Team for Research in
Ubiquitous Secure Technology

TRUST Autumn 2007 Conference: October 10-11, 2007

Trust Logo

The Autumn 2007 TRUST Conference was held
October 10-11, 2007 at the Hilton Garden Inn Ithaca and hosted by TRUST partner institution Cornell University.

This event provides attendees with an opportunity to hear firsthand about the work of TRUST faculty and students-specifically activities that:

  1. Advance a leading-edge research agenda to improve the state-of-the art in cyber security and critical infrastructure protection;
  2. Develop robust education and diversity plans to teach the next generation of computer scientists, engineers, and social scientists; and
  3. Pursue knowledge transfer opportunities to transition TRUST results to end users within industry and the government.

The schedule is to have a full day Oct. 10, and a half day the morning of Oct. 11. The conference will be followed by the TRUST External Advisory Board (EAB) meeting the afternoon of Oct. 11 and the morning of Oct. 12. The EAB meeting is by invitation only.

Keynote Address

We are pleased to announce that the conference Keynote Address will be given by Bob Sullivan, a senior technology writer for MSNBC. In addition to being the author of the book Your Evil Twin: Behind the Identity Theft Epidemic Bob also runs the very popular investigative reporting column The Red Tape Chronicles.

Conference Details

  • The Conference Agenda and Conference Program are now available.
  • Breakfast and lunch will be provided both days and we are organizing a dinner for the evening of October 10.
  • Conference Hotel Information (TRUST website account required, see How can I request a login account on this website?)
  • Conference Registration - See also: How do a set up a proxy account so I can register a VIP?

    Conference Presentations

    NOTE: Presentations are provided in Powerpoint formats for convenience. Providing Powerpoint files makes it very easy and tempting to "borrow" the material. However, these presentations are owned by the author. Please do not use this material without permission from the author.

    Wednesday October 10, 2007
    0900 - 0930 Can Selective Sensing Protect Democratic Principles and Enhance Policing?
    Deirdre Mulligan (University of California, Berkeley), Stephen Wicker (Cornell University)
    0930 - 1000 Competition and Fraud in Online Advertising Markets
    Bob Mungamuru (Stanford University)
    1000 - 1030 Network Security and the Need to Consider Provider Coordination in Network Access Policy
    Aaron J. Burstein (University of California, Berkeley)
    1100 - 1200 Keynote Speech - Consumers and Privacy: Who Cares?
    Bob Sullivan (MSNBC)
    1330 - 1400 Probabilistic Opaque Quorum Systems
    Michael K. Reiter (University of North Carolina, Chapel Hill)
    1400 - 1430 The Building Blocks of Consensus
    Yee Jiun Song (Cornell University)
    1430 - 1500 Quicksilver Scalable Multicast
    Ken Birman (Cornell University)
    1530 - 1600 Model-Based Design Environment for Clinical Information Systems
    Akos Ledeczi (Vanderbilt University)
    1600 - 1630 Privacy and Utility in Business Processes
    Anupam Datta (Carnegie Mellon University)
    1630 - 1700 Don't Sweat Your Privacy: Using Humidity to Detect Human Presence
    Mark Luk (Carnegie Mellon University)
    1700 - 1730 A Model-based Intrusion Detection System for Wireless Process Control Systems
    Tanya Roosta (University of California, Berkeley)

    Thursday October 11, 2007
    0830 - 0855 ARSL: A Language for Authorization Rule Specification in Software Security
    Weider D. Yu (San Jose State University)
    0855 - 0920 Towards Automatic Discovery of Deviations in Binary Implementations
    Cody Hartwig (Carnegie Mellon University)
    0920 - 0945 Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
    Sameer Pai (Cornell University)
    0945 - 1010 Automatically Generating Attacks on Webapps with Model Checking
    Michael C. Martin (Stanford University)
    1030 - 1055 Monitoring Elderly
    Ruzena Bajcsy (University of California, Berkeley)
    1055 - 1120 Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks
    Adrian Perrig (Carnegie Mellon University)
    1120 - 1145 Inductive Proofs of Computational Secrecy
    Arnab Roy (Stanford University)
    1145 - 1210 Characterizing the Remote Control Behavior of Bots
    Elizabeth Stinson (Stanford University)

    Additional Information

    If you have any questions or need more information, please contact Sally Alcala, the TRUST Program Administrator.