Sunday |
June 26, 2005 |
1500 - 1600 |
TRUST: Team for Research in Ubiquitous Secure Technologies |
|
Shankar Sastry (University of California, Berkeley) |
1600 - 1700 |
Scientific Overview of TRUST: Part 2: TRUST's Value Proposition |
|
Fred Schneider (Cornell University) |
|
The Trust Research Program |
|
Shankar Sastry (University of California, Berkeley) |
1700 - 1800 |
Testbeds |
|
Sensornet: The New Science of Public Protection and Awareness |
|
Frank DeNap (Oak Ridge University) |
|
Cyber Defense Technology Experimental Research (DETER) Testbed |
|
Anthony Joseph (University of California, Berkeley) |
|
Planetlab |
|
Anthony Joseph (University of California, Berkeley) for David Culler |
|
Testbed Development at Cornell |
|
Stephen Wicker (Cornell University) |
1800 - 2000 |
Reception followed by Dinner |
Monday |
June 27, 2005 |
Research Challenges
0830 - 0915 |
Cybersecurity Technology--Moderator: Fred Schneider (Cornell University) |
|
TRUST: Anti-Phishing Technologies |
|
Dan Boneh (Stanford University) |
|
Worm & Network DoS Defense |
|
Mike Reiter (Carnegie Mellon University) |
|
Software Security: Research in Language-Based Methods |
|
David Wagner (University of California, Berkeley) |
0915 - 1000 |
Trustworthy Systems and Integration Science--Moderator: Doug Schmidt (Vanderbilt University) |
|
Trustworthy System Integration Science for Distributed Real-time & Embedded (DRE) Systems |
|
Doug Schmidt (Vanderbilt University) |
|
TRUST & Model-Integrated Computing:Model-based Integration of TRUSted Systems - Research Plans |
|
Gabor Karsai (Vanderbilt University) |
|
Coping with Challenges of Scale |
|
Ken Birman (Cornell University) |
1000 - 1045 |
Social Sciences: legal, economic, privacy, human usability--Moderator: Pam Samuelson (Berkeley) |
|
Privacy Considerations In Designing Demand/Response Energy Systems |
|
Pam Samuelson (University of California, Berkeley) |
|
Digital Forensics and Privacy |
|
Doug Tygar (University of California, Berkeley) |
1045-1100 |
Break |
Monday |
June 27, 2005 |
Outreach, Knowledge Transfer
1330 - 1415 |
Outreach Overview |
|
Ruzena Bajcsy (University of California, Berkeley) |
14:15 - 14:45 |
GIG and Air Force Information Assurance |
|
Knowledge Transfer: GIG and AFRL |
|
Ken Birman (Cornell University) |
|
An Evolutionary Design Process for the Command and Control GIG-IA |
|
Shankar Sastry (University of California, Berkeley) |
1445 - 1500 |
A DOE Perspective on Securing Information Infrastructure |
|
Stephen G. Batsell, (U.S. Department of Energy) |
1500 - 1545 |
Break |
1545 - 1630 |
Treasury and Secret Service: Financial Infrastructures |
|
Building Links from TRUST to the Financial Community |
|
Ken Birman (Cornell University) |
|
Client-side defenses against web-based identity theft |
|
John Mitchell (Stanford University) |
|
TRUST and Financial Infrastructure |
|
Doug Tygar (University of California, Berkeley) |
1630 - 1800 |
Volleyball game and other recreational activities |
1800 - 1900 |
Dinner |
1900 - 2100 |
Industry and Institutional partner presentations coordinated by Shankar Sastry and Christopher Brooks (University of California, Berkeley) |
|
Sekar Chandersekaran (Air Force) |
|
Robert Rodriguez (Secret Service) |
|
Victoria Stavridou-Coleman (Intel) |
|
Stephen Squires (HP) |
|
Ramesh Kesanupalli (Phoenix) |
|
Grace Caulfield and Elias Alagna (Sun) |
Tuesday |
June 28, 2005 |
Academic Partner Presentations
0830 - 0930 |
Berkeley research presentations (coordinated by Doug Tygar and Pam Samuelson) |
|
External randomness as a resource for security |
|
Venkatachalam Anantharam |
|
Social Science Research Challenges |
|
Pam Samuelson |
|
Security in Sensor Networks |
|
Tanya Roosta |
|
Trustworthy User Interface Design:Dynamic Security Skins |
|
Rachna Dhamija |
0930 - 1030 |
Cornell presentations (coordinated by Stephen Wicker) |
|
Cornell Research in Trusted Systems |
|
Steve Wicker |
|
Large Scale Sensor Networks |
|
Lang Tong |
|
Trustworthy Computing: Cornell Computer Science Dept. |
|
Emin Gun Sirer |
1030 - 1100 |
Break |
1100 - 1200 |
Carnegie Mellon research presentations (coordinated by Michael Reiter) |
|
Two Applications of Formal Methods to Security |
|
Mike Reiter |
|
Securing Sensor Networks |
|
Adrian Perrig |
|
Sting: an Automatic Defense System against Zero-day Worm Attacks |
|
Dawn Song |
1200 - 1300 |
Lunch |
1300 - 1400 |
Vanderbilt University research presentations (coordinated by Janos Sztipanovits) |
|
Secure Microarchitecture Design |
|
William Robinson |
|
ISIS Research Background for TRUST |
|
Janos Sztipanovits |
|
TRUST & Model-Integrated Computing Model-based Integration of TRUSted Systems |
|
Gabor Karsai |
1400 - 1500 |
Stanford University research presentations |
|
Stanford |
|
John Mitchell |
|
Scalable Error Detection using Boolean Satisfiability |
|
Alex Aiken |
|
Towards an end-to-end architecture forhandling sensitive data |
|
Hector Garcia-Molina |