|
|
Meeting Host |
Tom Anderson |
Program-at-a-Glance
and Contents
Workshop |
Roy Maxion, Carnegie Mellon University |
8:30 Introduction to the
meeting (Paulo Veríssimo, University of Luxembourg) |
|
Introduction to the workshop (Roy Maxion,
Carnegie Mellon University) |
|
What does it mean to do science, and are we doing
it? (John McHugh,
University of North Carolina and RedJack, Inc.) |
|
An exercise in applying junk-science
criteria to fuzz testing (Phil Koopman,
Carnegie Mellon University) |
Reliability and reproducibility in cyber security
research (Victoria Stodden,
University of Illinois) |
|
Are we asking the right questions? Great
Science needs to relate to today’s problems (Susan
Appleby, GCHQ, UK) |
Perspectives on security as an empirical science (Vern Paxson,
University of California, Berkeley) |
|
Structure as an aid to good science (Roy Maxion,
Carnegie Mellon University) |
In Pursuit of Asymmetric Resilience: Applying
Science Practices to Cybersecurity (Nick Multari, Pacific
Northwest National Lab, US) |
|
From infrastructure to science (Laura Tinnel, SRI, US) |
Avoiding pseudoscience in the science of security: a
case study of malware analysis (Jonathan Spring, CERT/Software Engineering
Institute, CMU) |
|
How did
we get into this mess, and how will we get out? (Sami Saydjari / Shing-hon Lau, Cyber
Defense Agency/Carnegie Mellon) |
Session 6 Wrap-up
Session 1 Summary |
|
Session 2 Summary |
|
Session 3 Summary |
|
Session 4 Summary |
|
Session 5 Summary |
Secure Storage of DNA Data, Alysson Bessani (joint work
with Vinicius Cogo,
Francisco Couto and Paulo Veríssimo),
Faculdade de Ciências, ULisboa, PT |
|
Recovery from Intrusions in PaaS Clouds, Miguel P. Correia,
Tecnico Lisboa, PT |
|
Stigmatic Information Flow in Systems of
Systems, H. Kopetz, TU, Wien, AT |
|
WAP – Web Application Protection, Nuno Neves, Faculdade
de Ciências, ULisboa, PT |
|
From Analyzing Systems Failures, to
Investigating Crimes, Brian Randell, School of
Computing Science, Newcastle University, UK |
|
A Formal Model for Soft Enforcement:
Influencing the Decision-Maker, Aad van Moorsel, Newcastle University, UK |
|
Science of CyberSecurity:
some reflections, Paulo Veríssimo, University of
Luxembourg, SnT, LU |
|
Evaluation of
dependable task execution scheme for many-core systems, Tomohiro Yoneda, National Institute of Informatics, Tokyo, JP |
|
|
|
|
IFIP Working Group 10.4 business meeting |
Names and Contact Information |