Check out the new USENIX Web site.
CSET '10 Banner


WORKSHOP PROGRAM

All sessions will take place in Coolidge unless otherwise noted.

Session papers are available to workshop registrants immediately and to everyone beginning August 9, 2010.

Monday, August 9, 2010
9:00 a.m.–9:15 a.m.

Opening Remarks
Jelena Mirkovic and Angelos Stavrou, CSET '10 Program Co-Chairs

9:15 a.m.–9:45 a.m.

Keynote Address

The Role of Testbeds in Cyber Security Research
Doug Maughan, Department of Homeland Security

View the presentation slides

9:45 a.m.–10:00 a.m.    Break
10:00 a.m.–11:30 a.m.

Testbeds

UPBOT: A Testbed for Cyber-Physical Systems
Tanya L. Crenshaw and Steven Beyer, University of Portland

Read the Abstract | Full paper | Slides

Trusted Disk Loading in the Emulab Network Testbed
Cody Cutler, Mike Hibler, Eric Eide, and Robert Ricci, University of Utah

Read the Abstract | Full paper | Slides

Isolated Virtualised Clusters: Testbeds for High-Risk Security Experimentation and Training
Joan Calvet, École Polytechnique de Montréal and LORIA; Carlton R. Davis and José M. Fernandez, École Polytechnique de Montréal; Wadie Guizani, Mathieu Kaczmarek, and Jean-Yves Marion, LORIA; Pier-Luc St-Onge, École Polytechnique de Montréal

Read the Abstract | Full paper | Slides

11:30 a.m.–11:45 p.m.    Break
11:45 a.m.–12:45 p.m.

Education

Experiences with Practice-Focused Undergraduate Security Education
Robert L. Fanelli and Terrence J. O'Connor, United States Military Academy

Read the Abstract | Full paper | Slides

The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness
George Louthan, Warren Roberts, Matthew Butler, and John Hale, Institute for Information Security, The University of Tulsa

Read the Abstract | Full paper | Slides

12:45 p.m.–2:15 p.m.    Workshop Luncheon, Thurgood Marshall South West
2:15 p.m.–3:15 p.m.

Education

Security Exercises for the Online Classroom with DETER
Peter A.H. Peterson and Peter L. Reiher, University of California, Los Angeles

Read the Abstract | Full paper | Slides

Webseclab Security Education Workbench
Elie Bursztein, Baptiste Gourdin, Celine Fabry, Jason Bau, Gustav Rydstedt, Hristo Bojinov, Dan Boneh, and John C. Mitchell, Stanford University

Read the Abstract | Full paper | Slides

3:15 p.m.–3:30 p.m.    Break
3:30 p.m.–4:10 p.m.

Open Floor: WiP/Brainstorming

The workshop will have a Work-in-Progress section that will contain short (5 min.) presentations of ongoing work in cyber security experimentation. The complete list of accepted WiPs appears here; the session is now full.

4:10 p.m.–5:10 p.m.

Panel

Security Experimentation with Cyber-Physical Devices
Moderator: Clifford Neuman, USC/ISI

Participants: Deborah Frincke, Chief Scientist, Pacific Northwest National Laboratory; Kevin Fu, Assistant Professor, University of Massachusetts Amherst; Tadayoshi Kohno, Assistant Professor, University of Washington; Marcelo Masera, Scientific Officer, EU Joint Research Center, Ispara, Italy

The term "cyber-physical systems" refers to the tight coupling of computational and physical resources, where the synergy of these two environments enables novel uses of the system and improves its robustness. For example, critical infrastructures such as power, water, and sewage are increasingly being heavily networked, as is air, rail, and ship traffic control. An emerging trend in vehicular technologies calls for vehicles that can talk to each other and to base stations along the roads and that can also tap into the public Internet. Medical devices are being equipped with connectivity so that they can be programmed or read remotely by physicians.

This intersection of networking and the physical world poses unique security challenges, as cyber attacks could wreak enormous damage and endanger human lives. Realistic and efficient experimentation platforms are needed to assess this threat and evaluate possible defenses. This panel will discuss challenges and propose solutions to security experimentation with cyber-physical systems, including:

  • the choice of appropriate evaluation platforms and evaluation approaches
  • how/where to gather appropriate and realistic data about cyber-physical system behavior and relevant security threats
  • how to reproduce data in an experimental setting with a high degree of precision and fidelity
  • how to transition ideas and prototypes into real-world systems

5:30 p.m.–7:00 p.m.    Reception: Sponsored by Deutsche Post, Hoover

Reception

Join Deutsche Post for a dinner reception on Monday evening. They will be announcing the launch of a new security initiative around the E-Postbrief, a secure communication solution, and invite the security community to participate. Food, wine, beer and soft drinks will be provided.

footer
? Need help? Use our Contacts page.

Last changed: 13 August 2010 jp