USF Dept of Computer Science and Engineering Programming Languages and Software Security Research Lab.

Slides:



Advertisements
Similar presentations
Creation of Automaton Classes from Graphical Models and Automatic Solution for Inverse Problem Yuri A. Gubin student of SPb SU ITMO supervised by Anatoly.
Advertisements

Jay Ligatti and Srikar Reddy University of South Florida.
Jay Ligatti, Billy Rickey, and Nalin Saigal Department of Computer Science and Engineering, University of South Florida LoPSiL: A Location-based Policy-
Software Engineering Laboratory, Department of Computer Science, Graduate School of Information Science and Technology, Osaka University Extraction of.
Modular Program Monitors David Walker Princeton University (joint work with Lujo Bauer and Jay Ligatti)
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
CIS 235: Networks Fall, 2007 Western State College Welcome to CIS 235 Computer Networks Fall, 2007 Prof Peterson.
Yan Chen Dept. of Computer Science Northwestern University Information Security Curriculum Development in Northwestern.
RubyPolish: Static Bug Detection in Ruby Programs John Locke Alex Mont.
More Enforceable Security Policies Lujo Bauer, Jay Ligatti and David Walker Princeton University (graciously presented by Iliano Cervesato)
Real-Time and Multimedia Systems Laboratory Carnegie Mellon System Integration Raj Rajkumar Professor, ECE and CS Director, Real-Time and Multimedia Systems.
Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus.
Social Interaction Lab Rensselaer Polytechnic Institute Led By: Prof. Mei Si Cognitive Science Department Games and Simulation Art and Science Program.
Increasing Student Involvement with Hands-on Activities in Online Computer Science Classes Dr. Wayne Summers, Dr. Bhagyavati, Prof. Chris Whitehead Columbus.
Modularizing Crosscutting Concerns in Software Nalin Saigal.
1.stránka 1. 2 Czech Technical University in Prague International Computer Science Program Faculty of Electrical Engineering OPEN INFORMATICS bachelor.
Introduction CS 3358 Data Structures. What is Computer Science? Computer Science is the study of algorithms, including their  Formal and mathematical.
The Science of Cyber Security Laurie Williams 1 Figure from IEEE Security and Privacy, May-June 2011 issue.
Korea Advanced Institute of Science and Technology, Dept. of EECS, Div. of CS, Information Systems Lab. 1/10 CS204 Course Overview Prof.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Engineering Secure Software. Vulnerability of the Day  Each day, we will cover a different type of code-level vulnerability Usually a demo How to avoid,
01 - Course Intro.CSC4071 CSC407S / 2103S Software Architecture & Design Prof. Penny Bahen 5228 Office hours: Wednesdays 10:00 – 11:00.
Interesting fact: The USF Board of Trustees was created in 2001 and is responsible for education and cost.
CSCI 6231 – Final Lecture Additional Resources and Topics.
A Self-Configuring Test Harness for Web Applications Jairo Pava School of Computing and Information Sciences Florida International University Courtney.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Computer Security coursework 3 (part 1) Dr Alexei Vernitski.
Computer Hardware Engineer In this field you have to know computer and electronics, engineering and technology. Also you need to know the English language.
A multidisciplinary graduate program in the Dietrich School dedicated to Applied Artificial Intelligence (AI) Program Goals Provide an outstanding interdisciplinary.
Computer Science Faculty School of Software Engineering C INTERPRETER AND DEBUGGER (ISO/IEC 9899:2011) Developer: student of 203SE group: Lukyanov Dmitry.
Carnegie Mellon University Computer Science Foundations for Ph.D. Students The Carnegie Mellon Perspective Computer Science Foundations for Ph.D. Students.
CS 1120: Computer Science II Software Life Cycle Slides courtesy of: Prof. Ajay Gupta and Prof. James Yang (format and other minor modifications by by.
CIS 105 Introduction to PC Computers and Applications Computer Science Program at UAA Final Presentation by Konstantin Khavanskii.
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Department of Computer Science and Automation Indian Institute of Science, Bangalore, India. CSA Research Areas Theoretical Computer Science.
Student Submissions Integrity Diagnosis System (SSID) Min-Yen Kan.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Coding, Crypto and Security at TU/e. Mathematics and Computer Science tics-and-computer-science/
Cluster Analysis Data Mining Experiment Department of Computer Science Shenzhen Graduate School Harbin Institute of Technology.
Who’s Sonifying Data and How are they doing it? A comparison of ICAD and other venues since 2009 Nick Bearman & Ethan Brown ICAD 2012.
Designing Lego Labs Using Lejos and Mindstorms Adapted from Lynn Stein “Radically ReThinking CS1” NSF Workshop.
HELP WANTED? Job prospects for CS Compensation (show me the money) Career networking.
MIS 4850 Systems Security Abdou Illia, Ph.D School of Business Eastern Illinois University (Monday 1/11/2016)
Software. Introduction n A computer can’t do anything without a program of instructions. n A program is a set of instructions a computer carries out.
Software Engineering Algorithms, Compilers, & Lifecycle.
LiveBinders AMELIA CLARK GLOVERVILLE ELEMENTARY SCHOOL.
HCC 831 User Interface Design and Evaluation. What is Usability?
Specialties Description
PhD at CSE: Overview CSE department offers Doctoral degree in the Computer Science (CS) or Computer Engineering areas (CpE) at both MS to PhD and BS to.
Department of Engineering
CSCI-235 Micro-Computer Applications
The road ahead This class is only the beginning.
Engaging Scientists and Engineers in Policy (ESEP) on Trellis
Computer, Communication and Information Sciences
Computer Programming LAB 1 Tejalal Choudhary Asst. Prof, CSE Dept.
Create PT: Complete the Task
NSF KDI: Networked Engineering
New Research in Software Security
NSF KDI: Networked Engineering
CS 1120: Computer Science II Software Life Cycle
Software Design Lecture : 15.
Software Design Lecture : 14.
User Interface Design and Evaluation
Energy-Efficient Storage Systems
Information Assurance & Network Security Certificate
Data-Driven Decision-Making
CS 1120: Computer Science II Software Life Cycle
Studies in Computer Programming
Re- engineeniering.
OpenSec:Policy-Based Security Using Software-Defined Networking
Presentation transcript:

USF Dept of Computer Science and Engineering Programming Languages and Software Security Research Lab

Programming Languages Projects  Purpose: Design new languages and type systems to make it easier to write correct code public class NoGPSoutsideWorkTime extends Policy { public synchronized Reaction react(Action a) { if(ActionPatterns.matchesGPSread(a) && !TimeUtils.isWorkTime()) //return a null location to application return new Reaction("replace", null); else return new Reaction("ok"); }  Example projects: LoPSiL, a language for writing security policies to control cell-phone software Polymer, a language for writing composeable security policies A program written in LoPSiL

Software Security Projects  Example projects: PoliSeer, a tool for visualizing and specifying security policies LookUp, an efficient algorithm for inspecting packets in network-security tools like firewalls and intrusion- detection systems PoliSeer screenshot  Purpose: Understand how to conveniently, efficiently, and correctly constrain software to make sure it’s secure

People  For more information, contact: Prof. Jay  Graduate students in lab Nalin Saigal (PhD student, 2006-present) Daniel Lomsak (PhD student 2008-present) Srikar Reddy (Master’s student 2007-present)  Alumni Billy Rickey (REU collaborator, 2007) Christine Cortés (REU collaborator, 2008)  Affiliates Lujo Bauer, Carnegie Mellon University Adriana Iamnitchi, University of South Florida Yannis Mallios, Carnegie Mellon University