TRUST Autumn 2007 Conference: October 10-11, 2007
|
The Autumn 2007 TRUST Conference was held |
This event provides attendees with an opportunity to hear firsthand about the work of TRUST faculty and students-specifically activities that:
- Advance a leading-edge research agenda to improve the state-of-the art in cyber security and critical infrastructure protection;
- Develop robust education and diversity plans to teach the next generation of computer scientists, engineers, and social scientists; and
- Pursue knowledge transfer opportunities to transition TRUST results to end users within industry and the government.
The schedule is to have a full day Oct. 10, and a half day the morning of Oct. 11. The conference will be followed by the TRUST External Advisory Board (EAB) meeting the afternoon of Oct. 11 and the morning of Oct. 12. The EAB meeting is by invitation only.
Keynote Address
We are pleased to announce that the conference Keynote Address will be given by Bob Sullivan, a senior technology writer for MSNBC. In addition to being the author of the book Your Evil Twin: Behind the Identity Theft Epidemic Bob also runs the very popular investigative reporting column The Red Tape Chronicles.
Conference Details
Conference Presentations
NOTE: Presentations are provided in Powerpoint formats for convenience. Providing Powerpoint files makes it very easy and tempting to "borrow" the material. However, these presentations are owned by the author. Please do not use this material without permission from the author.
Wednesday | October 10, 2007 |
0900 - 0930 | Can Selective Sensing Protect Democratic Principles and Enhance Policing? |
Deirdre Mulligan (University of California, Berkeley), Stephen Wicker (Cornell University) | |
0930 - 1000 | Competition and Fraud in Online Advertising Markets |
Bob Mungamuru (Stanford University) | |
1000 - 1030 | Network Security and the Need to Consider Provider Coordination in Network Access Policy |
Aaron J. Burstein (University of California, Berkeley) | |
1100 - 1200 | Keynote Speech - Consumers and Privacy: Who Cares? |
Bob Sullivan (MSNBC) | |
1330 - 1400 | Probabilistic Opaque Quorum Systems |
Michael K. Reiter (University of North Carolina, Chapel Hill) | |
1400 - 1430 | The Building Blocks of Consensus |
Yee Jiun Song (Cornell University) | |
1430 - 1500 | Quicksilver Scalable Multicast |
Ken Birman (Cornell University) | |
1530 - 1600 | Model-Based Design Environment for Clinical Information Systems |
Akos Ledeczi (Vanderbilt University) | |
1600 - 1630 | Privacy and Utility in Business Processes |
Anupam Datta (Carnegie Mellon University) | |
1630 - 1700 | Don't Sweat Your Privacy: Using Humidity to Detect Human Presence |
Mark Luk (Carnegie Mellon University) | |
1700 - 1730 | A Model-based Intrusion Detection System for Wireless Process Control Systems |
Tanya Roosta (University of California, Berkeley) |
Thursday | October 11, 2007 |
0830 - 0855 | ARSL: A Language for Authorization Rule Specification in Software Security |
Weider D. Yu (San Jose State University) | |
0855 - 0920 | Towards Automatic Discovery of Deviations in Binary Implementations |
Cody Hartwig (Carnegie Mellon University) | |
0920 - 0945 | Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust |
Sameer Pai (Cornell University) | |
0945 - 1010 | Automatically Generating Attacks on Webapps with Model Checking |
Michael C. Martin (Stanford University) | |
1030 - 1055 | Monitoring Elderly |
Ruzena Bajcsy (University of California, Berkeley) | |
1055 - 1120 | Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks |
Adrian Perrig (Carnegie Mellon University) | |
1120 - 1145 | Inductive Proofs of Computational Secrecy |
Arnab Roy (Stanford University) | |
1145 - 1210 | Characterizing the Remote Control Behavior of Bots |
Elizabeth Stinson (Stanford University) |
Additional Information
If you have any questions or need more information, please contact
Sally Alcala, the TRUST Program Administrator.