Science of Security Lablet Quarterly Meeting (NCSU)

Date: Jan 27, 2015 11:00 am – Jan 28, 2015 1:30 pm
Location: NC State University

Quarterly SoS Meeting at NC State

The Science of Security Quarterly Meeting at NC State University was held on Tuesday, January 27 and Wednesday, January 28, 2015.

The meeting was held in the Duke Energy Hall (DEH) on the 2nd floor of the James B. Hunt Jr. Library on the NC State Centennial Campus. 

Meeting Agenda

Tuesday, January 27

12:00 - 12:30 pm DEH Room C/D Lunch 

Welcome & Introductions 
Laurie Williams (NCSU), Munindar Singh (NCSU)
12:30 - 1:00 pm DEH Room A NSA Update- 
Stuart Krohn - Building a Science of Security: What's New and Interesting 
Stephanie Askins-Yannacci - Science of Security Quarterly Update
1:00 - 2:00 pm DEH Room A Keynote - Pete Loscocco 
Integrity Measurement: The Way Ahead, Knowing if your Systems Have Been Altered
2:00 - 2:15 pm   Break
2:15 - 4:00 pm DEH Room B Business Managers Financial Meeting - Stephanie Yannacci
2:15 - 2:45 pm DEH Room A CMU Research Update presentation I - Hanan Hibshi 
Assessment of Security Risk Perception in Composable Systems
2:45 - 3:15 pm DEH Room A Illinois Research Update presentation I - Ravi Iyer 
Preemptive Intrusion Detection: Theoretical Framework and Real World Measurements
3:15 - 3:45 pm DEH Room A Maryland Research Update presentation I - Poorvi Vora 
Protocols With Human Participants: Remote Voting
3:45 - 4:00 pm   Break
4:00 - 4:30 pm DEH Room B CPS-VO Presentation and Q & A Session - Heather Lucas
4:00 - 4:30 pm DEH Room A NCSU Research Update presentation I - William Enck 
Systematizing Isolation Techniques
4:30 - 5:00 pm DEH Room A CMU Research Update presentation II - Christian Kästner 
Analyzing Highly Configurable Systems
5:00 - 6:00 pm DEH Room A Closed PI Session
 

Wednesday, January 28

8:00 - 9:00 am DEH Room C/D Breakfast
9:00 - 9:30 am DEH Room A Best Scientific Cybersecurity Paper Competition - Stuart Krohn
9:30 - 10:00 am DEH Room A Lindsey McGowen 
Customized Bibliometrics for Evaluating Computer Science Research
10:00 - 10:15 am   Break
10:15 am - noon DEH Rooms A & B Workshop, Jeff Carver 
Hard Problems:  Analysis of Research Methods
Noon - 1:30 pm DEH Room C/D Lunch
12:15 - 1:30 pm DEH Room B Poster Session
1:30 - 2:00 pm DEH Room A Illinois Research Update presentation II - Matt Caesar 
Hypothesis Testing for Network Security 
2:00 - 2:30 pm DEH Room A Maryland Research Update presentation II - Peixin Gao 
Trust-Aware Social Recommender System Design
2:30 - 3:00 pm DEH Room A NCSU Research Update presentation II - Ehab Al-Shaer 
On Objective Resiliency Analysis of Smart Grid Energy Management Systems
 

Thursday, January 29

9:00 am - 3:00 pm 3300 Engineering Building II PI Annual Report work session

Travel to NCSU Centennial Campus

Centennial Campus Visitors

Hotel Accomodations

  • DoubleTree Hilton Brownstone-University
  • Embassy Suites Cary
  • Sheraton Raleigh Downtown

Directions to the James B. Hunt, Jr. Library

1070 Partners Way (Google Maps link)

Parking

Parking permits are available for purchase at the Centennial Campus Parking Booth on Varsity Drive on the NC State Centennial Campus.  Permits are $5 per day, and you can purchase a multi-day permit to cover your time at NC State.  Note:  only credit/debit card payments (Master Card, Visa, Discover and American Express) are accepted - no cash.  The booth is attended 7:00 am - 3:30 pm.

When you purchase your permit, please be sure to tell the attendant that you are attending an event at the Hunt Library and ask for directions to the nearest available lot/deck (large special events sometimes reserve space, but the attendant will know and direct you appropriately).  There are several parking decks & lots within a 5 minute (or less) walk to the Hunt Library.

The Hunt Library is near the bottom center of the map.  Click on "Parking - NCSU Deck" and "Parking - NCSU Parking Lot" to highlight parking on Centennial Campus.

Wireless Network Information

NCSU Guest Wireless Information

Questions

Posters

Presenter Co-Authors Poster Title Project
Vaira Selvakani Rada Chirkova 
Nirav Ajmeri 
Jon Doyle 
Jiaming Jiang 
Munindar Singh
Formal Specification and Analysis of Security - Critical Norms and Policies Formal Specification and Analysis of Security- Critical Norms and Policies
Alok Goel   Modeling Human Behavior from Low-Level Input Analytics Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Manish Singh Emerson Murphy-Hill Complexity of Policy Specifications for Software Developers Scientific Understanding of Policy Complexity
Maria Riaz Laurie Williams Reasoning about security requirements. Formal Specification and Analysis of Security- Critical Norms and Policies
Olga Zielinska Allaire Welk 
Christopher Mayhorn 
Emerson Murphy-Hill
Are You a Big Phish or a Small Potato? Analyzing Mental Models of Phishing. Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability
Donghoon Kim Mladen Vouk Securing Scientific Workflows with a Security Analytics Platform (SAP) for the Cloud Systematization of Knowledge from Intrusion Detection Models
Xianqing Yu Peng Ning 
Mladen Vouk
Securing Hadoop in Cloud Smart Isolation in Large-Scale Production Computing Infrastructures
Anoosha Vangaveeti Mladen Vouk An assessment of security problems in open source software. Resilience Requirements, Design, and Testing
Da Young Lee Mladen Vouk 
Laurie Williams
Using Software Reliability Models for Security Assessment Vulnerability and Resilience Prediction Models
Jason King   Logging Mechanism Metrics for Forensics Attack Surface and Defense-in-Depth Metrics
Yufan Huang Xiaofan He 
Huaiyu Dai
Systematization of metrics in intrusion detection systems Systematization of Knowledge from Intrusion Detection Models
Rahul Pandita Patrick Morrison Orthogonal Vulnerability Classification Vulnerability and Resilience Prediction Models
Hongying Du Bennett Narron 
Nirav Ajmeri 
Munindar P. Singh 
Jon Doyle 
Emily Berglund
Understanding Sanction under Variable Observability in a Secure, Collaborative Environment Understanding Effects of Norms and Policies on the Robustness, Liveness, and Resilience of Systems
Victor Heorhiadi Mike Reiter SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading Automated Synthesis of Resilient Architectures
Katie Dey Chris vanBuskirk Science of Security Virtual Organization  
William Emfinger Gabor Karsai Network Analysis Paradigm for Detecting and Mitigating Attacks from Malicious Actors  

 

 

  • 2015
  • Announcement
  • NCSU quarterly meeting
  • Science of Security
Submitted by David Wright on