TRUST Autumn 2013 Conference: October 9-10, 2013
|
The Autumn 2013 TRUST Conference will be held |
This event provides attendees with an opportunity to hear firsthand about the work of TRUST faculty and students-specifically activities that:
- Advance a leading-edge research agenda to improve the state-of-the art in cyber security and critical infrastructure protection;
- Develop robust education and diversity plans to teach the next generation of computer scientists, engineers, and social scientists; and
- Pursue knowledge transfer opportunities to transition TRUST results to end users within industry and the government.
Key Dates
September 12September 20 - Room Reservation Deadline. Please note that the room reservation deadline has now passed.September 20September 27 - Conference Registration Deadline Please note that the registration deadline has now passed.- October 9-10 - Conference Dates
Conference Registration
Registration for the Autumn 2013 TRUST Conference is now closed.
Conference Poster Session
The TRUST Conference will include an extended session when posters of TRUST research are displayed. This is an opportunity for conference attendees to learn more about TRUST research projects and talk one-on-one with TRUST researchers.
TRUST STUDENTS/POST DOCS: If you are a TRUST student or post doc attending the conference, please plan on displaying a poster of your TRUST-related research. A poster template in PowerPoint is available here. Prior to the conference, please print your poster in color on 40" W x 30" H paper and mount it on poster board if you wish (though this is not necessary). TRUST will provide poster board, easels, and clips for mounting and displaying your posters. It is up to you to print your own poster and get it to the conference. If you do not have the capability at your university to print in color and in a large format (e.g., on a plotter) your local copy shop should be able to do the job. If you have any questions regarding the posters, please contact Carolyn Winter, the TRUST Program Manager, and she will be glad to assist you.Conference Venue and Accommodations
The conference will take place at the
University of California, Washington Center (UCDC).
We have reserved a block of rooms at the following hotel:
DoubleTree by Hilton Hotel, Washington DC
1515 Rhode Island Avenue, NW, Washington, DC 20005
1-202-232-7000
Please note that the deadline for making your room reservation was September 20th, 2013 and our room block is no longer available. You can contact the DoubleTree Hotel directly to inquire about room availability.
Conference Program
Below is the conference program. This program represents the latest information available but is subject to change.
A PDF version of the conference program is available here.
Wednesday | October 9, 2013 |
0700-0810 | Breakfast |
0810-0820 | Conference Welcome |
Research Paper Session 1 | |
0820-0850 | Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace |
Nicolas Christin (Carnegie Mellon University) | |
0850-0920 | PolicyForge: A Collaborative Environment for Formalizing Privacy Policies in Health Care |
Andras Nadas, Laszlo Juracz, Janos Sztipanovits (Institute for Software Integrated Systems, Vanderbilt University), Mark E. Frisse, Ann J. Olsen (Vanderbilt University Medical Center) | |
0920-0950 | A Dynamical Systems Approach to Energy Disaggregation |
Roy Dong, Lillian Ratliff, Henrik Ohlsson, S. Shankar Sastry (University of California, Berkeley) | |
0950-1020 | Evolving Role Definitions Through Permission Invocation Patterns |
Wen Zhang, You Chen (Vanderbilt University) Carl A. Gunter (University of Illinois at Urbana-Champaign) David Liebovitz (Northwestern University) Bradley Malin (Vanderbilt University) | |
1000-1030 | Break |
Research Paper Session 2 | |
1030-1105 | Key Homomorphic PRFs and Their Applications |
Dan Boneh, Kevin Lewi, Hart Montgomery, Ananth Raghunathan (Stanford University) | |
1105-1135 | Naturally Rehearsing Passwords |
Jeremiah Blocki, Manuel Blum, Anupam Datta (Carnegie Mellon University) | |
1135-1155 | SoNIC: Precise Realtime Software Access and Control of Wired Networks |
Ki Suh Lee, Han Wang, Hakim Weatherspoon (Cornell University) | |
1155-1225 | Analysis of Data-Leak Hardware Trojans in AES Cryptographic Circuits |
Trey Reece, William H. Robinson (Vanderbilt University) | |
1225-1330 | Lunch |
Research Paper Session 3 | |
1330-1400 | Secure Detection Using Binary Sensors |
Rohan Chabukswar, Yilin Mo, Bruno Sinopoli (Carnegie Mellon University) | |
1400-1430 | Machine-Verified Network Controllers |
Arjun Guha, Mark Reitblatt, Nate Foster (Cornell University) | |
1430-1500 | Break |
1500-1530 | Design of Policy Engine to Prevent Malware Propagation in AMI |
Younghee Park (San Jose State University) David M. Nicol, Huayiu Zhu (University of Illinois at Urbana-Champaign) | |
1530-1600 | I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves |
John Chuang, Hamilton Nguyen, Charles Wang, Benjamin Johnson (University of California, Berkeley) | |
1600-1630 | TRUST Student Poster Session Introductions |
1630 | Reception / TRUST Poster Session |
Thursday | October 10, 2013 |
0730-0830 | Breakfast |
Research Paper Session 4 | |
0830-0900 | Characterization and Computation of Local Nash Equilibria in Continuous Games |
Lillian J. Ratliff, Samuel A. Burden, S. Shankar Sastry (University of California, Berkeley) | |
0900-0930 | Privacy in Europe: Initial Data on Governance Choices and Corporate Practices |
Kenneth A. Bamberger, Deirdre Mulligan (University of California, Berkeley) | |
0930-1000 | An Inverse Correlated Equilibrium Framework for Utility Learning in Multiplayer, Noncooperative Settings |
Aaron Bestick, Lillian J. Ratliff, Posu Yan, Ruzena Bajcsy, S. Shankar Sastry (University of California, Berkeley) | |
1000-1030 | Break |
Research Paper Session 5 | |
1030-1100 | Visceral Targeting: Using Personalized Face Composites for Implicitly Targeted Marketing |
Sonam Samat, Alessandro Acquisti, Ralph Gross, Eyal Pe'er (Carnegie Mellon University) | |
1100-1130 | Understanding the Challenges with Medical Data Segmentation for Privacy |
Ellick M. Chan, Peifung E. Lam, John C. Mitchell (Stanford University) | |
1130-1200 | A Model-Integrated Authoring Environment for Privacy Policies |
Andras Nadas, Tihamer Levendovszky, Ethan K. Jackson, Istvan Madaria, Janos Sztipanovits (Vanderbilt University) | |
1200-1230 | Improved Support for Machine-Assisted Ballot-Level Audits |
Eric Kim, Nicholas Carlini, Andrew Chang, George Yiu (University of California, Berkeley), Kai Wang (University of California, San Diego), David Wagner (University of California, Berkeley) | |
1230-1330 | Lunch |
Research Paper Session 6 | |
1330-1400 | Detecting Integrity Attacks on SCADA Systems |
Yilin Mo, Rohan Chabukswar, Bruno Sinopoli (Carnegie Mellon University) | |
1400-1430 | Knowledge-Preserving Interactive Coding |
Kai-Min Chung, Rafael Pass, Sidharth Telang (Cornell University) | |
1430-1500 | An Empirical Study of Vulnerability Rewards Programs |
Matthew Finifter, Devdatta Akhawe, David Wagner (University of California, Berkeley) | |
1500 | Conference End |
Additional Information
If you have any questions or need more information, please contact
Carolyn Winter, the TRUST Program Manager.