Team for Research in
Ubiquitous Secure Technology

TRUST Autumn 2009 Conference: October 29-30, 2009

Trust Logo

The Autumn 2009 TRUST Conference will be held
October 29-30, 2009 at the Hamilton Crowne Plaza Hotel in Washington, DC.

This event will provide attendees with an opportunity to hear firsthand about the work of TRUST faculty and students-specifically activities that:

  1. Advance a leading-edge research agenda to improve the state-of-the art in cyber security and critical infrastructure protection;
  2. Develop robust education and diversity plans to teach the next generation of computer scientists, engineers, and social scientists; and
  3. Pursue knowledge transfer opportunities to transition TRUST results to end users within industry and the government.

Conference Registration

Registration for the Autumn 2009 TRUST Conference is now closed.

Conference Schedule

The conference will run from 9:00 AM to 5:00 PM October 29 and from 9:00 AM to 3:45 PM on October 30. The conference will consist of technical talks given by TRUST faculty and students, poster sessions of TRUST research projects, and social/networking events. On October 29 at 5:00 PM there will be a reception with drinks and heavy hors d'oeuvres to which all conference attendees are invited.

Conference Agenda

The detailed Conference Agenda is available here.

Conference Venue

The conference will take place at the Hamilton Crowne Plaza Hotel in Washington, DC. The Hamilton Crowne Plaza Hotel is located on Franklin Square in the heart of the K Street business district and is close to Washington, DC's museums and national monuments including the Smithsonian, the Corcoran Gallery, and the National Mall. It is also one block from the McPherson Square Metro Station. We have reserved a block of rooms at the Hamilton Crowne Plaza Hotel at a special rate of $159 per night. Please make reservations by calling +1 800-263-9802 (toll free) or +1 202-218-7536 (local) and ask for the "TRUST Conference". The room block cut-off date has been extended to Wednesday, October 14, 2009 so please make your room reservation before then.

Conference Program and Presentations

Links to the conference presentations are provided below. PLEASE NOTE: Mosts presentations are provided in PowerPoint format for convenience. Providing PowerPoint files makes it very easy and tempting to "borrow" the material. However, these presentations are owned by the author so please do not use this material without permission from the author.

The detailed Conference Program is available here.

Thursday October 29, 2009
0900-1000 Keynote Address-Overview of NIST Cybersecurity Activities
Donna F. Dodson (National Institute of Standards and Technology)
Session 1: Physical Infrastructures
Chair: Steve Wicker (Cornell University)
1030-1040 TRUST Physical Infrastructures Overview
Steve Wicker (Cornell University)
1040-1100 TRUST for SCADA: A Simulation-Based Experimental Platform
Gabor Karsai (Vanderbilt University)
1100-1120 Secure Control Against Replay Attacks
Bruno Sinopoli (Carnegie Mellon University)
1120-1140 Critical Infrastructure Protection and Privacy-Aware Design
Steve Wicker (Cornell University)
1140-1200 Stealthy Deception Attacks on Water SCADA Systems
Saurabh Amin (University of California, Berkeley)
Session 2: Financial Industry/TRUST Collaboration Roundtable Chairs: John Mitchell (Stanford University), Ken Birman (Cornell University)
1330-1400 Session Overview and Financial Infrastructures Workshop Outbrief
John Mitchell (Stanford University), Dan Schutzer (FSTC)
1400-1445 Financial Industry/TRUST Roundtable Introductions
1445-1530 Financial Industry/TRUST Collaboration: Financial Industry Goals and Needs
Mike McCormick (Wells Fargo), Dan Schutzer (FSTC)
1600-1645 Financial Industry/TRUST Collaboration: TRUST Technologies and Research
Air Force Scientific Advisory Board Study, Janos Sztipanovits (Vanderbilt University)
The Economics (and Behavioral Economics) of Privacy, Alessandro Acquisti (Carnegie Mellon University)
Reintroducing Consistency Guarantees in Cloud Computing Systems, Ken Birman (Cornell University)
1645-1700 Wrap Up / Next Steps
John Mitchell (Stanford University), Ken Birman (Cornell University)
Friday October 30, 2009
0900-1000 Keynote Address-Agenda for a Science of Security
Fred Schneider (Cornell University)
Session 3: Financial Infrastructures Chair: Anupam Datta (Carnegie Mellon University)
1030-1055 Efficient Character-Level Taint Tracking for Java
Erika Chin (University of California, Berkeley)
1055-1120 A Logic of Secure Systems and its Application to Trusted Computing
Jason Franklin (Carnegie Mellon University)
1145-1210 Competitive Cyber-Insurance and Network Security
Galina Schwartz (University of California, Berkeley)
1210-1235 Reasoning about Concrete Security in Protocol Proofs
Arnab Roy (Stanford University)
Session 4: Health Infrastructures Chair: Janos Sztipanovits (Vanderbilt University)
1330-1340 TRUST Health Infrastructures Overview
Janos Sztipanovits (Vanderbilt University)
1340-1410 Stratified Negation and HIPAA Compliance
John Mitchell (Stanford University)
1410-1440 Learning Privacy Policy from Audit Logs
Brad Malin (Vanderbilt University)
1440-1510 Guideline Driven Patient Management Systems
Janos Mathe (Vanderbilt University), Jason Martin (Vanderbilt University Medical Center)
1510-1540 Body Sensors for In-Home Patient Monitoring
Yuan Xue (Vanderbilt University), Posu Yan (University of California, Berkeley)

Conference Poster Session

The TRUST Conference will include sessions when posters of TRUST research are displayed. This is an opportunity for conference attendees to learn more about TRUST researh projects and talk one-on-one with TRUST researchers. Below is a list of the posters to be displayed at the TRUST Conference:

Dr. Multicast: Harnessing IP Multicast in Data Centers
Laura Brandimarte (Carnegie Mellon University)
Integrated Environment For Studying Network Effects on SCADA Systems
Rohan Chabukswar (Carnegie Mellon University)
Intrusion-Tolerant Distributed Disaster Area Assessment
Adrian Lauf (Vanderbilt University)
Privacy-Aware Design of Personal Health Monitoring Systems
Mikhail Lisovich (Cornell University)
DataCenter Middleboxes: Enabling Commodity Packet Processing through Operating System Abstractions
Tudor Marian (Cornell University)
Query-Based Optimization: How an Attacker Can Systematically Circumvent Filters
Blaine Nelson (University of California, Berkeley)
Verifiable Computing: Outsourcing Computation to Malicious Workers
Bryan Parno (Carnegie Mellon University)
Edge Mashups for Clinical Collaboration
Michael Siegenthaler (Cornell University)
Exploring Privacy through California's "Shine the Light" Law
Lauren Thomas (Louisiana State University)
VAST: Visibility Across Space and Time
Matthias Vallentin (University of California, Berkeley)

Additional Information

If you have any questions or need more information, please contact Sally Alcala, the TRUST Program Coordinator.