TRUST Autumn 2010 Conference: November 10-11, 2010
|
The Autumn 2010 TRUST Conference was held |
This event provides attendees with an opportunity to hear firsthand about the work of TRUST faculty and students-specifically activities that:
- Advance a leading-edge research agenda to improve the state-of-the art in cyber security and critical infrastructure protection;
- Develop robust education and diversity plans to teach the next generation of computer scientists, engineers, and social scientists; and
- Pursue knowledge transfer opportunities to transition TRUST results to end users within industry and the government.
Conference Registration
Registration for the Autumn 2010 TRUST Conference is now CLOSED.
Conference Schedule
The conference will run from 8:45 AM to 6:00 PM November 10 and from 8:30 AM to 4:00 PM November 11. The conference will consist of technical talks given by TRUST faculty and students, breakout sessions focused on each of the TRUST research themes, poster sessions of TRUST research projects, and social/networking events. All conference attendees are invited to a banquet the evening of November 10 at the Stanford Faculty Club. Please be sure to indicate whether or not you plan to attend the conference banquet when you register and, if you do plan to attend, your choice of entree.
A detailed Conference Agenda is available
here.
Conference Poster Session
The TRUST Conference includes sessions when posters of TRUST research are displayed. This is an opportunity for conference attendees to learn more about TRUST researh projects and talk one-on-one with TRUST researchers.
TRUST STUDENTS/POST DOCS: If you are a TRUST student or post doc attending the conference, please plan on displaying a poster of your TRUST-related research. A poster template in PowerPoint is available here. Prior to the conference, please print your poster in color on 40" W x 30" H paper and mount it on poster board if you wish (though this is not necessary). TRUST will provide poster board, easels, and clips for mounting and displaying your posters. It is up to you to print your own poster and get it to the conference. If you do not have the capability at your university to print in color and in a large format (e.g., on a plotter) your local copy shop should be able to do the job. If you have any questions regarding the posters, please contact Jessica Gamble, the TRUST Program Coordinator, and she will be glad to assist you.Conference Travel and Accommodations
The conference will take place at the
Jen-Hsun Huang Engineering Center on the campus of Stanford University.
Conference Travel Information is available here. This document contains driving directions, details on public transportation and campus parking, area maps, and instructions for getting from the Huang Engineering Center to the Stanford Faculty Club for the Nov. 10 conference banquet.
Because a number of accommodations options exist near the Stanford University campus, we have not reserved a block of hotel rooms for this conference. However, we recommend the following hotels, all of which are in close proximity to campus:
Creekside Inn
3400 El Camino Real, Palo Alto, CA 94306
650-493-2411
Hotel California
2431 Ash St., Palo Alto, CA 94305
650-322-7666 x5
Sheraton Palo Alto
625 El Camino Real, Palo Alto, CA 94301
650-328-2800
Stanford Terrace Inn
531 Stanford Ave., Palo Alto, CA 94306
650-857-0333
Westin Palo Alto
675 El Camino Real, Palo Alto, CA 94301
650-321-4422
PLEASE NOTE: The hotels listed above indicate they offer some rooms at a discounted "Stanford rate" so feel
free to ask about that when you make a reservation. A list of additional hotels can be found on the Stanford University
Lodging Guide.
Conference Keynote Addresses
We are honored to have as a conference keynote speaker Dawn Song, a professor of Computer Science at the University of California, Berkeley. Prof. Song is an accomplished researcher and educator recognized for her innovative work in a number of security and privacy areas. She will discuss work that is addressing challenges such as how to build secure platforms for emerging computing models and how to protect user's privacy in an increasingly complex Web environment. Among Prof. Song's many honors, she was named a MacArthur Foundation Fellow for 2010, a very select and prestigious award, so it is a privilege to have a "genius award" winner speak at the conference.
Conference Program and Presentations
The detailed Conference Program is available here.
All presentations and posters will be made available at the conclusion of the conference.
Links to the conference presentations are provided below. PLEASE NOTE: Mosts presentations are provided in PowerPoint format for convenience. Providing PowerPoint files makes it very easy and tempting to "borrow" the material. However, these presentations are owned by the author so please do not use this material without permission from the author.
Wednesday | November 10, 2010 |
0900-01000 | Keynote Address--BitBlaze, WebBlaze, and Beyond: Open Challenges in Security and Privacy |
Dawn Song (Associate Professor, Computer Science, University of California, Berkeley) | |
Session 1: Physical Infrastructures | |
Chair: Steve Wicker (Cornell University) | |
1030-1050 | Security Interdependencies for Networked Control Systems with Identical Agents |
Saurabh Amin (University of California, Berkeley) | |
1050-1110 | Fault-Tolerant Distributed Reconnaissance |
Adrian P. Lauf (Wright State University) | |
1110-1130 | Location Privacy via Private Proximity Testing |
Arvind Narayanan (Stanford University) | |
1130-1150 | Simulation of Network Attacks on SCADA Systems |
Andrew Davis (Vanderbilt University) | |
1150-1210 | Netslice: Enabling Critical Network Infrastructure with Commodity Routers |
Hakim Weatherspoon (Cornell University) | |
1210-1230 | A Privacy-Aware Architecture For Demand Response Systems |
Stephen Wicker (Cornell University) | |
Session 2: Financial Infrastructures | |
Chair: Doug Tygar (University of California, Berkeley) | |
1330-1350 | Towards a Formal Foundation of Web Security |
Devdatta Akhawe (University of California, Berkeley) | |
1350-1410 | SessionJuggler: Secure Login From an Untrusted Terminal Using Session Hijacking |
Elie Burzstein (Stanford University) | |
1410-1430 | Protecting Browsers from Extension Vulnerabilities |
Adrienne Porter Felt (University of California, Berkeley) | |
1430-1450 | The Case for Ubiquitous Transport-Level Encryption |
Andrea Bittau (Stanford University) | |
1510-1530 | A Learning-Based Approach to Reactive Security |
Benjamin Rubinstein (University of California, Berkeley) |
Thursday | November 11, 2010 |
Session 3: Health Infrastructures | |
Chair: Janos Sztipanovits (Vanderbilt University) | |
1110-1130 | A Model-Integrated, Guideline-Driven, Clinical Decision-Support System |
Janos L. Mathe (Vanderbilt University) | |
1130-1150 | Managing Information Leakage |
Steven Whang (Stanford University) | |
1150-1210 | Towards Understanding the Usage Pattern of Web-based Electronic Medical Record System |
Xiaowei Li (Vanderbilt University) | |
1210-1230 | EBAM: Experience-Based Access Management for Healthcare |
Elizabeth Durham (Vanderbilt University) | |
1230-1250 | Experiences in the Logical Specification of the HIPAA and GLBA Privacy Laws |
Anupam Datta (Carnegie Mellon University) | |
Session 4: Policy / Economics | |
Chair: John Chuang (University of California, Berkeley) | |
1350-1410 | Dissecting One Click Frauds |
Nicolas Christin (Carnegie Mellon University) | |
1410-1430 | Security Decision-Making Among Interdependent Organizations |
Ann Miura-Ko (FLOODGATE / Stanford University) | |
1430-1450 | Discounting the Past: Bad Weighs Heavier than Good |
Laura Brandimarte (Carnegie Mellon University) | |
1450-1510 | Modeling Cyber-Insurance: Towards A Unifying Framework |
Galina Schwartz (University of California, Berkeley) | |
1510-1530 | Scalable Parametric Verification of Reference Monitors: How to Verify Reference Monitors without Worrying about Data Structure Size |
Jason Franklin (Carnegie Mellon University) | |
1550-1550 | Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information |
Benjamin Johnson (Carnegie Mellon University) |
Conference Poster Session
The TRUST Conference will include sessions when posters of TRUST research are displayed. This is an opportunity for
conference attendees to learn more about TRUST researh projects and talk one-on-one with TRUST researchers.
TRUST STUDENTS: If you are a TRUST student attending the conference, please plan on displaying
a poster of your TRUST-related research and include your poster information when you register for the conference.
A poster template in PowerPoint is available
here. Prior to the conference, please
print your poster in color on 40" W x 30" H paper and mount it on poster board if you wish (though this is not necessary).
TRUST will provide poster board, easels, and clips for mounting and displaying your posters. It is up to you to print
your own poster and get it to the conference. If you do not have the capability at your university to print in color
and in a large format (e.g., on a plotter) your local copy shop or Kinko's should be able to do the job. If you have
any questions regarding the posters, please contact
Jessica Gamble, the TRUST Program Coordinator, and we
will be glad to assist you.
Additional Information
If you have any questions or need more information, please contact
Jessica Gamble,
the TRUST Program Coordinator.