Presentations

file

Visible to the public HACSAW: A Trusted Framework for Cyber Situational Awareness

BIOS

file

Visible to the public Building a Virtually Air-gapped Secure Environment in AWS

BIOS

Erkang Zheng is a seasoned leader in cybersecurity with over 15 years of experience in all its domains from identity and access, penetration testing and incident response, to data, application and cloud security. He is passionate about combining innovation and execution to deliver practical solutions that address cybersecurity challenges at their root cause.

file

Visible to the public Quantifying the Security Effectiveness of Firewalls and DMZs

BIO

Huashan Chen is a second-year PhD student in the Department of Computer Science, University of Texas at San Antonio. He received the MS degree in 2016 from the Institute of Information Engineering, Chinese Academy of Sciences. His primary research interests are in cybersecurity, especially moving target defense and security metrics.

ABSTRACT

file

Visible to the public Application of Capability-Based Cyber Risk Assessment Methodology to a Space System

BIOS

Martha McNeil is a doctoral student at Dakota State University and is engaged in applied cyber security research at the Johns Hopkins University Applied Physics Laboratory. She holds a B.S. in Mathematics from Towson University and a M.S. in Computer Science from Johns Hopkins University.

file

Visible to the public Reinventing the Privilege Drop: How Principled Preservation of Programmer Intent Would Prevent Security Bugs

BIO

Ira Ray Jenkins is a Ph.D. student in the Trust Lab at Dartmouth College. Working with Dr. Sean Smith and Dr. Sergey Bratus, his research is focused on security and trust throughout the software and hardware stack. Previous work includes Zigbee network protocol analysis, secure boot for resource constrained devices, and hardware-based trust within IoT networks.