|
|
Schedule
Attention |
IS3 will take place from May 22nd to May 24th. The information below is a tentative schedule of events. Please note that it is subject to change until and during the time of the event. See footer below for last update. |
Monday, May 22nd
8:00am~9:00am |
Breakfast & Registration |
|
Coffee, juice, and various breakfast treats will be served in room 417 of the Dirac Science Library to start the day. |
9:00am~9:15am |
Opening Remarks |
9:15am~10:00am |
Translation in Cryptography: Signatures |
|
Guiseppe Ateniese. We will describe recently-developed techniques that can be used to “translate” between digital signatures. Given a signature from Alice on a certain message, we will show how a proxy can convert it into a signature from Bob on the same message without knowing Alice's or Bob's secret keys. We will describe several applications of this cryptographic primitive, including: sharing of certificates, generating space-efficient proofs that a path was taken, transparent certification in ad-hoc networks, and online group signatures. We will also provide the basics of digital signatures and pairings-based cryptography. Based on a joint work with Susan Hohenberger (MIT). |
10:00am~10:30am |
Break |
10:30am~11:45am |
Translation in Cryptography: Encryptions |
|
Giuseppe Ateniese. We will describe recently-developed techniques that can be used to “translate” between ciphertexts. In particular, we will introduce new techniques that allow a proxy to convert ciphertexts intended for Alice into ciphertexts readable by Bob. The proxy does not know Alice's or Bob's secret keys and won't learn the encrypted message during the translation. We will describe several applications of this cryptographic primitive, including: defeating spam of encrypted data , enabling access control in file/storage systems, and digital rights management. We will also provide the basics of encryption, semantic security, and bilinear problems. Based on a joint work with Kevin Fu (MIT), Matt Green (JHU), Susan Hohenberger (MIT). |
11:45am~1:30pm |
Lunch Break |
1:30pm~2:45pm |
Legal & Ethical Issues |
|
Jim Davis. We will analyze the legal and ethical issues surrounding information security, including the questions raised by heightened connectivity and the legal implications of free data transmission. |
2:45pm~3:15pm |
Break |
3:15pm~4:15pm |
Panel Discussion: Emerging Directions in Cryptographic Research |
|
Giuseppe Ateniese. Panel members will take questions from the audience. |
4:30pm~5:30pm |
Panel Discussion: The Future of the Profession |
|
Jim Davis. Panel members will take questions from the audience. |
5:30pm~7:00pm |
Reception |
|
A catered reception will be served in room 151 of the Love building. All attendees are welcome to come and mingle with the speakers present. |
Tuesday, May 23rd
8:00am~8:45am |
Breakfast |
|
Coffee, juice, and various breakfast treats will be served in room 417 of the Dirac Science Library to start the day. |
8:45am~10:00am |
Worms and Viruses of the Internet |
|
Evangelos Kranakis. In this talk we will survey how viruses and worms propagate in a network. We will discuss: Malicious Logic, Worm Attacks and the Internet, Classification of Worms, How to be More Effective, Population Models and Dynamics of Worm Propagation, Best Effort Models, Zero Time Models, and Search Models. |
10:00am~10:30am |
Break |
10:30am~11:15am |
Enhancing Intrusion Detection in Future Wireless Systems |
|
Evangelos Kranakis. Wireless systems are increasingly being used for important communication and it is a challenge to keep electronic data transmissions secure. In this talk we will discuss Challenges, Risks and Threats in Wireless Systems and how to enhance future Wireless IDS using Radio Frequency Fingerprinting and Mobility Profiles. |
11:30am~1:30pm |
Lunch Break |
1:30pm~2:30pm |
Panel Discussion: Emerging Directions in Security Research |
|
Evangelos Kranakis. Panel members will take questions from the audience. |
2:30pm~3:15pm |
DoD Information Assurance Schloarship Program (IASP) |
|
The Department of Defense Information Assurance Education and Training Scholarship Program is targeted at rising junior and senior undergraduate students and graduate students who are looking for a full-ride scholarship. |
3:15pm~3:45pm |
Break |
3:45pm~4:45pm |
Panel Discussion: Security In Practice / Government Perspective |
|
US Department of Defense. Panel members will take questions from the audience. |
4:45pm~5:00pm |
Break |
5:00pm~6:00pm |
Employment Opportunities |
|
Melody Venable. We will discuss job opportunities available in the field of Information Security and answer questions from the audience. |
Wednesday, May 24th
8:00am~8:45am |
Breakfast |
|
Coffee, juice, and various breakfast treats will be served in room 417 of the Dirac Science Library to start the day. |
8:45am~10:00am |
Strong Security for Feeble Devices |
|
Breno de Medeiros. This talk describes simple, anonymous RFID identification protocols. By making specific setup, communication, and concurrency assumptions that are realistic in the RFID application setting, we arrive at a model that guarantees strong security and availability properties, while still permitting the design of practical RFID protocols. |
10:00am~10:30am |
Break |
10:30am~11:15am |
Towards Provable Security for Ubiquitous Applications |
|
Mike Burmester. We shall investigate the security of pervasive systems with focus on availability issues in the presence of a powerful adversary that can control some nodes and eavesdrop, re-route, modify, delay, and insert messages on all communication channels. We will articulate a formal security framework that is tuned for the analysis of protocols for constrained systems and show how this can be used with applications that involve MANET and RFID systems. In our approach we use optimistic protocols for which the overhead is minimal when the adversary is passive. When the adversary is active, depending on the application, the additional cost is either used to trace malicious behavior or born by non-constrained components of the system. Our goal is to design mechanisms that support self-healing and that promote a fault-free system state, or a stable system state, in the presence of a Byzantine adversary. |
11:15am~12:00pm |
FSU Infosec Program |
|
Melody Venable. We will discuss details of the FSU Information Security program and answer questions for potential applicants. |
|
|
|