W ashington A rea T rustworthy C omputing H our

Slides:



Advertisements
Similar presentations
21 st Century Science and Education for Global Economic Competition William Y.B. Chang Director, NSF Beijing Office NATIONAL SCIENCE FOUNDATION.
Advertisements

The Messy World of Grey Literature in Cyber Security 8 th Grey Literature Conference 4-5 December 2006 New Orleans, Louisiana Patricia Erwin – I3P Senior.
The NeTS Program Dr. Joseph B. Evans Program Director Computer and Network Systems Computer & Information Science & Engineering National Science Foundation.
14th WATCH: Medical Device Cybersecurity: The First 164 Years Kevin Fu University of Massachusetts Amherst. THURSDAY November 15 th, Noon, Room 110 W ashington.
The Fellowships aim to: Educate scientists and engineers on the intricacies of federal policymaking Provide scientific and technical knowledge to support.
Copyright The New Yorker Cybersecurity Incident Reports and Repairs Office.
EInfrastructures (Internet and Grids) US Resource Centers Perspective: implementation and execution challenges Alan Blatecky Executive Director SDSC.
1 Secure Extramural Funding for IT Projects EDUCAUSE Mid-Atlantic Regional Conference January 14, 2004 Copyright Lawrence G. Gallery, This work is.
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
16th WATCH: Security, Cybercrime and Scale Cormac Herley Microsoft Research THURSDAY March 21 st, Noon, Room 110 W ashington A rea T rustworthy C omputing.
18th WATCH: An Experiment in Hiring Discrimination via Online Social Networks Alessandro Acquisti Carnegie Mellon University MONDAY Nov. 25 th, Noon, Room.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
The Computer Systems Research Program CSR Mohamed G. Gouda Program Director March 2012.
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
Stimulating and Supporting (Sustained) Collaborations NSF Workshop on Effective Engagement and Collaboration of US CISE - China Researchers Peter Arzberger.
29th WATCH: Cybersecurity for the Internet of Everything (IoE) Bret Hartman Cisco Systems, Inc. Thursday June 18, Noon, Room 110 W ashington A rea T rustworthy.
U.S. Department of Energy’s Office of Science Dr. Raymond Orbach February 25, 2003 Briefing for the Basic Energy Sciences Advisory Committee FY04 Budget.
SING* and ToNC * Scientific Foundations for Internet’s Next Generation Sirin Tekinay Program Director Theoretical Foundations Communication Research National.
Overview of the National Science Foundation (NSF) and the Major Research Instrumentation (MRI) Program Office of Integrative Activities National Science.
SKA-cba-ase NSF and Science of Design Avogadro Scale Engineering Center for Bits & Atoms November 18-19, 2003 Kamal Abdali Computing & Communication.
National Institute of Standards and Technology U.S. Department of Commerce TheTechnology Innovation Program (TIP) Standard Presentation of TIP Marc G.
29 Aug 2013 (Thu), Hanoi, Vietnam 2013 Springer SEA eBooks Seminar: Speaker Profiles.
David C. Croson, Ph.D. Office of the Assistant Director Directorate for Social, Behavioral, and Economic Sciences National Science Foundation
17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy.
26th WATCH: Differential Privacy: Theoretical and Practical Challenges Salil Vadhan Harvard University THURSDAY Jan. 15, Noon, Room 110 W ashington A rea.
21st WATCH: Increasing Trust in the E-Health Environment: Privacy Mechanisms and Policy Problems Maya Bernstein US Department of Health & Human Services.
The Declining Half Life of Secrets & the Future of Signals Intelligence Peter Swire Huang Professor of Law and Ethics Security & Human Behavior Conference.
5th WATCH: So what if I take over a botnet to do my research? An examination of the current state of Ethics in Information and Communications Technology.
A little history… CCCS Consortium Grants Colorado Lumina Initiative, Lumina Foundation A forerunner for the developmental education redesign.
Partnerships and Broadening Participation Dr. Nathaniel G. Pitts Director, Office of Integrative Activities May 18, 2004 Center.
Students Becoming Scientists in the World: Integrating Research and Education for Sustainable Development Dr. James P. Collins Directorate for the Biological.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Getting There: Example of Successfully Obtaining SaTC CAREER Award Dr. Oleg Komogortsev Associate Professor Department of Computer Science Texas State.
Directorate for Social, Behavioral, and Economic Sciences Amber L. Story Deputy Division Director Directorate for Social, Behavioral, and Economic Sciences.
Research Recommendations for the Broadband Taskforce Agenda November 23, 2009.
What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008.
Semantic Web Funding Organizers: Manfred Hauswirth, Amit Sheth Panelists: Mark Greaves, Todd Hughes, Isidro Laso-Ballesteros, James Milligan, Frank Olken.
11th WATCH: Security, Privacy, and Usability: Better Together Lorrie Cranor Computer Science & Engineering Science Policy Carnegie Mellon University THURSDAY.
Cyberinfrastructure A Status Report Deborah Crawford, Ph.D. Interim Director, Office of Cyberinfrastructure National Science Foundation.
NSF Programs and Possibilities Research Linkages EU-US 23 September 2004 Sylvia Spengler US National Science Foundation.
 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). 
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Cybersecurity: Think Globally, Act Locally Dr. Peter Freeman NSF Assistant Director for CISE Educause Net2003 April 30, 2003.
Introduction & NSF Overview NSF Tribal College Workshop November 14, 2008.
BY THE NUMBERS IOWA IN FY 2011 $55 Million: NSF funds awarded 25 th : National ranking in NSF funds 17: NSF-funded institutions 218: NSF grants awarded.
Keynote Talks: 10:00 AM to 10:15 AM:Dr. Iyad Obeid, Bringing Big Data to Bioengineering 10:15 AM to 10:45 AM:Dr. Chris Cieri, Data Center Models and Impact.
Congress created the NSF in 1950 as an independent federal agency. Budget ~$7.0 billion (2012) Funding for basic research.
Secure and Trustworthy Cyberspace (SaTC) “Top 10” Tips for SaTC Proposals One program director’s observations Sol Greenspan.
Cyberinfrastructure What is it? Russ Hobby Internet2 Joint Techs, 18 July 2007.
Cosc 4765 Computer Security Thinking beyond today.
NSF Cybersecurity Funding Opportunities Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure September 2015.
10th WATCH: Barriers to the Science of Security Tom Longstaff National Security Agency John Hopkins University THURSDAY March 15, Noon, Room 110 W ashington.
Cybersecurity Challenges and Opportunities Anita Nikolich Program Director, Advanced Cyberinfrastructure October 2015.
Cyberinfrastructure Overview Russ Hobby, Internet2 ECSU CI Days 4 January 2008.
DOE Data Management Plan Requirements
Office of Science Office of Science Advisory Committee Chairs Perspectives on the Department of Energy Office of Science - Issues and Opportunities in.
Digital Data Collections ARL, CNI, CLIR, and DLF Forum October 28, 2005 Washington DC Chris Greer Program Director National Science Foundation.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Keith A. Marzullo, Ph.D. CISE/CNS DD February 24, 2011 Welcome to the Directorate for Computer and Information Science and Engineering.
NSF Organization National Science Board Director & Deputy Director Computer & Information Sci & Eng Engineering Geo- Sciences Mathematical & Physical Sciences.
33rd WATCH: Privacy: Plural, Contextual, Contestable but not Unworkable Deirdre K. Mulligan University of California, Berkeley Thursday March 17, Noon,
Inspired by Biology From Molecules to Materials to Machines An NSF-supported assessment of the emerging scientific opportunities at the interface between.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
Tuesday, October 20, :10p.m. Featheringill Hall Room 138 “Virtual Surgery” PROFESSOR SUVRANU DE, SC.D. J Erik Jonsson ‘22 Distinguished Professor.
State and Future of Computing Mary Lou Soffa
NSF Faculty Early Career Development (CAREER) Program February 25, 2016.
Seminar Announcement December 24, Saturday, 15:00-17:00, Room: A302, WNLO Title: Quality-of-Experience (QoE) and Power Efficiency Tradeoff for Fog Computing.
Small Business Innovation Research & Small Business Technology Transfer Programs at the National Science Foundation Presenter: Ruth Shuman, Ph.D.
IT Applications with Emerging Techniques: Security Solutions
Artificial Intelligence and Trusted Microelectronics
Presentation transcript:

W ashington A rea T rustworthy C omputing H our 15th WATCH: Ultra Paranoid Computing Patrick Lincoln SRI International. THURSDAY January 17th, Noon, Room 110 Abstract What if every CPU in the universe is your worst enemy?  News stories have told us in recent years not only about traditional computers being "pwned“ by adversaries, but also the risks of computers in embedded devices like medical instruments and cars also being vulnerable to attack.  There is a lot of work on "what if one machine in your network is infected", and even some work where an adversary can pwn large numbers less than half of your network, and some where an adversary could pwn all but a handful, and there are a very small amount of work where all machines but two or three in the world are pwned.  But there is almost no work on what if adversary pwns every machine, including your laptop.  This talk will explore what happens in that case.  The work is very early, and more of a point of view than a research result or deployed system.  As part of this talk, Pat will discuss his recent work in Rubber Hose Resistant Passwords – passwords that can't be revealed even if the owner of the password seeks to reveal it, as well as his recent work in all optical cryptography for images. Speaker Dr. Patrick Lincoln is the Director of the Computer Science Laboratory of SRI International, where he has worked since 1989.  He is also the executive director of the Department-of-Homeland-Security-funded Cyber Security Research And Development Center, and he is the director of the SRI Center for Computational Biology.  Dr. Lincoln holds a Ph.D. in Computer Science from Stanford University and a B.Sc. in Computer Science from MIT.  He has previously held positions at MCC, Los Alamos National Laboratory, and ETA Systems.   Dr. Lincoln leads research in the fields of formal methods, computer security and privacy, computational biology, scalable distributed systems, and nano electronics. He has led multidisciplinary groups to high-impact research projects including symbolic systems biology, scalable anomaly detection, exquisitely sensitive biosensor systems, strategic reasoning and game theory, and privacy-preserving data sharing.  Dr. Lincoln has published dozens of influential papers, over a dozen patents, and has served on scientific advisory boards for private and publicly-held companies, nonprofits, and government agencies and departments. About the WATCH series: Transforming today’s trusted but untrustworthy cyberinfrastructure into one that can meet society’s growing demands requires both technical advances and improved understanding of how people and organizations of many backgrounds perceive, decide to adopt, and actually use technology. WATCH aims to provide thought-provoking talks by innovative thinkers with ideas that illuminate these challenges and provide signposts toward solutions. The series is jointly organized by NSF’s Computer Science and Engineering (CISE) and Social, Behavioral, and Economic (SBE) Directorates and the Office of Cyberinfrastructure (OCI), and sponsored by the CISE Secure and Trustworthy Cyberspace (SaTC) Program. Talks will be recorded and made available over the Internet. Thursday, January 17, 2012 NSF Stafford I Room 110, Noon Public Invited Questions/comments about WATCH? Contact Keith Marzullo kmarzull@nsf.gov