Information Assurance Research in the College of Engineering.

Slides:



Advertisements
Similar presentations
SA/EE INCOSE 7/17/00 Systems Architecting/Engineering Education at The Aerospace Corporation INCOSE Academic Forum 17 July 2000 David J. Evans Executive.
Advertisements

Panel Moderator: Qian Zhang Hong Kong University of Science and Technology May 2008.
School of Graduate Professional Studies Systems Engineering Research at Penn State Colin J. Neill Representing the work of: Kathryn Jablokow, Assoc Prof.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
History Since 1999 till present Since 1958 till 1961 One of the first departments of university 3 Since 1961 till 1999 تا 1378.
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FAMU ASSESSMENT PLAN PhD Degree Program in Entomology Dr. Lambert Kanga / CESTA.
Fairmount College of Liberal Arts and Sciences Department of Mathematics & Statistics Mission The mission of the undergraduate program in Mathematics and.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
King Fahd University of Petroleum & Minerals Dr. Sadiq M. Sait, Director Information Technology Professor of Computer Engineering Dhahran, Saudi Arabia.
Department of Computer Science, Tsinghua University Introduction to the PhD Program of the Department of Computer Science and Technology at Tsinghua.
E-Learning Practices at PPU Dr. Mahmoud Hasan AL-Saheb Palestine Polytechnic University Administrative Sciences and Informatics College,
King Fahd University of Petroleum & Minerals Department of Electrical Engineering.
© 2003 Turoff 1 The Nature of Information Systems and Employment in IS Murray Turoff Information Systems Department.
1 Welcome & Overview 2 nd Annual Workshop “What are National Security Threats?” Kathleen D. Morrison Co-Director, JTAC Professor of Anthropology Director,
Software Assurance CBK and University Curricula Matt Bishop Sophie Engle.
Software Verification and Validation (V&V) By Roger U. Fujii Presented by Donovan Faustino.
CS 101 Introduction to Programming Dr. Basit Qureshi Assistant Professor College of Computer and Information Sciences Prince Sultan University.
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
UTIA Promotion & Tenure Workshop May 19, 2015 UTIA Promotion & Tenure Workshop May 19, 2015 Overall Philosophy: Maximize faculty FTE while maintaining.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Copyright (c) Cem Kaner. All Rights Reserved. 1 Black Box Software Testing (Academic Course – Fall 2001) Cem Kaner, J.D., Ph.D. Professor of.
FACULTY OF COMPUTER SCIENCE & INFORMATION TECHNOLOGY.
A Framework for Automated Web Application Security Evaluation
UIC Early Reading First Building the Foundations for Early Literacy Excellence Alicia J Wyche Summer Internship 2009.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
ECE Lecture 1 Security Services.
Computer Engineering Department College of Computer Sciences and Engineering.
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Randy Beavers CS 585 – Computer Security February 19, 2009.
Information Assurance – A Technology Transfer Success Story Deidre W. Evans, Edward L. Jones, Christy L. Chatmon Computer and Information Sciences Department.
Computer Engineering Department (KFUPM) Computer Engineering Department Sadiq M. Sait College of Computer Sciences and Engineering.
Department of Computer Science and Engineering, and KINDI Laboratory for Computing Research Joint Seminar Cloud computing is a paradigm shift to a new.
February 19, 2015 Learning & Research NSU Dr. George Hsieh Department of Computer Science.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
Dynamic Networking and Smart Sensing Enable Next-Generation Landmines William M. Merrill, Lewis Girod, Brian Schiffer, Dustin McIntire, Guillaume Rava,
Copyright: All rights reserved.Not to be reproduced by any means without prior permission 1 Coordinator Dr. Sadiq M. Sait Department of Computer Engineering.
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
Item 4 - Intrusion Detection and Prevention Yuh-Jye Lee Dept. of Computer Science and Information Engineering National Taiwan University of Science and.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
Financial Sector Cybersecurity R&D Priorities The Members of the FSSCC R&D Committee November 2014.
Specialties Description
Department of Computer and Information Sciences
Promotion & Tenure Workshop
PREPARED BY G.VIJAYA KUMAR ASST.PROFESSOR
Celtic-Plus Proposers Day 22 September 2016, Istanbul
Center of Excellence in Cyber Security
ASSET - Automotive Software cyber SEcuriTy
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
UNM Information Assurance Scholarship for Service (SFS) Program
STRATEGIC RESEARCH PROJECTS BRIEF
Rapid Software Testing
World-Leading Research with Real-World Impact!
Finalization of the Action Plans and Development of Syllabus
UNM Information Assurance Scholarship for Service (SFS) Program
Cyber Security R&D: A Personal Perspective
SCHOLARS OF THE FUTURE An Implementation Model for Increasing Diversity in Information Technology The Scholars of the Future program is a four-year initiative.
Definition Of Computer Security
Standard 10 Research(**) البحث العلمي )**(.
IT Applications with Emerging Techniques: Security Solutions
Cloud Forensics Logging
UNM Information Assurance Scholarship for Service (SFS) Program
Presentation transcript:

Information Assurance Research in the College of Engineering

Information Assurance Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

Florida Institute of Technology was designated a Center for Academic Excellence in Information Assurance Research by the National Security Agency

The Harris Institute for Assured Information serves as a focal point for collaboration and project support

COE Faculty Performing Research in Information Assurance – Richard Ford, Computer Science – Harris Institute – Fredric Ham, Electrical and Computer Engineering – Gerald Marin, Computer Science – Harris Institute – William Allen, Computer Science – Harris Institute – Ryan Stansifer, Computer Science – Liam Mayron, Computer Science – Harris Institute – Marius Silaghi, Computer Science – Adjunct Faculty: Marco Carvalho, Ronda Henning

Adaptive Supervisory Control and Data Acquisition Funded by the U.S. Department of Energy – Enhanced Protection of Critical Infrastructure – COE Participants: Drs. Ford, Allen, Ham, Stansifer Supporting 1 Ph.D. student and 2 M.S. students – Publications: three conference papers accepted/presented to date two papers in preparation – $470,000 in funding over two years (current)

Neurocomputing and Interoception Funded by Harris Corporation – Attempts to allow computers to engage in interoceptive behaviors, inspired by the brain’s “system of systems” – COE Participants: Drs. Ford, Carvalho Supporting 1 M.S. student – Publications: One paper accepted and presented to date – $65,000 in funding over two semesters

Human Ground Truth in Virtual Worlds Funded by Harris Corporation – Create new collaborative environments that leverage the power of Virtual Worlds – COE Participants: Drs. Ford, Carvalho Supporting 3 students – Publications: No publications to date – project has just started – $150,000 in funding over one year (current)

Biologically-Inspired Security Infrastructure for Tactical Environments Research funded by the Army Research Lab – Improving the Security of Mobile Networks – COE Participants: Drs. Ford, Allen, Ham, Marin, one Postdoc Researcher Graduated 1 Ph.D. and 5 M.S. students – Publications: twelve papers published on this work – $2,785,300 in funding over 3 years (completed)

Assured Information in SOA Environments Funded by Harris Corporation – Developed a method for evaluating security- centric testing tools for use in SOA environments – COE Participants: Dr. Tilley Supported 1 Ph.D. student and 1 M.S. student – Publications: three conference papers published on this work – $150,000 in funding over one year

Harris Corporation Grants The Harris Corporation funded several recent projects through the Harris Institute: – Vulnerabilities in Graphics Systems - $125k Drs. Ford and Allen – Brain-inspired computing for security -$65k Dr. Ford – Collection of Malware Samples - $100k Drs. Allen and Ford and graduate students – Metrics for Human Computer Interaction - $60k Dr. Ford and Dr. Bahr (Psychology)

Using Program Slicing in Software Maintenance This seminal work by Dr. Keith Gallagher was published in IEEE Transactions on Software Engineering in 1991 – Program slicing helps in understanding foreign code and in debugging, Dr. Gallagher extended this idea to aid in software maintenance. – This work had a significant impact on discovering and correcting the Y2K problem and continues to be widely used for software maintenance – This paper has been cited over 600 times

Software Testing Information Assurance requires the ability to verify that software is free from vulnerabilities and that it functions as intended Dr. Cem Kaner has co-authored four books and numerous articles and workshops on software testing principals and practices, including: – Cem Kaner, Jack Falk, & Hung Quoc Nguyen, Testing Computer Software, 2 nd edition – Cem Kaner, James Bach, & Bret Pettichord, Lessons Learned in Software Testing – Cem Kaner & David Pels, Bad Software: What To Do When Software Fails

Towards a Secure Software Development Framework Based on an Integrated Engineering Process Abdulaziz Alkussayer, PhD completed in 2011 – Developed a methodology for improving the development of secure software – Publications: one Journal article, five Conference papers to date – Advisor: William Allen – Abdulaziz is currently on the faculty of a University in Saudi Arabia

Program Comprehension Through Sonification Lewis Berman, PhD completed in 2011 – Developed a sonification (i.e., non-speech sound) scheme to facilitate the understanding of software which has been shown to be particularly useful for analyzing dynamic program behaviors – Publications: three Conference papers to date – Advisor: Keith Gallagher

Migrating Software Testing to the Cloud Tauhida Parveen, PhD completed in 2010 – Developed a methodology for migrating software testing to a cloud environment to improve performance and lower costs – Publications: two Journal articles, six Conference papers to date – Advisor: Scott Tilley – Tauhida is employed at a local security company

Automatic Design of Feistel Ciphers Using Constraint Techniques Venkatesh Ramamoorthy, PhD completed in 2010 – Developed several improvements to existing cryptographic techniques – Publications: three Conference papers to date – A patent has been applied for on this work – Advisor: Marius Silaghi – Venkatesh is employed at Array Networks, Inc.

Malicious Mobile Code Related Experiments with an Extensible Network Simulator Attila Ondi, PhD completed in 2007 – Developed a technique for simulating the spread of malicious code with high fidelity to better evaluate methods for defending against attacks – Publications: two Journal articles, four Conference papers to date – Advisor: Richard Ford – Attila is employed at Securboration, Inc.

Masters Research in Information Assurance Reputations for Security in Mobile Ad Hoc Networks, Katherine Hoffman, M.S., 2011 MANET Security and Antibodies, Stephen Dotson, M.S., 2011 – a biologically-inspired approach to protecting mobile networks Evaluating the Capabilities of SOA Testing Tools from a Security Perspective, Nawwar Kabbani, M.S., 2010 A Proactive Defense System for Mobile Ad Hoc Networks, Eyosias Yoseph Imana, M.S., 2009 A State-Machine-Based Attack Description Language for the Evaluation of Intrusion Detection Systems, Samuel Oswald, M.S, 2009

Masters Research in Information Assurance Incrementally Learning Rules for Anomaly Detection, Denis Petrusenko, M.S., 2009 A Mobile Ad Hoc Network (MANET) Simulator with Worm Propagation, Matthew Reedy, M.S., 2009 A Modular Framework for Next-Generation Testing and Evaluation of Network Applications, Derek Pryor, M.S., 2009 Discovering a Covert Channel between Virtual Machines Sharing the Same Set of Hardware, James Stimers, M.S., 2008 Changing the Modulus of Secret Sharing, Accessing Arrays of Secrets and Incentive Mixnets, Timothy Atkinson, M.S., 2007 The Hunt for Viral Processes, Christiana Ioannou, M.S., 2006