Science of Security Lablet Quarterly Meeting (NCSU)
Date: Jan 27, 2015 11:00 am – Jan 28, 2015 1:30 pm
Location: NC State University
Quarterly SoS Meeting at NC State
The Science of Security Quarterly Meeting at NC State University was held on Tuesday, January 27 and Wednesday, January 28, 2015.
The meeting was held in the Duke Energy Hall (DEH) on the 2nd floor of the James B. Hunt Jr. Library on the NC State Centennial Campus.
Meeting Agenda
Tuesday, January 27
12:00 - 12:30 pm
DEH Room C/D
Lunch
Welcome & Introductions
Laurie Williams (NCSU), Munindar Singh (NCSU)
12:30 - 1:00 pm
DEH Room A
NSA Update-
Stuart Krohn - Building a Science of Security: What's New and Interesting
Stephanie Askins-Yannacci - Science of Security Quarterly Update
1:00 - 2:00 pm
DEH Room A
Keynote - Pete Loscocco
Integrity Measurement: The Way Ahead, Knowing if your Systems Have Been Altered
2:00 - 2:15 pm
Break
2:15 - 4:00 pm
DEH Room B
Business Managers Financial Meeting - Stephanie Yannacci
2:15 - 2:45 pm
DEH Room A
CMU Research Update presentation I - Hanan Hibshi
Assessment of Security Risk Perception in Composable Systems
2:45 - 3:15 pm
DEH Room A
Illinois Research Update presentation I - Ravi Iyer
Preemptive Intrusion Detection: Theoretical Framework and Real World Measurements
3:15 - 3:45 pm
DEH Room A
Maryland Research Update presentation I - Poorvi Vora
Protocols With Human Participants: Remote Voting
3:45 - 4:00 pm
Break
4:00 - 4:30 pm
DEH Room B
CPS-VO Presentation and Q & A Session - Heather Lucas
4:00 - 4:30 pm
DEH Room A
NCSU Research Update presentation I - William Enck
Systematizing Isolation Techniques
4:30 - 5:00 pm
DEH Room A
CMU Research Update presentation II - Christian Kästner
Analyzing Highly Configurable Systems
5:00 - 6:00 pm
DEH Room A
Closed PI Session
Wednesday, January 28
8:00 - 9:00 am
DEH Room C/D
Breakfast
9:00 - 9:30 am
DEH Room A
Best Scientific Cybersecurity Paper Competition - Stuart Krohn
9:30 - 10:00 am
DEH Room A
Lindsey McGowen
Customized Bibliometrics for Evaluating Computer Science Research
10:00 - 10:15 am
Break
10:15 am - noon
DEH Rooms A & B
Workshop, Jeff Carver
Hard Problems: Analysis of Research Methods
Noon - 1:30 pm
DEH Room C/D
Lunch
12:15 - 1:30 pm
DEH Room B
Poster Session
1:30 - 2:00 pm
DEH Room A
Illinois Research Update presentation II - Matt Caesar
Hypothesis Testing for Network Security
2:00 - 2:30 pm
DEH Room A
Maryland Research Update presentation II - Peixin Gao
Trust-Aware Social Recommender System Design
2:30 - 3:00 pm
DEH Room A
NCSU Research Update presentation II - Ehab Al-Shaer
On Objective Resiliency Analysis of Smart Grid Energy Management Systems
Thursday, January 29
9:00 am - 3:00 pm
3300 Engineering Building II
PI Annual Report work session
Travel to NCSU Centennial Campus
Centennial Campus Visitors
Hotel Accomodations
- DoubleTree Hilton Brownstone-University
- Embassy Suites Cary
- Sheraton Raleigh Downtown
Directions to the James B. Hunt, Jr. Library
1070 Partners Way (Google Maps link)
Parking
Parking permits are available for purchase at the Centennial Campus Parking Booth on Varsity Drive on the NC State Centennial Campus. Permits are $5 per day, and you can purchase a multi-day permit to cover your time at NC State. Note: only credit/debit card payments (Master Card, Visa, Discover and American Express) are accepted - no cash. The booth is attended 7:00 am - 3:30 pm.
When you purchase your permit, please be sure to tell the attendant that you are attending an event at the Hunt Library and ask for directions to the nearest available lot/deck (large special events sometimes reserve space, but the attendant will know and direct you appropriately). There are several parking decks & lots within a 5 minute (or less) walk to the Hunt Library.
The Hunt Library is near the bottom center of the map. Click on "Parking - NCSU Deck" and "Parking - NCSU Parking Lot" to highlight parking on Centennial Campus.
Wireless Network Information
NCSU Guest Wireless Information
Questions
- If you have any questions about the technical portion of the meetings, please contact Laurie Williams (williams@csc.ncsu.edu) or Munindar Singh (mpsingh@ncsu.edu).
- If you have any questions regarding logistics, please contact David Wright (david_wright@ncsu.edu).
Posters
Presenter
Co-Authors
Poster Title
Project
Vaira Selvakani
Rada Chirkova
Nirav Ajmeri
Jon Doyle
Jiaming Jiang
Munindar Singh
Formal Specification and Analysis of Security - Critical Norms and Policies
Formal Specification and Analysis of Security- Critical Norms and Policies
Alok Goel
Modeling Human Behavior from Low-Level Input Analytics
Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Manish Singh
Emerson Murphy-Hill
Complexity of Policy Specifications for Software Developers
Scientific Understanding of Policy Complexity
Maria Riaz
Laurie Williams
Reasoning about security requirements.
Formal Specification and Analysis of Security- Critical Norms and Policies
Olga Zielinska
Allaire Welk
Christopher Mayhorn
Emerson Murphy-Hill
Are You a Big Phish or a Small Potato? Analyzing Mental Models of Phishing.
Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability
Donghoon Kim
Mladen Vouk
Securing Scientific Workflows with a Security Analytics Platform (SAP) for the Cloud
Systematization of Knowledge from Intrusion Detection Models
Xianqing Yu
Peng Ning
Mladen Vouk
Securing Hadoop in Cloud
Smart Isolation in Large-Scale Production Computing Infrastructures
Anoosha Vangaveeti
Mladen Vouk
An assessment of security problems in open source software.
Resilience Requirements, Design, and Testing
Da Young Lee
Mladen Vouk
Laurie Williams
Using Software Reliability Models for Security Assessment
Vulnerability and Resilience Prediction Models
Jason King
Logging Mechanism Metrics for Forensics
Attack Surface and Defense-in-Depth Metrics
Yufan Huang
Xiaofan He
Huaiyu Dai
Systematization of metrics in intrusion detection systems
Systematization of Knowledge from Intrusion Detection Models
Rahul Pandita
Patrick Morrison
Orthogonal Vulnerability Classification
Vulnerability and Resilience Prediction Models
Hongying Du
Bennett Narron
Nirav Ajmeri
Munindar P. Singh
Jon Doyle
Emily Berglund
Understanding Sanction under Variable Observability in a Secure, Collaborative Environment
Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Victor Heorhiadi
Mike Reiter
SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading
Automated Synthesis of Resilient Architectures
Katie Dey
Chris vanBuskirk
Science of Security Virtual Organization
William Emfinger
Gabor Karsai
Network Analysis Paradigm for Detecting and Mitigating Attacks from Malicious Actors
Submitted by David Wright
on
Quarterly SoS Meeting at NC State
The Science of Security Quarterly Meeting at NC State University was held on Tuesday, January 27 and Wednesday, January 28, 2015.
The meeting was held in the Duke Energy Hall (DEH) on the 2nd floor of the James B. Hunt Jr. Library on the NC State Centennial Campus.
Meeting Agenda
Tuesday, January 27 |
||
12:00 - 12:30 pm | DEH Room C/D | Lunch Welcome & Introductions Laurie Williams (NCSU), Munindar Singh (NCSU) |
12:30 - 1:00 pm | DEH Room A | NSA Update- Stuart Krohn - Building a Science of Security: What's New and Interesting Stephanie Askins-Yannacci - Science of Security Quarterly Update |
1:00 - 2:00 pm | DEH Room A | Keynote - Pete Loscocco Integrity Measurement: The Way Ahead, Knowing if your Systems Have Been Altered |
2:00 - 2:15 pm | Break | |
2:15 - 4:00 pm | DEH Room B | Business Managers Financial Meeting - Stephanie Yannacci |
2:15 - 2:45 pm | DEH Room A | CMU Research Update presentation I - Hanan Hibshi Assessment of Security Risk Perception in Composable Systems |
2:45 - 3:15 pm | DEH Room A | Illinois Research Update presentation I - Ravi Iyer Preemptive Intrusion Detection: Theoretical Framework and Real World Measurements |
3:15 - 3:45 pm | DEH Room A | Maryland Research Update presentation I - Poorvi Vora Protocols With Human Participants: Remote Voting |
3:45 - 4:00 pm | Break | |
4:00 - 4:30 pm | DEH Room B | CPS-VO Presentation and Q & A Session - Heather Lucas |
4:00 - 4:30 pm | DEH Room A | NCSU Research Update presentation I - William Enck Systematizing Isolation Techniques |
4:30 - 5:00 pm | DEH Room A | CMU Research Update presentation II - Christian Kästner Analyzing Highly Configurable Systems |
5:00 - 6:00 pm | DEH Room A | Closed PI Session |
Wednesday, January 28 |
||
8:00 - 9:00 am | DEH Room C/D | Breakfast |
9:00 - 9:30 am | DEH Room A | Best Scientific Cybersecurity Paper Competition - Stuart Krohn |
9:30 - 10:00 am | DEH Room A | Lindsey McGowen Customized Bibliometrics for Evaluating Computer Science Research |
10:00 - 10:15 am | Break | |
10:15 am - noon | DEH Rooms A & B | Workshop, Jeff Carver Hard Problems: Analysis of Research Methods |
Noon - 1:30 pm | DEH Room C/D | Lunch |
12:15 - 1:30 pm | DEH Room B | Poster Session |
1:30 - 2:00 pm | DEH Room A | Illinois Research Update presentation II - Matt Caesar Hypothesis Testing for Network Security |
2:00 - 2:30 pm | DEH Room A | Maryland Research Update presentation II - Peixin Gao Trust-Aware Social Recommender System Design |
2:30 - 3:00 pm | DEH Room A | NCSU Research Update presentation II - Ehab Al-Shaer On Objective Resiliency Analysis of Smart Grid Energy Management Systems |
Thursday, January 29 |
||
9:00 am - 3:00 pm | 3300 Engineering Building II | PI Annual Report work session |
Travel to NCSU Centennial Campus
Centennial Campus Visitors
Hotel Accomodations
- DoubleTree Hilton Brownstone-University
- Embassy Suites Cary
- Sheraton Raleigh Downtown
Directions to the James B. Hunt, Jr. Library
1070 Partners Way (Google Maps link)
Parking
Parking permits are available for purchase at the Centennial Campus Parking Booth on Varsity Drive on the NC State Centennial Campus. Permits are $5 per day, and you can purchase a multi-day permit to cover your time at NC State. Note: only credit/debit card payments (Master Card, Visa, Discover and American Express) are accepted - no cash. The booth is attended 7:00 am - 3:30 pm.
When you purchase your permit, please be sure to tell the attendant that you are attending an event at the Hunt Library and ask for directions to the nearest available lot/deck (large special events sometimes reserve space, but the attendant will know and direct you appropriately). There are several parking decks & lots within a 5 minute (or less) walk to the Hunt Library.
The Hunt Library is near the bottom center of the map. Click on "Parking - NCSU Deck" and "Parking - NCSU Parking Lot" to highlight parking on Centennial Campus.
Wireless Network Information
NCSU Guest Wireless Information
Questions
- If you have any questions about the technical portion of the meetings, please contact Laurie Williams (williams@csc.ncsu.edu) or Munindar Singh (mpsingh@ncsu.edu).
- If you have any questions regarding logistics, please contact David Wright (david_wright@ncsu.edu).
Posters
Presenter | Co-Authors | Poster Title | Project |
Vaira Selvakani | Rada Chirkova Nirav Ajmeri Jon Doyle Jiaming Jiang Munindar Singh |
Formal Specification and Analysis of Security - Critical Norms and Policies | Formal Specification and Analysis of Security- Critical Norms and Policies |
Alok Goel | Modeling Human Behavior from Low-Level Input Analytics | Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security | |
Manish Singh | Emerson Murphy-Hill | Complexity of Policy Specifications for Software Developers | Scientific Understanding of Policy Complexity |
Maria Riaz | Laurie Williams | Reasoning about security requirements. | Formal Specification and Analysis of Security- Critical Norms and Policies |
Olga Zielinska | Allaire Welk Christopher Mayhorn Emerson Murphy-Hill |
Are You a Big Phish or a Small Potato? Analyzing Mental Models of Phishing. | Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability |
Donghoon Kim | Mladen Vouk | Securing Scientific Workflows with a Security Analytics Platform (SAP) for the Cloud | Systematization of Knowledge from Intrusion Detection Models |
Xianqing Yu | Peng Ning Mladen Vouk |
Securing Hadoop in Cloud | Smart Isolation in Large-Scale Production Computing Infrastructures |
Anoosha Vangaveeti | Mladen Vouk | An assessment of security problems in open source software. | Resilience Requirements, Design, and Testing |
Da Young Lee | Mladen Vouk Laurie Williams |
Using Software Reliability Models for Security Assessment | Vulnerability and Resilience Prediction Models |
Jason King | Logging Mechanism Metrics for Forensics | Attack Surface and Defense-in-Depth Metrics | |
Yufan Huang | Xiaofan He Huaiyu Dai |
Systematization of metrics in intrusion detection systems | Systematization of Knowledge from Intrusion Detection Models |
Rahul Pandita | Patrick Morrison | Orthogonal Vulnerability Classification | Vulnerability and Resilience Prediction Models |
Hongying Du | Bennett Narron Nirav Ajmeri Munindar P. Singh Jon Doyle Emily Berglund |
Understanding Sanction under Variable Observability in a Secure, Collaborative Environment | Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems |
Victor Heorhiadi | Mike Reiter | SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading | Automated Synthesis of Resilient Architectures |
Katie Dey | Chris vanBuskirk | Science of Security Virtual Organization | |
William Emfinger | Gabor Karsai | Network Analysis Paradigm for Detecting and Mitigating Attacks from Malicious Actors |