Team for Research in
Ubiquitous Secure Technology

TRUST Autumn 2005 Conference: June 26, 27, 28, 2005

Trust Logo

Retreat Agenda

Center Organization

Sunday June 26, 2005
1500 - 1600 TRUST: Team for Research in Ubiquitous Secure Technologies
Shankar Sastry (University of California, Berkeley)
1600 - 1700 Scientific Overview of TRUST: Part 2: TRUST's Value Proposition
Fred Schneider (Cornell University)
The Trust Research Program
Shankar Sastry (University of California, Berkeley)
1700 - 1800 Testbeds
Sensornet: The New Science of Public Protection and Awareness
Frank DeNap (Oak Ridge University)
Cyber Defense Technology Experimental Research (DETER) Testbed
Anthony Joseph (University of California, Berkeley)
Planetlab
Anthony Joseph (University of California, Berkeley) for David Culler
Testbed Development at Cornell
Stephen Wicker (Cornell University)
1800 - 2000 Reception followed by Dinner

Research Challenges

Monday June 27, 2005
0830 - 0915 Cybersecurity Technology--Moderator: Fred Schneider (Cornell University)
TRUST: Anti-Phishing Technologies
Dan Boneh (Stanford University)
Worm & Network DoS Defense
Mike Reiter (Carnegie Mellon University)
Software Security: Research in Language-Based Methods
David Wagner (University of California, Berkeley)
0915 - 1000 Trustworthy Systems and Integration Science--Moderator: Doug Schmidt (Vanderbilt University)
Trustworthy System Integration Science for Distributed Real-time & Embedded (DRE) Systems
Doug Schmidt (Vanderbilt University)
TRUST & Model-Integrated Computing:Model-based Integration of TRUSted Systems - Research Plans
Gabor Karsai (Vanderbilt University)
Coping with Challenges of Scale
Ken Birman (Cornell University)
1000 - 1045 Social Sciences: legal, economic, privacy, human usability--Moderator: Pam Samuelson (Berkeley)
Privacy Considerations In Designing Demand/Response Energy Systems
Pam Samuelson (University of California, Berkeley)
Digital Forensics and Privacy
Doug Tygar (University of California, Berkeley)
1045-1100 Break

Education

Monday June 27, 2005
1100 - 1145 Educational Initiatives
Education Overview
Sigurd Meldal (San Jose State University), Janos Sztipanovits (Vanderbilt University)
1100 - 1145 Educational Initiatives
Panel: Integration of Research into Education: (Moderator: Janos Sztipanovits (Vanderbilt University)
David Wagner (University of California, Berkeley)
Mike Reiter (Carnegie Mellon University)
Fred Schneider (Cornell University)
1215 - 1330 Lunch

Outreach, Knowledge Transfer

Monday June 27, 2005
1330 - 1415 Outreach Overview
Ruzena Bajcsy (University of California, Berkeley)
14:15 - 14:45 GIG and Air Force Information Assurance
Knowledge Transfer: GIG and AFRL
Ken Birman (Cornell University)
An Evolutionary Design Process for the Command and Control GIG-IA
Shankar Sastry (University of California, Berkeley)
1445 - 1500 A DOE Perspective on Securing Information Infrastructure
Stephen G. Batsell, (U.S. Department of Energy)
1500 - 1545 Break
1545 - 1630 Treasury and Secret Service: Financial Infrastructures
Building Links from TRUST to the Financial Community
Ken Birman (Cornell University)
Client-side defenses against web-based identity theft
John Mitchell (Stanford University)
TRUST and Financial Infrastructure
Doug Tygar (University of California, Berkeley)
1630 - 1800 Volleyball game and other recreational activities
1800 - 1900 Dinner
1900 - 2100 Industry and Institutional partner presentations coordinated by Shankar Sastry and Christopher Brooks (University of California, Berkeley)
  • Sekar Chandersekaran (Air Force)
  • Robert Rodriguez (Secret Service)
  • Victoria Stavridou-Coleman (Intel)
  • Stephen Squires (HP)
  • Ramesh Kesanupalli (Phoenix)
  • Grace Caulfield and Elias Alagna (Sun)
  • Academic Partner Presentations

    Tuesday June 28, 2005
    0830 - 0930 Berkeley research presentations (coordinated by Doug Tygar and Pam Samuelson)
    External randomness as a resource for security
    Venkatachalam Anantharam
    Social Science Research Challenges
    Pam Samuelson
    Security in Sensor Networks
    Tanya Roosta
    Trustworthy User Interface Design:Dynamic Security Skins
    Rachna Dhamija
    0930 - 1030 Cornell presentations (coordinated by Stephen Wicker)
    Cornell Research in Trusted Systems
    Steve Wicker
    Large Scale Sensor Networks
    Lang Tong
    Trustworthy Computing: Cornell Computer Science Dept.
    Emin Gun Sirer
    1030 - 1100 Break
    1100 - 1200 Carnegie Mellon research presentations (coordinated by Michael Reiter)
    Two Applications of Formal Methods to Security
    Mike Reiter
    Securing Sensor Networks
    Adrian Perrig
    Sting: an Automatic Defense System against Zero-day Worm Attacks
    Dawn Song
    1200 - 1300 Lunch
    1300 - 1400 Vanderbilt University research presentations (coordinated by Janos Sztipanovits)
    Secure Microarchitecture Design
    William Robinson
    ISIS Research Background for TRUST
    Janos Sztipanovits
    TRUST & Model-Integrated Computing Model-based Integration of TRUSted Systems
    Gabor Karsai
    1400 - 1500 Stanford University research presentations
    Stanford
    John Mitchell
    Scalable Error Detection using Boolean Satisfiability
    Alex Aiken
    Towards an end-to-end architecture forhandling sensitive data
    Hector Garcia-Molina