Welcome to the Cybersecurity Research Acceleration Workshop and Showcase, organized by the NSF Cybersecurity Center of Excellence and Internet2, hosted by the Indiana University Center for Applied Cybersecurity Research, taking place on Wednesday, October 11, 2017, in Indianapolis, IN. The workshop is funded by NSF EAGER #1650445 Cybersecurity Transition To Practice (TTP) Acceleration - https://www.nsf.gov/awardsearch/showAward?AWD_ID=1650445. The goal is to leverage Internet2 as a “matchmaker” between cybersecurity researchers, and practitioners in the Research & Education community.
Surveys for the workshop are still open! Please take a moment to share your feedback with us!
- Overall workshop satisfaction: http://bit.ly/ttpindyws
- Researcher feedback: http://bit.ly/ttpindyresearch
Pictures from the event are now available
Workshop attendees included university IT leadership and practitioners, cybersecurity researchers, and members of Industry.
Agenda
8:00-9:00AM: Breakfast, Registration, Networking
9:00 - 9:15AM: Kickoff - Von Welch (Indiana University), Mark Bruhn (Indiana University), Florence Hudson (Internet2)
9:15-10:15AM: CIO & Industry Perspective - Bruce Maas (University of Wisconsin/Internet2) to moderate: Cynthia Herrera Lindstrom (University of Illinois – Chicago), Ed Aractingi (Marshall University), Julie Johnson (Armored Things), Mark Bruhn (Indiana University), Mark Henderson (University of Illinois at Urbana-Champaign)
10:15-10:30AM: Break - Networking & Poster Sessions
10:30-11:30AM: Cybersecurity Research Panel: Internet of Things
Bimal Viswanath: Defending against Compromise and Manipulation of Mobile Communities
Sajal Das: Securing Smart Grid by Understanding Communications Infrastructure Dependencies
Shantanu Chakrabartty: Zero-Power Dynamic Signature for Trust Verification of Passive Sensors and Tags
Apu Kapadia: Pragmatic Privacy Controls in an Era of Sensor-Enabled Computing
11:30-12:30PM: Cybersecurity Research Panel: Data Analytics, Security & Privacy
Mathias Payer: Guarded Control-Flow and Data Privacy for Sensitive Data
Sameer Patil: Ideation Techniques to Facilitate System Design Compliant with Privacy Laws and Regulations
Raquel Hill: Leveling the Digital Playing Field for the Job Seeker
Philip Wilsey: Scalable Big Data Clustering by Random Projection Hashing
12:30-1:15PM: Lunch - Networking & Poster Sessions
1:15-1:30PM: Transitioning to Practice - Leveraging NSF TTP, Alec Yasinsac, University of South Alabama
1:30-2:30PM: Cybersecurity Research Panel: TTP Successes
Adam Slagell: Semantic Security Monitoring for Industrial Control Systems
Daniel Fabbri: Analysis and Tools for Auditing Insider Accesses
2:30-2:45PM: Break - Networking & Poster Sessions
2:45-3:45PM: Cybersecurity Research Panel: Network Security
Sonia Fahmy: Analysis, Partitioning, and Mapping Tools for Large Experiments
Zongming Fei: Enhancing Science Through Custom Paths For Trusted Users
Omar Chowdhury: A Principled Approach Aiding the Development of a Compliant Internet PKI
Yinqian Zhang: Rethinking Side Channel Security on Untrusted Operating Systems
3:45-4:15PM: Cybersecurity Researcher Panel: Data Analytics, Security & Privacy
Fang Liu: Protection of Data Privacy via Differentially Private Multiple Synthesis
Ruiyu Zhu: Efficient Secure Multiparty Computation of Large-Scale, Complex Protocols
4:15-5:00PM: Wrap Up - Von Welch (Indiana University), Bruce Maas (Internet2)
Researchers confirmed for this workshop include:
Indiana University
Raquel Hill: Leveling the Digital Playing Field for the Job Seeker
Apu Kapadia: Pragmatic Privacy Controls in an Era of Sensor-Enabled Computing
Sameer Patil: Ideation Techniques to Facilitate System Design Compliant with Privacy Laws and Regulations
Ruiyu Zhu: Efficient Secure Multiparty Computation of Large-Scale, Complex Protocols
Iowa State University
Missouri University of Science & Technology
Sajal Das: Securing Smart Grid by Understanding Communications Infrastructure Dependencies
Ohio State University
Yinqian Zhang: Rethinking Side Channel Security on Untrusted Operating Systems
Purdue University
Sonia Fahmy: Analysis, Partitioning, and Mapping Tools for Large Experiments
Mathias Payer: Guarded Control-Flow and Data Privacy for Sensitive Data
University of Chicago
Bimal Viswanath: Defending against Compromise and Manipulation of Mobile Communities
University of Cincinnati
Philip Wilsey: Scalable Big Data Clustering by Random Projection Hashing
University of Iowa
Omar Chowdhury: A Principled Approach Aiding the Development of a Compliant Internet PKI
University of Illinois at Urbana-Champaign
Adam Slagell: Semantic Security Monitoring for Industrial Control Systems
University of Kentucky
Zongming Fei: Enhancing Science Through Custom Paths For Trusted Users
University of Notre Dame
Fang Liu: Protection of Data Privacy via Differentially Private Multiple Synthesis
Vanderbilt University
Daniel Fabbri: Analysis and Tools for Auditing Insider Accesses
Washington University
Shantanu Chakrabartty: Zero-Power Dynamic Signature for Trust Verification of Passive Sensors and Tags