Team for Research in
Ubiquitous Secure Technology

TRUST Autumn 2010 Conference: November 10-11, 2010

Trust Logo

The Autumn 2010 TRUST Conference was held
November 10-11, 2010 on the campus of Stanford University.

This event provides attendees with an opportunity to hear firsthand about the work of TRUST faculty and students-specifically activities that:

  1. Advance a leading-edge research agenda to improve the state-of-the art in cyber security and critical infrastructure protection;
  2. Develop robust education and diversity plans to teach the next generation of computer scientists, engineers, and social scientists; and
  3. Pursue knowledge transfer opportunities to transition TRUST results to end users within industry and the government.

Conference Registration

Registration for the Autumn 2010 TRUST Conference is now CLOSED.
 

Conference Schedule

The conference will run from 8:45 AM to 6:00 PM November 10 and from 8:30 AM to 4:00 PM November 11. The conference will consist of technical talks given by TRUST faculty and students, breakout sessions focused on each of the TRUST research themes, poster sessions of TRUST research projects, and social/networking events. All conference attendees are invited to a banquet the evening of November 10 at the Stanford Faculty Club. Please be sure to indicate whether or not you plan to attend the conference banquet when you register and, if you do plan to attend, your choice of entree.

A detailed Conference Agenda is available here.

Conference Poster Session

The TRUST Conference includes sessions when posters of TRUST research are displayed. This is an opportunity for conference attendees to learn more about TRUST researh projects and talk one-on-one with TRUST researchers.

TRUST STUDENTS/POST DOCS: If you are a TRUST student or post doc attending the conference, please plan on displaying a poster of your TRUST-related research. A poster template in PowerPoint is available here. Prior to the conference, please print your poster in color on 40" W x 30" H paper and mount it on poster board if you wish (though this is not necessary). TRUST will provide poster board, easels, and clips for mounting and displaying your posters. It is up to you to print your own poster and get it to the conference. If you do not have the capability at your university to print in color and in a large format (e.g., on a plotter) your local copy shop should be able to do the job. If you have any questions regarding the posters, please contact Jessica Gamble, the TRUST Program Coordinator, and she will be glad to assist you.

Conference Travel and Accommodations

The conference will take place at the Jen-Hsun Huang Engineering Center on the campus of Stanford University.

Conference Travel Information is available here. This document contains driving directions, details on public transportation and campus parking, area maps, and instructions for getting from the Huang Engineering Center to the Stanford Faculty Club for the Nov. 10 conference banquet.

Because a number of accommodations options exist near the Stanford University campus, we have not reserved a block of hotel rooms for this conference. However, we recommend the following hotels, all of which are in close proximity to campus:

Creekside Inn
3400 El Camino Real, Palo Alto, CA 94306
650-493-2411

Hotel California
2431 Ash St., Palo Alto, CA 94305
650-322-7666 x5

Sheraton Palo Alto
625 El Camino Real, Palo Alto, CA 94301
650-328-2800

Stanford Terrace Inn
531 Stanford Ave., Palo Alto, CA 94306
650-857-0333

Westin Palo Alto
675 El Camino Real, Palo Alto, CA 94301
650-321-4422

PLEASE NOTE: The hotels listed above indicate they offer some rooms at a discounted "Stanford rate" so feel free to ask about that when you make a reservation. A list of additional hotels can be found on the Stanford University Lodging Guide.
 

Conference Keynote Addresses

We are honored to have as a conference keynote speaker Dawn Song, a professor of Computer Science at the University of California, Berkeley. Prof. Song is an accomplished researcher and educator recognized for her innovative work in a number of security and privacy areas. She will discuss work that is addressing challenges such as how to build secure platforms for emerging computing models and how to protect user's privacy in an increasingly complex Web environment. Among Prof. Song's many honors, she was named a MacArthur Foundation Fellow for 2010, a very select and prestigious award, so it is a privilege to have a "genius award" winner speak at the conference.

Conference Program and Presentations

The detailed Conference Program is available here.

All presentations and posters will be made available at the conclusion of the conference.

Links to the conference presentations are provided below. PLEASE NOTE: Mosts presentations are provided in PowerPoint format for convenience. Providing PowerPoint files makes it very easy and tempting to "borrow" the material. However, these presentations are owned by the author so please do not use this material without permission from the author.

Wednesday November 10, 2010
0900-01000 Keynote Address--BitBlaze, WebBlaze, and Beyond: Open Challenges in Security and Privacy
Dawn Song (Associate Professor, Computer Science, University of California, Berkeley)
Session 1: Physical Infrastructures
Chair: Steve Wicker (Cornell University)
1030-1050 Security Interdependencies for Networked Control Systems with Identical Agents
Saurabh Amin (University of California, Berkeley)
1050-1110 Fault-Tolerant Distributed Reconnaissance
Adrian P. Lauf (Wright State University)
1110-1130 Location Privacy via Private Proximity Testing
Arvind Narayanan (Stanford University)
1130-1150 Simulation of Network Attacks on SCADA Systems
Andrew Davis (Vanderbilt University)
1150-1210 Netslice: Enabling Critical Network Infrastructure with Commodity Routers
Hakim Weatherspoon (Cornell University)
1210-1230 A Privacy-Aware Architecture For Demand Response Systems
Stephen Wicker (Cornell University)
Session 2: Financial Infrastructures
Chair: Doug Tygar (University of California, Berkeley)
1330-1350 Towards a Formal Foundation of Web Security
Devdatta Akhawe (University of California, Berkeley)
1350-1410 SessionJuggler: Secure Login From an Untrusted Terminal Using Session Hijacking
Elie Burzstein (Stanford University)
1410-1430 Protecting Browsers from Extension Vulnerabilities
Adrienne Porter Felt (University of California, Berkeley)
1430-1450 The Case for Ubiquitous Transport-Level Encryption
Andrea Bittau (Stanford University)
1510-1530 A Learning-Based Approach to Reactive Security
Benjamin Rubinstein (University of California, Berkeley)

Thursday November 11, 2010
Session 3: Health Infrastructures
Chair: Janos Sztipanovits (Vanderbilt University)
1110-1130 A Model-Integrated, Guideline-Driven, Clinical Decision-Support System
Janos L. Mathe (Vanderbilt University)
1130-1150 Managing Information Leakage
Steven Whang (Stanford University)
1150-1210 Towards Understanding the Usage Pattern of Web-based Electronic Medical Record System
Xiaowei Li (Vanderbilt University)
1210-1230 EBAM: Experience-Based Access Management for Healthcare
Elizabeth Durham (Vanderbilt University)
1230-1250 Experiences in the Logical Specification of the HIPAA and GLBA Privacy Laws
Anupam Datta (Carnegie Mellon University)
Session 4: Policy / Economics
Chair: John Chuang (University of California, Berkeley)
1350-1410 Dissecting One Click Frauds
Nicolas Christin (Carnegie Mellon University)
1410-1430 Security Decision-Making Among Interdependent Organizations
Ann Miura-Ko (FLOODGATE / Stanford University)
1430-1450 Discounting the Past: Bad Weighs Heavier than Good
Laura Brandimarte (Carnegie Mellon University)
1450-1510 Modeling Cyber-Insurance: Towards A Unifying Framework
Galina Schwartz (University of California, Berkeley)
1510-1530 Scalable Parametric Verification of Reference Monitors: How to Verify Reference Monitors without Worrying about Data Structure Size
Jason Franklin (Carnegie Mellon University)
1550-1550 Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information
Benjamin Johnson (Carnegie Mellon University)

Conference Poster Session

The TRUST Conference will include sessions when posters of TRUST research are displayed. This is an opportunity for conference attendees to learn more about TRUST researh projects and talk one-on-one with TRUST researchers.
TRUST STUDENTS: If you are a TRUST student attending the conference, please plan on displaying a poster of your TRUST-related research and include your poster information when you register for the conference. A poster template in PowerPoint is available here. Prior to the conference, please print your poster in color on 40" W x 30" H paper and mount it on poster board if you wish (though this is not necessary). TRUST will provide poster board, easels, and clips for mounting and displaying your posters. It is up to you to print your own poster and get it to the conference. If you do not have the capability at your university to print in color and in a large format (e.g., on a plotter) your local copy shop or Kinko's should be able to do the job. If you have any questions regarding the posters, please contact Jessica Gamble, the TRUST Program Coordinator, and we will be glad to assist you.

Additional Information

If you have any questions or need more information, please contact Jessica Gamble, the TRUST Program Coordinator.