Team for Research in
Ubiquitous Secure Technology

TRUST Autumn 2013 Conference: October 9-10, 2013

Trust Logo

The Autumn 2013 TRUST Conference was held
October 9-10, 2013 at the University of California, Washington Center (UCDC). No TRUST conference is scheduled for 2014.

This event provided attendees with an opportunity to hear firsthand about the work of TRUST faculty and students-specifically activities that:

  1. Advance a leading-edge research agenda to improve the state-of-the art in cyber security and critical infrastructure protection;
  2. Develop robust education and diversity plans to teach the next generation of computer scientists, engineers, and social scientists; and
  3. Pursue knowledge transfer opportunities to transition TRUST results to end users within industry and the government.

Key Dates

  • September 12  September 20 - Room Reservation Deadline. Please note that the room reservation deadline has now passed.
  • September 20  September 27 - Conference Registration Deadline Please note that the registration deadline has now passed.
  • October 9-10 - Conference Dates

Conference Registration

Registration for the Autumn 2013 TRUST Conference is now closed.

Conference Poster Session

The TRUST Conference will include an extended session when posters of TRUST research are displayed. This is an opportunity for conference attendees to learn more about TRUST research projects and talk one-on-one with TRUST researchers.

TRUST STUDENTS/POST DOCS: If you are a TRUST student or post doc attending the conference, please plan on displaying a poster of your TRUST-related research. A poster template in PowerPoint is available here. Prior to the conference, please print your poster in color on 40" W x 30" H paper and mount it on poster board if you wish (though this is not necessary). TRUST will provide poster board, easels, and clips for mounting and displaying your posters. It is up to you to print your own poster and get it to the conference. If you do not have the capability at your university to print in color and in a large format (e.g., on a plotter) your local copy shop should be able to do the job. If you have any questions regarding the posters, please contact Carolyn Winter, the TRUST Program Manager, and she will be glad to assist you.

Conference Venue and Accommodations

The conference will take place at the University of California, Washington Center (UCDC).

We have reserved a block of rooms at the following hotel:

DoubleTree by Hilton Hotel, Washington DC
1515 Rhode Island Avenue, NW, Washington, DC 20005
1-202-232-7000

Please note that the deadline for making your room reservation was September 20th, 2013 and our room block is no longer available. You can contact the DoubleTree Hotel directly to inquire about room availability.

Conference Program

Below is the conference program. This program represents the latest information available but is subject to change.

A PDF version of the conference program is available here.

Wednesday October 9, 2013
0700-0810 Breakfast
0810-0820 Conference Welcome
Research Paper Session 1
0820-0850 Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace
Nicolas Christin (Carnegie Mellon University)
0850-0920 PolicyForge: A Collaborative Environment for Formalizing Privacy Policies in Health Care
Andras Nadas, Laszlo Juracz, Janos Sztipanovits (Institute for Software Integrated Systems, Vanderbilt University), Mark E. Frisse, Ann J. Olsen (Vanderbilt University Medical Center)
0920-0950 A Dynamical Systems Approach to Energy Disaggregation
Roy Dong, Lillian Ratliff, Henrik Ohlsson, S. Shankar Sastry (University of California, Berkeley)
0950-1020 Evolving Role Definitions Through Permission Invocation Patterns
Wen Zhang, You Chen (Vanderbilt University) Carl A. Gunter (University of Illinois at Urbana-Champaign) David Liebovitz (Northwestern University) Bradley Malin (Vanderbilt University)
1000-1030 Break
Research Paper Session 2
1030-1105 Key Homomorphic PRFs and Their Applications
Dan Boneh, Kevin Lewi, Hart Montgomery, Ananth Raghunathan (Stanford University)
1105-1135 Naturally Rehearsing Passwords
Jeremiah Blocki, Manuel Blum, Anupam Datta (Carnegie Mellon University)
1135-1155 SoNIC: Precise Realtime Software Access and Control of Wired Networks
Ki Suh Lee, Han Wang, Hakim Weatherspoon (Cornell University)
1155-1225 Analysis of Data-Leak Hardware Trojans in AES Cryptographic Circuits
Trey Reece, William H. Robinson (Vanderbilt University)
1225-1330 Lunch
Research Paper Session 3
1330-1400 Secure Detection Using Binary Sensors
Rohan Chabukswar, Yilin Mo, Bruno Sinopoli (Carnegie Mellon University)
1400-1430 Machine-Verified Network Controllers
Arjun Guha, Mark Reitblatt, Nate Foster (Cornell University)
1430-1500 Break
1500-1530 Design of Policy Engine to Prevent Malware Propagation in AMI
Younghee Park (San Jose State University) David M. Nicol, Huayiu Zhu (University of Illinois at Urbana-Champaign)
1530-1600 I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves
John Chuang, Hamilton Nguyen, Charles Wang, Benjamin Johnson (University of California, Berkeley)
1600-1630 TRUST Student Poster Session Introductions
1630 Reception / TRUST Poster Session

Thursday October 10, 2013
0730-0830 Breakfast
Research Paper Session 4
0830-0900 Characterization and Computation of Local Nash Equilibria in Continuous Games
Lillian J. Ratliff, Samuel A. Burden, S. Shankar Sastry (University of California, Berkeley)
0900-0930 Privacy in Europe: Initial Data on Governance Choices and Corporate Practices
Kenneth A. Bamberger, Deirdre Mulligan (University of California, Berkeley)
0930-1000 An Inverse Correlated Equilibrium Framework for Utility Learning in Multiplayer, Noncooperative Settings
Aaron Bestick, Lillian J. Ratliff, Posu Yan, Ruzena Bajcsy, S. Shankar Sastry (University of California, Berkeley)
1000-1030 Break
Research Paper Session 5
1030-1100 Visceral Targeting: Using Personalized Face Composites for Implicitly Targeted Marketing
Sonam Samat, Alessandro Acquisti, Ralph Gross, Eyal Pe'er (Carnegie Mellon University)
1100-1130 Understanding the Challenges with Medical Data Segmentation for Privacy
Ellick M. Chan, Peifung E. Lam, John C. Mitchell (Stanford University)
1130-1200 A Model-Integrated Authoring Environment for Privacy Policies
Andras Nadas, Tihamer Levendovszky, Ethan K. Jackson, Istvan Madaria, Janos Sztipanovits (Vanderbilt University)
1200-1230 Improved Support for Machine-Assisted Ballot-Level Audits
Eric Kim, Nicholas Carlini, Andrew Chang, George Yiu (University of California, Berkeley), Kai Wang (University of California, San Diego), David Wagner (University of California, Berkeley)
1230-1330 Lunch
Research Paper Session 6
1330-1400 Detecting Integrity Attacks on SCADA Systems
Yilin Mo, Rohan Chabukswar, Bruno Sinopoli (Carnegie Mellon University)
1400-1430 Knowledge-Preserving Interactive Coding
Kai-Min Chung, Rafael Pass, Sidharth Telang (Cornell University)
1430-1500 An Empirical Study of Vulnerability Rewards Programs
Matthew Finifter, Devdatta Akhawe, David Wagner (University of California, Berkeley)
1500 Conference End

Additional Information

If you have any questions or need more information, please contact Carolyn Winter, the TRUST Program Manager.