Great Valley
- 4:00 PM : Eileen Kane, Dickinson School of Law
- 4:30 PM – 5:00 PM : Center Discussion, Thomas La Porta, Director, NSRC
- 5:45 PM : Dinner at the Tavern
Tuesday, October 26
Penn State Room, Nittany Lion Inn :
- 8:00 AM : Breakfast
- Focus Talks
333 IST Building :
- Faculty Talks
- 10:30 AM : Guohong Cao, CSE
- 11:00 AM : Chris Griffin, Applied Research Lab
- 11:30 AM : Sencun Zhu, CSE
- 12:00 PM : Gerry Michaud, Applied Research Lab
- Lunch (To go or eat in)
List of student demos and posters
Demos – 344 IST
- Adaptive In-Network Processing for Mission-Aware Wireless Sensor Networks – Sharanya Eswaran, James Edwards and Thomas La Porta (Sponsored by the US-ARL International Technology Alliance)
- Metric Driven Mission-Aware Mobility Modeling in Tactical Networks – Sucharita Ray, Prithwish Basu, Konstantinos Psounis, Thomas La Porta (Sponsored by US ARL Network Sciences Collaborative Technology Alliance)
- TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones – William Enck, Peter Gilbert (Duke), Byung-Gon Chun (Intel), Landon P. Cox (Duke), Jaeyeon Jung (Intel), Patrick McDaniel (PSU), and Anmol N. Sheth (Intel) (Sponsored by NSF and Intel Corp.)
- Network-based root of trust for installation – Joshua Schiffman, Thomas Moyer, Trent Jaeger and Patrick McDaniel (Sponsored by NSF)
- Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G networks – Bo Zhao, Byung Chul Tak and Guohong Cao
Posters
- Convergecast with Deadlines and Data Bundles – Fangfei Chen, Matthew Johnson, Diego Pizzocaro, Alun Preece, Amotz Bar-noy and Thomas La Porta (Sponsored by US Army Research Laboratory and UK Ministry of Defence)
- A Novel Detection Mechanism for SMS Attacks on Cellular Networks – Eun Kyoung Kim and Thomas La Porta (Sponsored by NSF)
- End-to-End Rate Selection for Opportunistic Reception in Multi-Rate Wireless Networks – Raju Kumar, Sharanya Eswaran and Thomas La Porta (Sponsored by ARO MURI)
- Network Resource Manipulation and Security Concerns of NUM-based Networks – James Edwards, Scott Rager and Thomas La Porta (Sponsored by US-ARL International Technology Alliance)
- Universal Scheduling for Networks with Arbitrary Traffic, Channels, and Mobility – Scott Rager and Thomas La Porta
- netCSI: A Generic Fault Diagnosis Algorithm for Large Scale Failures in Computer Networks – Srikar Tati, Scott Rager, Thomas La Porta and BongJun Ko (IBM T.J. Watson Research Center) (Sponsored by International Technology Alliance (ITA) Program & DRTA)
- Marginal Effects of Femtocells in Cellular Networks – Mike Lin and Thomas La Porta
- Quality of Information in Tactical Networks – Ahmed Bahjat and Thomas La Porta (Sponsored by ARL and Network CTA)
- Scalable Web Content Attestation – Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel and Trent Jaeger (Sponsored by NSF)
- Process Firewalls: Mechanism and Utility – Hayawardh Vijayakumar, Sandra Rueda, Divya Muthukumaran, Joshua Schiffman and Trent Jaeger
- Graph Cuts Can be Used to Solve Security Problems – Divya Muthukumaran, Dave King, Trent Jaeger, Somesh Jha (Wisconsin), Susmit Jha (UC Berkeley), Sanjit Seshia (UC Berkeley) (Sponsored by NSF)
- Removing Home Appliance Features from Electric Load Profiles – Steve McLaughlin and Patrick McDaniel (Sponsored by Lockheed Martin)
- Finding Attack Risks in Virtual Machine Systems – Sandra Rueda, Hayawardh Vijayakumar and Trent Jaeger (Sponsored by AFRL)
- Social-Aware Data Diffusion in Delay Tolerant MANETs – Y. Zhang, W. Gao, G. Cao, T. La Porta, B. Krishnamachari, and A. Iyengar
- A Social Network Based Patching Scheme for Worm Containment in Cellular Networks – Z. Zhu, G. Cao, S. Zhu, S. Ranjan, A. Nucci (Sponsored by Narus Inc.)
- Worm Detection in Online Social Networks – Wei Xu, Fangfang Zhang and Sencun Zhu
- Filtering Offensive Language in Online Communities using Grammatical Relations – Zhi Xu and Sencun Zhu
- Privacy Preserving High Dimensional Data Mining – Raghav Bhaskar (Microsoft Research India), Daniel Kifer, Srivatsan Laxman (Microsoft Research India), Adam Smith and Abhradeep Thakurta (Sponsored by Microsoft Research India and NSF)