Team for Research in
Ubiquitous Secure Technology

Team for Research in Ubiquitous Secure Technologies (TRUST)

Retreat Agenda

June 26, 27, 28, 2005

NOTE: Presentations are provided in both PDF and Powerpoint formats for convenience. Providing Powerpoint files makes it very easy and tempting to "borrow" the material. However, these presentations are owned by the author. Please do not use this material without permission from the author .

Sunday, June 26th

Center Organization

15:00 - 16:00
  • "TRUST: Team for Research in Ubiquitous Secure Technologies": Shankar Sastry (Berkeley) (PPT - PDF)
  • 16:00 - 17:00
  • "Scientific Overview of TRUST: Part 2: TRUST's Value Proposition": Fred Schneider (Cornell) (PPT - PDF)
  • "The Trust Research Program": Shankar Sastry (Berkeley) (PPT - PDF)
  • 17:00 - 18:00 Testbeds:
  • "Cyber Defense Technology Experimental Research (DETER) Testbed": Anthony Joseph (Berkeley) (PPT - PDF)
  • "Planetlab" Anthony Joseph for David Culler (Berkeley)
  • "Testbed Development at Cornell": Stephen Wicker (Cornell) (PPT - PDF)
  • "Sensornet: The New Science of Public Protection and Awareness": Frank DeNap (Oak Ridge) (PPT - PDF)
  • Monday, June 27th

    Research Challenges

    8:30 - 9:15 Cybersecurity Technology (Moderator: Fred Schneider (Cornell))
  • "TRUST: Anti-Phishing Technologies": Dan Boneh (Stanford) (PPT - PDF)
  • "Worm & Network DoS Defense": Mike Reiter (CMU) (PPT - PDF)
  • "Software Security: Research in Language-Based Methods": David Wagner (UC Berkeley) (PPT - PDF)
  • 9:15 - 10:00 Trustworthy Systems and Integration Science (Moderator: Doug Schmidt (Vanderbilt))
  • "Trustworthy System Integration Science for Distributed Real-time & Embedded (DRE) Systems": Doug Schmidt (Vanderbilt) (PPT - PDF)
  • "TRUST & Model-Integrated Computing Model-based Integration of TRUSted Systems": Gabor Karsai (PPT - PDF)
  • "Coping with Challenges of Scale": Ken Birman (Cornell) (PPT - PDF)
  • 10:00 - 10:45 Social Sciences: legal, economic, privacy, human usability (Moderator: Pam Samuelson (Berkeley))
  • "Social Science Research Challenges": Pam Samuelson (Berkeley) (PPT - PDF)
  • "Digital Forensics and Privacy": Doug Tygar (Berkeley) (PPT - PDF)
  • "Sensor Networks & Privacy": Pam Samuelson (Berkeley) (PPT - PDF)
  • Education

    11:00 - 11:45 Educational Initiatives:
  • "Education Overview": Sigurd Meldal (San Jose), Janos Sztipanovits (Vanderbilt) (PPT - PDF)
  • "TRUST: Learning Technology": Larry Howard (Vanderbilt) (PPT - PDF)
  •    
    11:45 - 12:15 Panel: Integration of Research into Education: (Moderator: Janos Sztipanovits (Vanderbilt))
  • David Wagner (Berkeley)
  • Mike Reiter (CMU)
  • Fred Schneider (Cornell)
  • Outreach, Knowledge Transfer

    13:30 - 14:15 "Outreach Overview": Ruzena Bajcsy (Berkeley) (PPT - PDF)
    14:15 - 14:45 GIG and Air Force Information Assurance:
  • "Knowledge Transfer: GIG and AFRL": Ken Birman (Cornell) (PPT - PDF)
  • "An Evolutionary Design Process for the Command and Control GIG-IA": Shankar Sastry (Berkeley) (PPT - PDF)
  • 15:45 - 16:30 Treasury and Secret Service: Financial Infrastructures:
  • "Building Links from TRUST to the Financial Community": Ken Birman (Cornell) (PPT - PDF)
  • "Client-side defenses against web-based identity theft": John Mitchell (Stanford) (PPT - PDF)
  • "TRUST and Financial Infrastructure": Doug Tygar (Berkeley) (PPT - PDF)
  • Tuesday, June 28th

    Academic Partner Presentations

    8:30 - 9:30 Berkeley research presentations (coordinated by Doug Tygar and Pam Samuelson)
  • "External randomness as a resource for security": Venkatachalam Anantharam (PPT - PDF)
  • "Privacy Considerations In Designing Demand/Response Energy Systems": Pam Samuelson (PPT - PDF)
  • "Security in Sensor Networks": Tanya Roosta (PPT - PDF)
  • "Trustworthy User Interface Design:Dynamic Security Skins": Rachna Dhamija (PPT - PDF)
  • 9:30 - 10:30 Cornell presentations (coordinated by Stephen Wicker)
  • "Cornell Research in Trusted Systems": Steve Wicker (PPT - PDF)
  • "Large Scale Sensor Networks": Lang Tong (PPT - PDF)
  • "Trustworthy Computing: Cornell Computer Science Dept.": Emin Gun Sirer (PPT - PDF)
  • 11:00 - 12:00 Carnegie Mellon research presentations (3) coordinated by Michael Reiter
  • "Two Applications of Formal Methods to Security": Mike Reiter (PPT - PDF)
  • "Securing Sensor Networks": Adrian Perrig (PPT - PDF)
  • "Sting: an Automatic Defense System against Zero-day Worm Attacks": Dawn Song (PPT - PDF)
  • 13:00 - 14:00 Vanderbilt University research presentations (3) coordinated by Janos Sztipanovits
  • "ISIS Research Background for TRUST" Janos Sztipanovits (PPT - PDF)
  • "Secure Microarchitecture Design": William Robinson (PPT - PDF)
  • "TRUST & Model-Integrated Computing:Model-based Integration of TRUSted Systems - Research Plans": Gabor Karsai (Vanderbilt) (PPT - PDF)
  • 14:00 - 15:00 Stanford research presentations
  • "Stanford": John Mitchell (PPT - PDF)
  • "Towards an end-to-end architecture for handling sensitive data": Hector Garcia-Molina (PPT PDF)
  • "Execution generated testing": Dawson Engler (PPT - PDF)
  •