TRUST Autumn 2009 Conference: October 29-30, 2009
|
The Autumn 2009 TRUST Conference will be held |
This event will provide attendees with an opportunity to hear firsthand about the work of TRUST faculty and students-specifically activities that:
- Advance a leading-edge research agenda to improve the state-of-the art in cyber security and critical infrastructure protection;
- Develop robust education and diversity plans to teach the next generation of computer scientists, engineers, and social scientists; and
- Pursue knowledge transfer opportunities to transition TRUST results to end users within industry and the government.
Conference Registration
Registration for the Autumn 2009 TRUST Conference is now closed.
Conference Schedule
The conference will run from 9:00 AM to 5:00 PM October 29 and from 9:00 AM to 3:45 PM on October 30. The conference will consist of technical talks given by TRUST faculty and students, poster sessions of TRUST research projects, and social/networking events. On October 29 at 5:00 PM there will be a reception with drinks and heavy hors d'oeuvres to which all conference attendees are invited.
Conference Agenda
The detailed Conference Agenda is available here.Conference Venue
The conference will take place at the Hamilton Crowne Plaza Hotel in Washington, DC. The Hamilton Crowne Plaza Hotel is located on Franklin Square in the heart of the K Street business district and is close to Washington, DC's museums and national monuments including the Smithsonian, the Corcoran Gallery, and the National Mall. It is also one block from the McPherson Square Metro Station. We have reserved a block of rooms at the Hamilton Crowne Plaza Hotel at a special rate of $159 per night. Please make reservations by calling +1 800-263-9802 (toll free) or +1 202-218-7536 (local) and ask for the "TRUST Conference". The room block cut-off date has been extended to Wednesday, October 14, 2009 so please make your room reservation before then.
Conference Program and Presentations
Links to the conference presentations are provided below. PLEASE NOTE: Mosts presentations are provided in PowerPoint format for convenience. Providing PowerPoint files makes it very easy and tempting to "borrow" the material. However, these presentations are owned by the author so please do not use this material without permission from the author.
The detailed Conference Program is available here.
Thursday | October 29, 2009 | ||||||||||||||||||||||||||||||||||||||
0900-1000 | Keynote Address-Overview of NIST Cybersecurity Activities | ||||||||||||||||||||||||||||||||||||||
Donna F. Dodson (National Institute of Standards and Technology) | |||||||||||||||||||||||||||||||||||||||
Session 1: Physical Infrastructures | |||||||||||||||||||||||||||||||||||||||
Chair: Steve Wicker (Cornell University) | |||||||||||||||||||||||||||||||||||||||
1030-1040 | TRUST Physical Infrastructures Overview | ||||||||||||||||||||||||||||||||||||||
Steve Wicker (Cornell University) | |||||||||||||||||||||||||||||||||||||||
1040-1100 | TRUST for SCADA: A Simulation-Based Experimental Platform | ||||||||||||||||||||||||||||||||||||||
Gabor Karsai (Vanderbilt University) | |||||||||||||||||||||||||||||||||||||||
1100-1120 | Secure Control Against Replay Attacks | ||||||||||||||||||||||||||||||||||||||
Bruno Sinopoli (Carnegie Mellon University) | |||||||||||||||||||||||||||||||||||||||
1120-1140 | Critical Infrastructure Protection and Privacy-Aware Design | ||||||||||||||||||||||||||||||||||||||
Steve Wicker (Cornell University) | |||||||||||||||||||||||||||||||||||||||
1140-1200 | Stealthy Deception Attacks on Water SCADA Systems | ||||||||||||||||||||||||||||||||||||||
Saurabh Amin (University of California, Berkeley) | Session 2: Financial Industry/TRUST Collaboration Roundtable | Chairs: John Mitchell (Stanford University), Ken Birman (Cornell University) | |||||||||||||||||||||||||||||||||||||
1330-1400 | Session Overview and Financial Infrastructures Workshop Outbrief | ||||||||||||||||||||||||||||||||||||||
John Mitchell (Stanford University), Dan Schutzer (FSTC) | |||||||||||||||||||||||||||||||||||||||
1400-1445 | Financial Industry/TRUST Roundtable Introductions | ||||||||||||||||||||||||||||||||||||||
1445-1530 | Financial Industry/TRUST Collaboration: Financial Industry Goals and Needs | ||||||||||||||||||||||||||||||||||||||
Mike McCormick (Wells Fargo), Dan Schutzer (FSTC) | |||||||||||||||||||||||||||||||||||||||
1600-1645 | Financial Industry/TRUST Collaboration: TRUST Technologies and Research | ||||||||||||||||||||||||||||||||||||||
Air Force Scientific Advisory Board Study, Janos Sztipanovits (Vanderbilt University) | |||||||||||||||||||||||||||||||||||||||
The Economics (and Behavioral Economics) of Privacy, Alessandro Acquisti (Carnegie Mellon University) | |||||||||||||||||||||||||||||||||||||||
Reintroducing Consistency Guarantees in Cloud Computing Systems, Ken Birman (Cornell University) | |||||||||||||||||||||||||||||||||||||||
1645-1700 | Wrap Up / Next Steps | ||||||||||||||||||||||||||||||||||||||
John Mitchell (Stanford University), Ken Birman (Cornell University) | Friday | October 30, 2009 | |||||||||||||||||||||||||||||||||||||
0900-1000 | Keynote Address-Agenda for a Science of Security | ||||||||||||||||||||||||||||||||||||||
Fred Schneider (Cornell University) | Session 3: Financial Infrastructures | Chair: Anupam Datta (Carnegie Mellon University) | |||||||||||||||||||||||||||||||||||||
1030-1055 | Efficient Character-Level Taint Tracking for Java | ||||||||||||||||||||||||||||||||||||||
Erika Chin (University of California, Berkeley) | |||||||||||||||||||||||||||||||||||||||
1055-1120 | A Logic of Secure Systems and its Application to Trusted Computing | ||||||||||||||||||||||||||||||||||||||
Jason Franklin (Carnegie Mellon University) | |||||||||||||||||||||||||||||||||||||||
1145-1210 | Competitive Cyber-Insurance and Network Security | ||||||||||||||||||||||||||||||||||||||
Galina Schwartz (University of California, Berkeley) | |||||||||||||||||||||||||||||||||||||||
1210-1235 | Reasoning about Concrete Security in Protocol Proofs | ||||||||||||||||||||||||||||||||||||||
Arnab Roy (Stanford University) | Session 4: Health Infrastructures | Chair: Janos Sztipanovits (Vanderbilt University) | |||||||||||||||||||||||||||||||||||||
1330-1340 | TRUST Health Infrastructures Overview | ||||||||||||||||||||||||||||||||||||||
Janos Sztipanovits (Vanderbilt University) | |||||||||||||||||||||||||||||||||||||||
1340-1410 | Stratified Negation and HIPAA Compliance | ||||||||||||||||||||||||||||||||||||||
John Mitchell (Stanford University) | |||||||||||||||||||||||||||||||||||||||
1410-1440 | Learning Privacy Policy from Audit Logs | ||||||||||||||||||||||||||||||||||||||
Brad Malin (Vanderbilt University) | |||||||||||||||||||||||||||||||||||||||
1440-1510 | Guideline Driven Patient Management Systems | ||||||||||||||||||||||||||||||||||||||
Janos Mathe (Vanderbilt University), Jason Martin (Vanderbilt University Medical Center) | |||||||||||||||||||||||||||||||||||||||
1510-1540 | Body Sensors for In-Home Patient Monitoring | ||||||||||||||||||||||||||||||||||||||
Yuan Xue (Vanderbilt University), Posu Yan (University of California, Berkeley) | |||||||||||||||||||||||||||||||||||||||
Dr. Multicast: Harnessing IP Multicast in Data Centers | |
Laura Brandimarte (Carnegie Mellon University) | |
Integrated Environment For Studying Network Effects on SCADA Systems | |
Rohan Chabukswar (Carnegie Mellon University) | |
Intrusion-Tolerant Distributed Disaster Area Assessment | |
Adrian Lauf (Vanderbilt University) | |
Privacy-Aware Design of Personal Health Monitoring Systems | |
Mikhail Lisovich (Cornell University) | |
DataCenter Middleboxes: Enabling Commodity Packet Processing through Operating System Abstractions | |
Tudor Marian (Cornell University) | |
Query-Based Optimization: How an Attacker Can Systematically Circumvent Filters | |
Blaine Nelson (University of California, Berkeley) | |
Verifiable Computing: Outsourcing Computation to Malicious Workers | |
Bryan Parno (Carnegie Mellon University) | |
Edge Mashups for Clinical Collaboration | |
Michael Siegenthaler (Cornell University) | |
Exploring Privacy through California's "Shine the Light" Law | |
Lauren Thomas (Louisiana State University) | |
VAST: Visibility Across Space and Time | |
Matthias Vallentin (University of California, Berkeley) | |
Additional Information
If you have any questions or need more information, please contact
Sally Alcala, the TRUST Program Coordinator.