2012 Science of Security Community Meeting Presentations

Augustinian and Manichaean Science

Peter Louis Galison is the Pellegrino University Professor in History of Science and of Physics at Harvard University. He received his Ph.D. from Harvard University in both Physics and the History of Science in 1983. In 1997 Galison was awarded a John D. and Catherine T. MacArthur Foundation Fellowship; won a 1998 Pfizer Award (forImage and Logic) as the best book that year in the History of Science; and in 1999 received the Max Planck and Humboldt Stiftung Prize. His publications include How Experiments End (1987), Einstein's Clocks, Poincare's Maps (2003), Image and Logic: A Material Culture of Microphysics (1997) and Einstein's Clocks, Poincare'sMaps: Empires of Time. His most recent book (2007), co-authored with Lorraine Daston, is titled Objectivity. Before moving to Harvard, Galison taught for several years at Stanford University where he was professor of History, Philosophy, and Physics. He is considered part of the Stanford School of philosophy of science along with Ian Hacking,John Dupre, and Nancy Cartwright. He has worked extensively with de-classified material in his studies of physics in the Cold War. His film on the moral-political debates over the H-bomb, "Ultimate Weapon: The H-bomb Dilemma" (44 minutes, with Pamela Hogan) has been shown frequently on the History Channel and is widely used in courses and seminars in the United States and abroad. Galison co-curated a major exhibition, "Iconoclash" at the German Media Museum (ZKM) in 2002. The show explored the battles between iconoclasm and iconophilia--the necessity and impossibility of images--in art, science, and religion.

Peter Galison

Other available formats:

Augustinian and Manichaean Science

UK Research Institute in Science of Cyber Security

M. Angela Sasse is the Professor of Human-Centered Technology and Head of Information Security Research in the Department of Computer Science at University College London (UCL), UK. She is also the Director of the new Academic Centre of Excellence for Research in Cybersecurity at UCL (a distinction awarded by the UK Government Communications Headquarters).A usability researcher by training, she started investigating the causes and effects of usability issues with security mechanisms in 1996. In addition to studying specific mechanisms such as passwords, biometrics, and access control, her research group has developed human-centered frameworks that explain the role of security, privacy, identity and trust in human interactions with technology. A list of projects and publications can be found at http://sec.cs.ucl.ac.uk/people/m_angela_sasse/.

License: 
Creative Commons 2.5
M. Angela Sasse

Other available formats:

UK Research Institute in Science of Cyber Security

Cyber Trust and Suspicion

Eunice Santos works in the areas of large-scale distributed processing, computational modeling, complex adaptive systems, and human modeling with applications to the biological, physical, and social sciences. She is the Founding Director of the Institute of Defense & Security. She also served as Chair of Computer Science. She joined the University of Texas at El Paso in 2009 after serving as a Senior Research Fellow at the US Department of Defense's Center for Technology and National Security Policy. She is also the Director of the National Center for Border Security and Immigration (a DHS Center of Excellence). Dr. Santos was a professor at Virginia Tech in the Department of Computer Science and the Genetics, Bioinformatics and Computational Biology (GBCB) Program. She was also a professor at Lehigh University in the Department of Electrical Engineering and Computer Science. She earned her PhD in Computer Science from the University of California, Berkeley, and has B.S. and M.S. degrees in both Mathematics and Computer Science. Dr. Santos has received numerous awards, including a National Science Foundation Career Award, the IEEE-CS Technical Achievement Award (for pioneering work in Computational Social Systems), and the Robinson Faculty Award. She has also received multiple teaching awards including the Spira Award for Excellence in Teaching. She is a past member of the IDA/DARPA Defense Science Study Group, and a member of several DoD senior technical advisory committees. She has served as a member of the Research & Technology Organization Task Group on Psycho-Social Models and Methods in NATO's Effects-Based Approach to Operations Programs.

Eunice E. Santos
Preview: Text

Other available formats:   

Cyber Trust and Suspicion
Switch to experimental viewer

Frontier: Beyond Technical Security:

Jeremy Epstein is Program Director for the NSF Secure and Trustworthy Cyberspace program. He's on loan to NSF from SRI International, where his research areas are voting systems security and software assurance, and where he also supported the DHS Science & Technology Directorate's research program. Over his 25 years working in information security, Jeremy has been a researcher, consultant, product developer, activist, and gadfly. He holds an M.S. in Computer Sciences from Purdue University, and completed all coursework for a PhD in Information Technology from George Mason University. Jeremy is also associate editor-in-chief of IEEE Security & Privacy magazine, president of Applied Computer Security Associates (sponsor of ACSAC, NSPW, and LASER), and proud father of three wonderful children.

Jeremy Epstein

Other available formats:

Frontier: Beyond Technical Security:

What If We Got A “Do-Over?”

Howard Shrobe joined DARPA as a Program Manager in 2012. His research Nathan and development interests relate to Cyber Resilience, Computer Architectures, Software Technologies and Artificial Intelligence with his initial focus being on new computer system architectures for secure and resilient computing. Dr. Shrobe joined DARPA from MIT's Computer Science and Artificial Intelligence Laboratory, with which he has been affiliated since, 1978, and for which he served as Associate Director of the Artificial Intelligence Laboratory from 1997 to 1998. Shrobe also has a previous tour with DARPA as a Chief Scientist in the Information Technology Office (1994 to 1997). Shrobe holds Doctors of Philosophy and Master of Science degrees in Computer Science from the Massachusetts Institute of Technology and a Bachelor of Science in Mathematics from Yale College.

License: 
Creative Commons 2.5
Howard Shrobe

Other available formats:

What If We Got A “Do-Over?”
Switch to experimental viewer

ARL Science of CyberSecurity: Needs and Approach

Rob Erbacher is a computer scientist performing computer security research at the Army Research Laboratory (ARL) in Adelphi, MD. At ARL Dr. Erbacher is cooperative agreement manager (CAM) for the Science for Cyber cooperative agreement. Before joining ARL he was a senior principal scientist with the Northwest Security Institute (NWSI), a non-profit research organization based in Redmond, WA. Prior to joining NWSI, Dr. Erbacher was faculty in the Department of Computer Science Department at Utah State University. Dr. Erbacher is an Associate Editor for the Journal of Electronic Imaging, Chaired the SPIE Conference on Visualization and Data Analysis for 13 years, is currently a steering committee member for the SPIE Conference on Visualization and Data Analysis, was general chair of the past two Workshops on Systematic Approaches to Digital Forensics Engineering and is now on the steering committee. Dr. Erbacher is on numerous other program committees related to digital forensics, computer security, and visualization and performs extensive reviewing for conferences and journals in these areas. He has over 60 publications in my research areas. In keeping with his research interests Dr. Erbacher spent the summers of 2004 through 2006 at AFRL's Rome Labs developing visualization for intrusion detection techniques for the air force under their summer faculty fellowship program. Dr. Erbacher received his BS in Computer Science from the University of Lowell in 1991 and his MS and ScD degrees in Computer Science from the University of Massachusetts-Lowell in 1993 and 1998, respectively. His research interests lie in digital forensics, situational awareness, computer security, information assurance, intrusion detection, visualization, cyber-terrorism, and cyber command and control.

Robert F. Erbacher

Other available formats:

ARL Science of CyberSecurity: Needs and Approach

Science of Cyber Security: Modeling, Composition, and Measurement

Andre Scedrov received his Ph.D. in Mathematics in 1981 at the State University of New York at Buffalo. He is a Professor of Mathematics and a Professor of Computer and Information Science at the University of Pennsylvania. His contributions are in logic, programming language semantics, and most recently, in information assurance. He has written over 90 research articles and several books. Prof. Scedrov has led two projects under the Critical Infrastructure Protection and High Confidence, Adaptable Software University Research Initiative. He is currently participating in two MURIs, "Collaborative policies and assured information sharing" and "Science of Cyber Security: Modeling, Composition, and Measurement". Prof. Scedrov currently serves on the editorial board of the Journal of Computer Security and on the program committee of the IEEE Computer Security Foundations Symposium.

License: 
Creative Commons 2.5
Andre Scedrov
John Mitchell

Other available formats:

Science of Cyber Security: Modeling, Composition, and Measurement
Switch to experimental viewer

Science of Security: Historical Perspective

Fred B. Schneider is Samuel B. Eckert Professor of Computer Science at Cornell University. He joined Cornell's faculty in Fall 1978, having completed a Ph.D. at Stony Brook University and a B.S. in Engineering at Cornell in 1975. Schneider currently also serves as the Chief Scientist for the NSF-funded TRUST Science and Technology Center. Schneider was elected Fellow of the American Association for the Advancement of Science (1992), the Association of Computing Machinery (1995), and the Institute of Electrical and Electronics Engineers (2008). He was named Professor-at-Large at the University of Tromso (Norway) in 1996 and was awarded a Doctor of Science [honoris causa] by the University of NewCastle-upon-Tyne in 2003 for his work in computer dependability and security. He received the 2012 IEEE Emanuel R. Piore Award for "contributions to trustworthy computing through novel approaches to security, fault-tolerance and formal methods for concurrent and distributed systems". The U.S. National Academy of Engineering elected Schneider to membership in 2011, and the Norges Tekniske Vitenskapsakademi (Norwegian Academy of Technological Sciences) named him a foreign member in 2010. In 2007, Schneider was elected to the board of directors of the Computing Research Association (CRA) and appointed to the steering committee of CRA's Computing Community Consortium. He also now chairs the Government Affairs committee of CRA. He is also a member of the Defense Science Board and is co-chair of Microsoft's Trustworthy Computing Academic Advisory Board.

License: 
Creative Commons 2.5
Fred B. Schneider

Other available formats:

Science of Security: Historical Perspective
Switch to experimental viewer

Industry Perspectives: What Industry Problems Motivate Research on Scientific Foundations?

Jay Lala (Raytheon)

Jay Lala is a Raytheon Principal Engineering Fellow. He has been the Chief Engineer for Raytheon's Cyber Range since 2010. Raytheon Company (NYSE: RTN), with 2011 sales of $25 billion and 71,000 employees worldwide, is a technology and innovation leader specializing in defense, homeland security and other government markets throughout the world. Raytheon's global headquarters is in Waltham, Mass. Dr. Lala is responsible for leading the cyber resilience testing of Raytheon's products, including weapon systems. As the Chief Engineer for the company's Cyber Range, he sets the company guidelines and standards for cyber testing and evaluation. He also serves on the Algorithms, Architecture, and Analysis Invention Review Committee. Dr. Lala is an internationally-recognized expert in real-time and mission-critical systems. His focus is on research & development, system architecture and design, with special emphasis on mission assurance properties such as fault-tolerance and cyber-resilience. Prior to the Chief Engineer role, he served as a Department Manager overseeing an engineering organization that he helped establish in Arlington, VA, with responsibilities for systems engineering of large, complex programs. He also served as a Technical Area Lead, responsible for development and execution of technology roadmaps for algorithms, processing, and cyber security.

Phil Enables (Goldman-Sachs)

Philip Enables is Goldman-Sachs' chief information risk officer. He leads the Information Security, Technology Risk and Business Continuity Programs. Philip co-chairs the Business Resilience Committee and is a member of the Firmwide Operational Risk Committee, the Technology Division Executive Committee, the Technology Division Operating Committee and the Technology Risk Committee. He joined Goldman Sachs as a vice president in London in 2000 and transferred to New York in 2001. Philip was named managing director in 2003 and partner in 2010. Prior to joining the firm, Philip was chief information security officer at Deutsche Bank. He also functioned as the global head of Technology Risk Management for Standard Chartered Bank and served in various technology and network management positions at Barclays Bank. Philip is a member of the BITS/FISAP Advisory Council and serves on the Committee of the US Financial Sector Security Coordinating Council. He is on the Board of Referees of the journal, Computers & Security, and the Board of Directors of the Center for Internet Security. Philip earned a BSc (Hons) in Computer Science from York University in the United Kingdom in 1989 and an MSc in Computation and Cryptography from the Queen's College at Oxford University in 1990. Additionally, he was awarded the designation of Chartered Engineer in 1995 and Chartered Scientist in 2002. In 2005, Philip was elected a Fellow of the British Computer Society.

Bret Hartman (Cisco)

As Vice President and Chief Technology Officer, Bret Hartman is responsible for defining the corporate security technology strategy for Cisco, as implemented by the Security and Government Group. Mr. Hartman has over thirty years of experience building information security solutions for major enterprises. His expertise includes cloud, virtualization, Service Oriented Architecture (SOA) and Web Services security, policy development and management, and security modeling and analysis. Mr. Hartman has spoken at dozens of security and privacy industry events and is a recognized authority on distributed systems security. Prior to Cisco, Mr. Hartman was Chief Technology Officer of RSA and an EMC Fellow, where he defined the security technology strategy for EMC. This strategy drove the acquisitions of RSA Security, Network Intelligence, Tablus, Archer, and NetWitness; and the creation of RSA, the Security Division of EMC, now generating $1B of revenue. Mr. Hartman's previous roles include Director of Technical Services for SOA Appliances at IBM Corporation; Vice President of Technology Solutions at DataPower Technology Inc. (acquired by IBM); Chief Technology Officer at Quadrasis Security (Hitachi Computer Products); Vice President, e-Security Services and Chief Security Architect at Concept Five Technology; President and Co-Founder of BlackWatch Technology Inc; and Director of Information Security at Odyssey Research Associates. Mr. Hartman began his distinguished career as a U.S. Air Force officer assigned to the U.S. National Security Agency. At the U.S. National Security Agency Mr. Hartman helped to create the "DoD Trusted Computer System Evaluation Criteria" (Orange Book). Mr. Hartman was a co-author of Object Management Group's CORBA Security specification, and co-edited the Security Scenarios document produced by the WS-I Basic Security Profile Working Group. Mr. Hartman also co-authored "Mastering Web Services Security" (Wiley 2003), "Enterprise Security with EJB and CORBA" (Wiley 2001), and US patent 6,807,636: "Methods and Apparatus for Facilitating Security in a Network". ./;.''''Mr. Hartman holds a B.S. in Computer Science & Engineering from Massachusetts Institute of Technology and an M.S. in Computer Science from the University of Maryland.

License: 
Creative Commons 2.5
Jay Lala
Phil Venables
Bret Hartman

Other available formats:

Industry Perspectives: What Industry Problems Motivate Research on Scientific Foundations?
Switch to experimental viewer

Science of Security Hard Problems: A Lablet Perspective

David Nicol (UIUC)

David Nicol and his students have been studying the security properties of large-scale systems through Project MOSES. The project is examining large-scale system behavior and developing simulation and modeling methodology that supports demonstration and evaluation of that behavior. Historically Prof. Nicol and his students have studied computer and communication networks. However, many of the techniques and tools they've developed have applications in other contexts. They use continuous, discrete-event, and hybrid models. Their recent work looks at issues in network security. For example, one project is modeling worm propagation and its interaction with the Internet's routing infrastructure. Another is developing and modeling security mechanisms in a p2p network designed to support the survivability of networks running critical infrastructure (e.g., SCADA systems). Still another is developing an on-line real-time network simulator of large-scale systems for use in exercise and scenario games used to evaluate how organizations respond to cyber-attacks.

William Sanders (UIUC)

William H. Sanders is a Donald Biggar Willett Professor of Engineering and the Director of the Coordinated Science Laboratory (www.csl.illinois.edu) at the University of Illinois at Urbana-Champaign. He is a professor in the Department of Electrical and Computer Engineering and Affiliate Professor in the Department of Computer Science. He is a Fellow of the IEEE and the ACM, a past Chair of the IEEE Technical Committee on Fault-Tolerant Computing, and past Vice-Chair of the IFIP Working Group 10.4 on Dependable Computing. He was the founding Director of the Information Trust Institute (www.iti.illinois.edu) at Illinois. Dr. Sanders's research interests include secure and dependable computing and security and dependability metrics and evaluation, with a focus on critical infrastructures. He has published more than 200 technical papers in those areas. He is currently the Director and PI of the DOE/DHS Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Center (www.tcipg.org), which is at the forefront of national efforts to make the U.S. power grid smart and resilient. He is also co-developer of three tools for assessing computer-based systems: METASAN, UltraSAN, and Mobius. Mobius and UltraSAN have been distributed widely to industry and academia; more than 500 licenses for the tools have been issued to universities, companies, and NASA for evaluating the performance, dependability, and security of a variety of systems. He is also a co-developer of the Loki distributed system fault injector, the AQuA/ITUA middlewares for providing dependability/security to distributed and networked applications, and the NetAPT (Network Access Policy Tool) for assessing the security of networked systems.

William Scherlis (CMU)

William L. Scherlis is a full Professor in the School of Computer Science at Carnegie Mellon. He is director of CMU's Institute for Software Research (ISR) in the School of Computer Science and the founding director of CMU's PhD Program in Software Engineering. Since Jan 2012 he has also been serving as Acting CTO for the Software Engineering Institute. His research relates to software assurance, software analysis, and assured safe concurrency. Dr. Scherlis joined the Carnegie Mellon faculty after completing a Ph.D. in Computer Science at Stanford University, a year at the University of Edinburgh (Scotland) as a John Knox Fellow, and an A.B. at Harvard University. He served at Defense Advanced Research Projects Agency (DARPA) for six years, departing in 1993 as a senior executive. Scherlis has led the Fluid Project for more than a decade, which has focused on achieving scalable software assurance through techniques and tools for "analysis-based verification," with an emphasis on properties related to concurrency, security, and component composition. The tools are based primarily on sound static analysis but also include dynamic and heuristic analysis. Scherlis has testified before Congress three times on matters related to innovation and computing. He chaired the National Research Council (NRC) study committee on defense software producibility, which in 2010 released its final report Critical Code: Software Producibility for Defense. He served multiple terms as a member of the DARPA Information Science and Technology Study Group (ISAT). He has been an advisor to major IT companies and is a founder of SureLogic and Panopto. He has served as program chair for a number of technical conferences, including the ACM Foundations of Software Engineering (FSE) Symposium. He has more than 80 scientific publications. He is a Fellow of the IEEE and a lifetime National Associate of the National Academy of Sciences.

Laurie Williams (NCSU)

Laurie Williams is Professor in the Computer Science Department of the College of Engineering at North Carolina State University (NCSU). Her research focuses on software security particularly in relation to healthcare IT; agile software development practices and processes; software reliability, software testing and analysis; open source software development; and broadening participation and increasing retention in computer science. Laurie's research has emphasized the importance of having practical relevance in software engineering research and providing research solutions to solve the problems faced in day-to-day software development. She leads the Software Engineering Realsearch research group at NCSU. With her students in the Realsearch group, Laurie has been involved in working collaboratively with high tech industries like ABB Corporation, Cisco, IBM Corporation, Microsoft, Nortel Networks, Red Hat, Sabre Airline Solutions, SAS, Tekelec, and healthcare IT organizations and on open source software. The Realsearch team works on research activities ranging from security issues in healthcare IT applications to software process to applying failure-prediction in-process during development to impact programmer productivity and ensure the development of high quality, reliable applications. The research collaborations have resulted in significant publications in the primary conferences in her research area maintaining a balance between research and practice in software engineering. Laurie has more than 170 refereed publications. Laurie was named an ACM Distinguished Scientist in 2011. Laurie is one of the foremost researchers in the security of healthcare IT applications and of agile software development. Laurie is the Director of the North Carolina State University Laboratory for Collaborative System Development and the software engineering area representative for the Secure Open Systems Initiative.

David M. Nicol
William H. Sanders
William L. Scherlis
Laurie A. Williams

Other available formats:

Science of Security Hard Problems: A Lablet Perspective

Science of Security Virtual Organization

Janos Sztipanovits is currently the E. Bronson Ingram Distinguished Professor of Engineering and professor of Electrical Engineering, Computer Science and Computer Engineering at Vanderbilt University. He is founding director of the Institute for Software Integrated Systems (ISIS) at Vanderbilt University. Between 1999 and 2002, he worked as program manager and acting deputy director of DARPA Information Technology Office. During his tenure at DARPA, he established and directed research programs in embedded software design (Model-Based Integration of Embedded Software, MoBIES) and networked embedded systems (Networked Embedded Systems Technology, NEST). Currently, he is member of the US Air Force Science Advisory Board. His research areas are at the intersection of systems and computer science and engineering. His current research interest is the foundation and applications of Model-Integrated Computing, an emerging model-based design technology for distributed embedded software, which is used in a wide range of defense and commercial systems. His other research contributions include structurally adaptive systems, autonomous systems, design space exploration and systems-security co-design technology. He has co-authored two books and over 200 papers.

Janos Sztipanovits

Other available formats:

Science of Security Virtual Organization

Significance of Science in NSA Research, and Scientific Needs for Defense of Cyberspace

Dr. Michael Wertheimer (born February 6, 1957) is a cryptologic mathematician. From October 31, 2005 until June 2009, he was the Assistant Deputy Director and Chief Technology Officer of the Office of the Director of National Intelligence for Analysis.[3] Dr. Wertheimer oversaw the coordination of Intelligence Community efforts to bring increased depth and accuracy to analysis through technology. In 2008, Dr. Wertheimer successfully launched A-Space, the U.S. Intelligence Community's "Facebook for Spies."[4] This new social network opened in September 2008 for U.S. intelligence analysts and covert operatives across some 16 intelligence agencies to share information with each other. He continues to advocate for Intelligence Community reforms and currently is involved in pressing for adoption of Intellipedia; a classified wiki.

Prior to this appointment, Dr. Wertheimer spent two years in industry building a research group focused on the intelligence community. From 1982 to 2003 he was a cryptologic mathematician at the National Security Agency. In 1999 he was selected as Technical Director for the Data Acquisition Office in the NSA's Signals Intelligence Directorate. He is the co-author of the 2001 Signals Intelligence Strategy and the 2002 SIGINT architecture model.

Dr. Wertheimer returned to the National Security Agency in June 2009 and in the June 2010 became its current Director for Research.

Michael Wertheimer

Other available formats:

Significance of Science in NSA Research, and Scientific Needs for Defense of Cyberspace

3 Dubious Concepts in Science of Security

Dusko Pavlovic is Professor of Information Security at Royal Holloway, University of London, and the founder of ASECOLAB (Adaptive Security and Economics Lab, asecolab.org). He also holds a part time Chair in Security at the University of Twente, and a Visiting Professorship at the University of Oxford. His work concerns a family of conceptual methods applied across a wide area of pure mathematics (geometry, graph theory, categories), theoretical computer science (semantics, symbolic computation, quantum computation), software engineering (specifications, tools), security (protocols, trust, obscurity) and network computation (search, concept analysis).

Dusko Pavlovic
Preview: Text

Other available formats:   

3 Dubious Concepts in Science of Security
Switch to experimental viewer