AFOSR: Information, Operations, and Security Program Review
Information, Operations, and Security Program Review
October 1-5, 2012 | Arlington, VA
PROGRAM AGENDA
Monday, 1 October 2012 | |
---|---|
0900 - 1100 | Registration/Discussion |
1130 - 1230 | Lunch |
1230 - 1300 | Bob Herklotz |
1300 - 1330 | Weatherspoon |
1330 - 1400 | DHOSA: Defending Against Hostile Operating Systems David Wagner (UCB)/Sekar-Muri |
1400 - 1415 | Break |
1415 - 1445 | Gamble |
1445 - 1515 | CyberBAT: High Performance Cloud Auditing and Applications Keesook J. Han (AFRL/RIGA) |
1515 - 1530 | Han-Posters |
1530 - 1545 | Break |
1545 - 1600 | Han-Posters |
1600 - 1615 | Reuter |
Tuesday, 2 October 2012 | |
0715 - 0800 | Registration/Discussion |
0800 - 0830 | AFRL/RH |
0830 - 0900 | Barellka |
0900 - 0915 | Break |
0915 - 0945 | Hirshfield |
0945 - 1015 | Santos Bri |
1015 - 1045 | Haas |
1045 - 1100 | Break |
1100 - 1130 | Using Computational Resources Without Assuming Their Correctness Michael Walfish |
1130 - 1200 | Halpern |
1200 - 1330 | Lunch |
1330 - 1400 | Controllability of Complex Networks Ying-Cheng Lai |
1400 - 1430 | Kantarcioglu |
1430 - 1445 | Break |
1445 - 1515 | Hamlen |
1515 - 1545 | Cybersecurity through Nimble Task Allocation: Workflow Reasoning for Mission-Centered Network Models Yolanda Gil (University of Southern California) |
1545 - 1615 | Kantarcioglu |
1615 - 1630 | Break |
1630 - 1715 | |
Wednesday, 3 October 2012 | |
0715 - 0800 | Registration/Discussion |
0800 - 0830 | Ri/Shyne |
0830 - 0900 | Finin-Muri |
0900 - 0915 | Break |
0915 - 0945 | Deloach/Ou |
0945 - 1015 | Information Flow Integrity for Systems of Independently-Developed Components Trent Jaeger (Penn State University), Vinod Ganapathy (Penn State University), Somesh Jha (Penn State University) |
1015 - 1045 | Clarkson |
1045 - 1100 | Break |
1100 - 1130 | Mahoney |
1130 - 1200 | Lakhotia |
1200 - 1330 | Lunch |
1330 - 1400 | On the (Im)Possibility of Tamper-Resilient Cryptography Rafael Pass (Cornell University) |
1400 - 1430 | Appel/Hatcliff |
1430 - 1445 | Break |
1445 - 1515 | Cuff |
1515 - 1545 | Concurrency Attacks and Defenses Junfeng Yang (Columbia University) |
1545 - 1615 | Stochastic Cyber Attack Processes: Concept, Statistical Analysis Framework and Case Study D. Shouhuai Xu |
1615 - 1630 | Break |
1630 - 1700 | Protection of Mission-Critical Applications from Untrusted Execution Environments Kang G. Shin (The University of Michigan) |
Thursday, 4 October 2012 | |
0715 - 0800 | Registration/Discussion |
0800 - 0830 | AFRL/RY |
0830 - 0900 | Fridrich |
0900 - 0915 | Break |
0915 - 0945 | Craver |
0945 - 1015 | Pados |
1015 - 1045 | |
1045 - 1100 | Break |
1100 - 1130 | Debray |
1130 - 1200 | Timing-based Inference: The Good, the Bad, and the Ugly Negar Kiyavash (University of Illinois) |
1200 - 1330 | Lunch |
1330 - 1400 | Brooks |
1400 - 1430 | |
1430 - 1445 | Break |
1445 - 1515 | Towards Practical Measures of Security Nathaniel Boggs (Columbia University) and Salvatore J. Stolfo (Columbia University) |
1515 - 1545 | Skormin |
1545 - 1600 | Break |
1600 - 1630 | Towards a Proof-Carrying Approach for Survivability Specification and Verification Yanjun Zuo (University of North Dakota) |
1630 - 1700 | B. Chen |
1700 - 1715 | |
Friday, 5 October 2012 | |
0715 - 0800 | Registration/Discussion |
0800 - 0830 | Bob Herklotz |
0830 - 0900 | Dua |
0900 - 0915 | Break |
09115 - 0945 | Spohn |
0945 - 1015 | Integrating Programming Language and Operating System Information Security Mechanisms Stephen Chong (Harvard University) |
1015 - 1045 | Qu/Wu |
1045 - 1100 | Break |
1100 - 1130 | Scedrov-AIS MURI |
1130 - 1200 | Scedrov-SoS MURI |
1200 - 1330 | Lunch |
1330 - 1400 | Walker |
1400 - 1430 | Hsieh |
1430 - 1445 | Break |
1445 - 1515 | Musacchio |
1515 - 1545 | |
1545 - 1600 | Break |
1600 - 1630 | |
1630 - 1700 |