NSRC Industry Day 2007 was held on Tuesday, October 16th. The day included keynote talks by Peter Schiffer of Strategic Initiatives, Tien Pham of US Army Research Laboratory, and Carl Landwehr of Disruptive Technology Office. Faculty presentations and student posters were also a part of the Industry Day. Links to the talks and posters can be found below.
Monday, October 15
• 6:30-9:00 PM – Reception, Nittany Lion Inn
Tuesday, October 16
HUB Auditorium
• 8:30-8:35 – Welcome – Thomas La Porta, Director, NSRC
• 8:35-9:00 – Peter Schiffer, Associate Vice President for Research and Director of Strategic Initiatives, Penn State
• 9:00-10:00 – Tien Pham, US Army Research Laboratory (ARL), Team Leader – Acoustic Signal Processing Branch
Dr. Tien Pham is a Team Leader within the Acoustic Signal Processing Branch at US Army Research Laboratory (ARL) responsible for the research in acoustic signal processing and algorithm development. For the past 15 years, he has worked in the areas of array signal processing for detection, tracking and classifying battlefield targets, as well as detection and localization of impulsive events. He has published over 40 technical papers and several journal articles on these subjects. He earned his BS, MS and PhD degrees in Electrical Engineering from the University of Maryland at College Park in 1988, 1991 and 2006 respectively. His dissertation was on Distributed Source Localization and Tracking for Acoustic Ad-hoc Sensor Networks. His research interests include statistical signal processing, distributed/decentralized processing, sensor array processing, sensor networks, biomimetic processing, and transient analysis for aero-acoustic applications. He is a member of the IEEE and the Acoustical Society of America. He is a US Technical Area Lead for the US-UK International Technology Alliance (ITA) in Network Information Science. Dr. Pham is also a national representative in two international working groups in acoustic sensing: the North Atlantic Treaty Organization, Sensors & Electronic Technology, Task Group 53 (NATO SET TG-53) and The Technical Cooperation Program, Sensors, Technical Panel 7 (TTCP SEN TP-7).
Title:
- Perspective on Sensors/Sensor Networks and Related Research in the US-UK International Technology Alliance
Abstract:
- In recent years, the military interest and demand for remote autonomous sensor systems for intelligence-surveillance-reconnaissance (ISR) applications have increased tremendously in urban and peacekeeping areas. Within the US Army Research Laboratory (ARL), sensing research is being pursued as part of the development of multi-modal, multi-sensor and/or multi-system solutions generically referred to as Unattended Ground Sensors (UGS). These sensor systems provide enhanced area coverage and autonomous detect-classify-and-locate capabilities against wide variety of battlefield targets and events. In addition, ARL has been actively collaborating with academia and industry to perform basic research in network information science (NIS) with the goal of providing advanced mobile ad-hoc network capabilities to the warfighters and coalition forces. The talk will focus on the following topics: (i) UGS for autonomous sensing and persistence surveillance, (ii) related research within the US-UK International Technology Alliance (ITA) in NIS, and (iii) opportunities for collaborative research, proof-of-concept demonstrations, and technology transitions in sensor networks for military applications.
• 10:00-10:30 – Break
• 10:30-11:30 – Carl Landwehr, Disruptive Technology Office, Division Chief
Carl Landwehr received his Bachelor of Science degree in Engineering and Applied Science from Yale University, and M.S. and Ph.D. degrees in Computer and Communication Sciences from the University of Michigan, where he helped implement the MERIT packet-switched network. For many years, he headed the Computer Security Section of the Center for High Assurance Computer Systems at the Naval Research Laboratory, where he led numerous research projects to advance technologies of computer security and high-assurance systems. He chaired an international defense research committee concerned with trustworthy computing, founded IFIP WG 11.3 (Database and Application Security) and is also a member of IFIP WG 10.4 (Dependability and Fault Tolerance). He has received Best Paper awards from the IEEE Symposium on Security and Privacy and the Computer Security Applications Conference. IFIP has awarded him its Silver Core, and the IEEE Computer Society has awarded him its Golden Core.
Dr. Landwehr is Editor-in-Chief of /IEEE Security & Privacy/ magazine and is a member of the Advisory Board of the/ International Journal for Information Security/. He has served on the editorial boards of /IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Software Engineering,/ the /Journal of Computer Security,/ and the /High Integrity Systems Journal./ He served on the computer science faculty at Purdue University, and he has taught courses on topics in computer science and information security at Georgetown, the University of Maryland, and Virginia Tech.
He is currently on assignment to the Disruptive Technology Office as a Division Chief responsible for funding research in cyber security. He previously served the National Science Foundation as coordinator of the Cyber Trust theme in the Computer and Information Science and Engineering Directorate. He began his work at NSF while a Senior Fellow with Mitretek Systems (now Noblis); at Mitretek he also led support for several DARPA programs in Information Assurance and Survivability.
Title:
- Disruptive Technologies for Information Assurance
Abstract:
- Today’s information systems and networks have been extraordinarily successful in bringing new capabilities to homes, businesses, schools, and governments. But society’s eagerness to gain these capabilities at the lowest possible initial cost has led to systems that are vulnerable to a variety of attacks and provide relatively poor accountability for the information flowing through them. This talk will describe the background, motivation, and the current projects in a program of research that aims to improve both the defensibility of large scale systems and the accountability of the information flowing through them. The technologies involved cover a broad range, from techniques that support tying a computation to a particular silicon chip to assuring that routers are configured in accordance with specified policies to detecting and remediating memory corruption attacks to renewing the Internet. The talk will close with some speculation on how we might teach ourselves to build strong, extensible systems in the future.
• 11:30-12:00 – Tom La Porta
Information Sciences and Technology Building
• 12:00-4:00 – Lunch, Posters, Demos, Greeting from Eva Pell, Senior Vice President for Research and Dean of The Graduate School (12:20)
• 2:15-4:00 (in parallel) – Faculty Talks
- Aylin Yener – Wireless Communications and Networking Lab
- George Kesidis – Research Overview
- Guohong Cao – Mobile Computing and Networking Lab
- Patrick McDaniel – SIIS Lab
- Trent Jaeger – SIIS Lab
- Adam Smith – SIIS Lab
- Tom La Porta – Center Issues
Demos
- Wireless Mesh with Mobility – Michael Lin, Tim Bolbrock, and Hosam Rowaihy (sponsored by TTC)
- Evaluating MAPSec using Marked Attack Graphs – Kameswari Kotapati (sponsored by Raytheon and NSF/DHS)
- WORKIT Multiple Backhauls Mobile Access Router – Yan Sun, Fang Fei (sponsored by Bell Labs)
- Malware Detection and Prevention on Mobile Devices – Liang Xie (collaboration with Samsung)
Posters
- Assigning Sensors to Competing Missions – Hosam Rowaihy, Matthew Johnson*, Theodore Brown*, Amotz Bar-Noy* (* from the City University of New York) (sponsored by US-ARL and UK-MoD under the ITA Program)
- Distributed Utility Optimization in Mission-oriented Wireless Sensor Networks – Sharanya Eswaran, Archan Misra (from IBM T.J. Watson Research Center) (sponsored by US-ARL and UK-MoD under the ITA Program)
- Channelization for Network Coding in Wireless Networks – Raju Kumar (sponsored by BAE Systems)
- On Attack Causality in Internet-Connected Cellular Networks – Patrick Traynor (sponsored by NSF and Raytheon)
- Data dissemination in vehicular ad hoc networks – Yang Zhang (sponsored by NSF)
- Collaborative Data Access in wireless P2P networks – Jing Zhao (sponsored by NSF)
- Controllable Node Mobility for Mission-Oriented Sensor Networks – Changlei Liu (sponsored by NSF)
- Cell Phone System Integrity – Divya Muthukumaran (sponsored by Samsung)
- Evaluating Compliance of Multilayer Information Flow Policy – Sandra Rueda (sponsored by Disruptive Technology Agency (DTO))
- Retrofitting Programs for Information-Flow Security – Dave King (sponsored by Disruptive Technology Agency (DTO))
- Virtual Machine Based Network Access Control – Yogesh Sreenivasan (sponsored by Disruptive Technology Agency (DTO))
- Integrity Management Architectures – Josh Schiffman (sponsored by NSF)
- Establishing and Sustaining System Integrity via Root of Trust Installation – Luke St. Clair, Josh Schiffman (sponsored by NSF)
- Thwarting Topological Worm Attacks in Peer-to-Peer Networks – Liang Xie (Sponsored by ARO and NSF)
- Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks – Yi Yang, Xinran Wang (sponsored by US Army Research Office (ARO) and the NSF)
- PinUP: Protecting User Files by Reducing Application Access – William Enck
- Leveraging Non-Volatile Memory for Advanced Storage Security – Kevin Butler
- Grains of SANs: Building Storage Area Networks from Memory Spots – Lisa Johansen, Kevin Butler, William Enck, Patrick Traynor
- Mobility prediction based relay deployment strategies for conserving power in MANETs – Aravindhan Venkateswaran, Venkatesh Sarangan
- Throughput enhancing cooperative spectrum sensing strategies for cognitive radios – Kyounghwan Lee
- The Fading Multiple-Access Wire-Tap Channel – Ender Tekin
- A Referral Social Network Model for Anti-Spam in a Large Scale VoIP System – Pushkar Patankar, Gunwoo Nam
- Randomized Session-Memory Purging in Internet Routers – Gunwoo Nam, Pushkar Patankar (sponsored by NSF and Cisco)