AFOSR: Information, Operations, and Security Program Review

Information, Operations, and Security Program Review

October 1-5, 2012 | Arlington, VA

PROGRAM AGENDA

Monday, 1 October 2012
0900 - 1100 Registration/Discussion
1130 - 1230 Lunch
1230 - 1300 Bob Herklotz
1300 - 1330 Weatherspoon
1330 - 1400 DHOSA: Defending Against Hostile Operating Systems

David Wagner (UCB)/Sekar-Muri
1400 - 1415 Break
1415 - 1445 Gamble
1445 - 1515 CyberBAT: High Performance Cloud Auditing and Applications

Keesook J. Han (AFRL/RIGA)
1515 - 1530 Han-Posters
1530 - 1545 Break
1545 - 1600 Han-Posters
1600 - 1615 Reuter
Tuesday, 2 October 2012
0715 - 0800 Registration/Discussion
0800 - 0830 AFRL/RH
0830 - 0900 Barellka
0900 - 0915 Break
0915 - 0945 Hirshfield
0945 - 1015 Santos Bri
1015 - 1045 Haas
1045 - 1100 Break
1100 - 1130 Using Computational Resources Without Assuming Their Correctness

Michael Walfish
1130 - 1200 Halpern
1200 - 1330 Lunch
1330 - 1400 Controllability of Complex Networks

Ying-Cheng Lai
1400 - 1430 Kantarcioglu
1430 - 1445 Break
1445 - 1515 Hamlen
1515 - 1545 Cybersecurity through Nimble Task Allocation: Workflow Reasoning for Mission-Centered Network Models

Yolanda Gil (University of Southern California)
1545 - 1615 Kantarcioglu
1615 - 1630 Break
1630 - 1715  
Wednesday, 3 October 2012
0715 - 0800 Registration/Discussion
0800 - 0830 Ri/Shyne
0830 - 0900 Finin-Muri
0900 - 0915 Break
0915 - 0945 Deloach/Ou
0945 - 1015 Information Flow Integrity for Systems of Independently-Developed Components

Trent Jaeger (Penn State University), Vinod Ganapathy (Penn State University), Somesh Jha (Penn State University)
1015 - 1045 Clarkson
1045 - 1100 Break
1100 - 1130 Mahoney
1130 - 1200 Lakhotia
1200 - 1330 Lunch
1330 - 1400 On the (Im)Possibility of Tamper-Resilient Cryptography

Rafael Pass (Cornell University)
1400 - 1430 Appel/Hatcliff
1430 - 1445 Break
1445 - 1515 Cuff
1515 - 1545 Concurrency Attacks and Defenses

Junfeng Yang (Columbia University)
1545 - 1615 Stochastic Cyber Attack Processes: Concept, Statistical Analysis Framework and Case Study

D. Shouhuai Xu
1615 - 1630 Break
1630 - 1700 Protection of Mission-Critical Applications from Untrusted Execution Environments

Kang G. Shin (The University of Michigan)
Thursday, 4 October 2012
0715 - 0800 Registration/Discussion
0800 - 0830 AFRL/RY
0830 - 0900 Fridrich
0900 - 0915 Break
0915 - 0945 Craver
0945 - 1015 Pados
1015 - 1045  
1045 - 1100 Break
1100 - 1130 Debray
1130 - 1200 Timing-based Inference: The Good, the Bad, and the Ugly

Negar Kiyavash (University of Illinois)
1200 - 1330 Lunch
1330 - 1400 Brooks
1400 - 1430  
1430 - 1445 Break
1445 - 1515 Towards Practical Measures of Security

Nathaniel Boggs (Columbia University) and Salvatore J. Stolfo (Columbia University)
1515 - 1545 Skormin
1545 - 1600 Break
1600 - 1630 Towards a Proof-Carrying Approach for Survivability Specification and Verification

Yanjun Zuo (University of North Dakota)
1630 - 1700 B. Chen
1700 - 1715  
Friday, 5 October 2012
0715 - 0800 Registration/Discussion
0800 - 0830 Bob Herklotz
0830 - 0900 Dua
0900 - 0915 Break
09115 - 0945 Spohn
0945 - 1015 Integrating Programming Language and Operating System Information Security Mechanisms

Stephen Chong (Harvard University)
1015 - 1045 Qu/Wu
1045 - 1100 Break
1100 - 1130 Scedrov-AIS MURI
1130 - 1200 Scedrov-SoS MURI
1200 - 1330 Lunch
1330 - 1400 Walker
1400 - 1430 Hsieh
1430 - 1445 Break
1445 - 1515 Musacchio
1515 - 1545  
1545 - 1600 Break
1600 - 1630  
1630 - 1700