Sunflower

IFIP Working Group 10.4
Dependable Computing and Fault Tolerance

67th Meeting

Tortworth, Bristol, UK

January 22-26, 2015

Previous Page

 

Meeting Host

  Tom Anderson

 


Program-at-a-Glance and Contents

Science of Cyber-Security

Workshop 
Coordinators

Roy Maxion, Carnegie Mellon University

 

Introduction

Session 1

Session 2

Session 3

Session 4

Session 5


Research Reports

Business Meeting

List of Attendees


Workshop on the Science of Cyber-Security

Chair: Roy Maxion, Carnegie Mellon University

Introduction

8:30  Introduction to the meeting (Paulo Veríssimo, University of Luxembourg)

 


Session 1

Introduction to the workshop (Roy Maxion, Carnegie Mellon University)

.pdf icon 

What does it mean to do science, and are we doing it? (John McHugh, University of North Carolina and RedJack, Inc.)

.pdf icon

An exercise in applying junk-science criteria to fuzz testing (Phil Koopman, Carnegie Mellon University)

.pdf icon


Session 2

Reliability and reproducibility in cyber security research (Victoria Stodden, University of Illinois)

.pdf icon

Are we asking the right questions? Great Science needs to relate to today’s problems (Susan Appleby, GCHQ, UK)

.pdf icon


Session 3

Perspectives on security as an empirical science (Vern Paxson, University of California, Berkeley)

.pdf icon

Structure as an aid to good science (Roy Maxion, Carnegie Mellon University)

.pdf icon


Session 4

In Pursuit of Asymmetric Resilience: Applying Science Practices to Cybersecurity (Nick Multari, Pacific Northwest National Lab, US)

.pdf icon

From infrastructure to science (Laura Tinnel, SRI, US)

.pdf icon


Session 5

Avoiding pseudoscience in the science of security: a case study of malware analysis (Jonathan Spring, CERT/Software Engineering Institute, CMU)

.pdf icon

How did we get into this mess, and how will we get out? (Sami Saydjari / Shing-hon Lau, Cyber Defense Agency/Carnegie Mellon)

.pdf icon

 

Session 6 Wrap-up

Session 1 Summary

.pdf icon

Session 2 Summary

.pdf icon

Session 3 Summary

.pdf icon

Session 4 Summary

.pdf icon

Session 5 Summary

.pdf icon

 

 

Research Reports

Secure Storage of DNA Data, Alysson Bessani (joint work with Vinicius Cogo, Francisco Couto and Paulo Veríssimo), Faculdade de Ciências, ULisboa, PT

.pdf icon

Recovery from Intrusions in PaaS Clouds, Miguel P. Correia, Tecnico Lisboa, PT

.pdf icon

Stigmatic Information Flow in Systems of Systems, H. Kopetz, TU, Wien, AT

 

.pdf icon

WAP – Web Application Protection, Nuno Neves, Faculdade de Ciências, ULisboa, PT

.pdf icon

From Analyzing Systems Failures, to Investigating Crimes, Brian Randell, School of Computing Science, Newcastle University, UK

.pdf icon

A Formal Model for Soft Enforcement: Influencing the Decision-Maker, Aad van Moorsel, Newcastle

University, UK

.pdf icon

Science of CyberSecurity: some reflections, Paulo Veríssimo, University of Luxembourg, SnT, LU

.pdf icon

Evaluation of dependable task execution scheme for many-core systems, Tomohiro Yoneda, National Institute of Informatics, Tokyo, JP

.pdf icon

 

 

 

Business Meeting

IFIP Working Group 10.4 business meeting

              .pdf icon

List of Attendees

Names and Contact Information

               .pdf icon