AFOSR: Information, Operations, and Security Program Review
Information, Operations, and Security Program Review
October 1-5, 2012 | Arlington, VA
PROGRAM AGENDA
| Monday, 1 October 2012 | |
|---|---|
| 0900 - 1100 | Registration/Discussion |
| 1130 - 1230 | Lunch |
| 1230 - 1300 | Bob Herklotz |
| 1300 - 1330 | Weatherspoon |
| 1330 - 1400 | DHOSA: Defending Against Hostile Operating Systems David Wagner (UCB)/Sekar-Muri |
| 1400 - 1415 | Break |
| 1415 - 1445 | Gamble |
| 1445 - 1515 | CyberBAT: High Performance Cloud Auditing and Applications Keesook J. Han (AFRL/RIGA) |
| 1515 - 1530 | Han-Posters |
| 1530 - 1545 | Break |
| 1545 - 1600 | Han-Posters |
| 1600 - 1615 | Reuter |
| Tuesday, 2 October 2012 | |
| 0715 - 0800 | Registration/Discussion |
| 0800 - 0830 | AFRL/RH |
| 0830 - 0900 | Barellka |
| 0900 - 0915 | Break |
| 0915 - 0945 | Hirshfield |
| 0945 - 1015 | Santos Bri |
| 1015 - 1045 | Haas |
| 1045 - 1100 | Break |
| 1100 - 1130 | Using Computational Resources Without Assuming Their Correctness Michael Walfish |
| 1130 - 1200 | Halpern |
| 1200 - 1330 | Lunch |
| 1330 - 1400 | Controllability of Complex Networks Ying-Cheng Lai |
| 1400 - 1430 | Kantarcioglu |
| 1430 - 1445 | Break |
| 1445 - 1515 | Hamlen |
| 1515 - 1545 | Cybersecurity through Nimble Task Allocation: Workflow Reasoning for Mission-Centered Network Models Yolanda Gil (University of Southern California) |
| 1545 - 1615 | Kantarcioglu |
| 1615 - 1630 | Break |
| 1630 - 1715 | |
| Wednesday, 3 October 2012 | |
| 0715 - 0800 | Registration/Discussion |
| 0800 - 0830 | Ri/Shyne |
| 0830 - 0900 | Finin-Muri |
| 0900 - 0915 | Break |
| 0915 - 0945 | Deloach/Ou |
| 0945 - 1015 | Information Flow Integrity for Systems of Independently-Developed Components Trent Jaeger (Penn State University), Vinod Ganapathy (Penn State University), Somesh Jha (Penn State University) |
| 1015 - 1045 | Clarkson |
| 1045 - 1100 | Break |
| 1100 - 1130 | Mahoney |
| 1130 - 1200 | Lakhotia |
| 1200 - 1330 | Lunch |
| 1330 - 1400 | On the (Im)Possibility of Tamper-Resilient Cryptography Rafael Pass (Cornell University) |
| 1400 - 1430 | Appel/Hatcliff |
| 1430 - 1445 | Break |
| 1445 - 1515 | Cuff |
| 1515 - 1545 | Concurrency Attacks and Defenses Junfeng Yang (Columbia University) |
| 1545 - 1615 | Stochastic Cyber Attack Processes: Concept, Statistical Analysis Framework and Case Study D. Shouhuai Xu |
| 1615 - 1630 | Break |
| 1630 - 1700 | Protection of Mission-Critical Applications from Untrusted Execution Environments Kang G. Shin (The University of Michigan) |
| Thursday, 4 October 2012 | |
| 0715 - 0800 | Registration/Discussion |
| 0800 - 0830 | AFRL/RY |
| 0830 - 0900 | Fridrich |
| 0900 - 0915 | Break |
| 0915 - 0945 | Craver |
| 0945 - 1015 | Pados |
| 1015 - 1045 | |
| 1045 - 1100 | Break |
| 1100 - 1130 | Debray |
| 1130 - 1200 | Timing-based Inference: The Good, the Bad, and the Ugly Negar Kiyavash (University of Illinois) |
| 1200 - 1330 | Lunch |
| 1330 - 1400 | Brooks |
| 1400 - 1430 | |
| 1430 - 1445 | Break |
| 1445 - 1515 | Towards Practical Measures of Security Nathaniel Boggs (Columbia University) and Salvatore J. Stolfo (Columbia University) |
| 1515 - 1545 | Skormin |
| 1545 - 1600 | Break |
| 1600 - 1630 | Towards a Proof-Carrying Approach for Survivability Specification and Verification Yanjun Zuo (University of North Dakota) |
| 1630 - 1700 | B. Chen |
| 1700 - 1715 | |
| Friday, 5 October 2012 | |
| 0715 - 0800 | Registration/Discussion |
| 0800 - 0830 | Bob Herklotz |
| 0830 - 0900 | Dua |
| 0900 - 0915 | Break |
| 09115 - 0945 | Spohn |
| 0945 - 1015 | Integrating Programming Language and Operating System Information Security Mechanisms Stephen Chong (Harvard University) |
| 1015 - 1045 | Qu/Wu |
| 1045 - 1100 | Break |
| 1100 - 1130 | Scedrov-AIS MURI |
| 1130 - 1200 | Scedrov-SoS MURI |
| 1200 - 1330 | Lunch |
| 1330 - 1400 | Walker |
| 1400 - 1430 | Hsieh |
| 1430 - 1445 | Break |
| 1445 - 1515 | Musacchio |
| 1515 - 1545 | |
| 1545 - 1600 | Break |
| 1600 - 1630 | |
| 1630 - 1700 | |