TRUST September 13 th 2004NSF STC Site Visit TRUST :Team for Research in Ubiquitous Secure Technologies Shankar Sastry (Berkeley), Mike Reiter (CMU), Steve.

Slides:



Advertisements
Similar presentations
Demonstrating the Legal Sustainability of Effective STEM Diversity Programs Wanda E. Ward Ph.D., Discussant Sr. Advisor to the Director Office of the Director.
Advertisements

Philippine Cybercrime Efforts
The subcommittee recognizes the profound changes in US demographics and skill levels that currently exist, and the changes that are predicted for the.
 Copyright 2007 STI - INTERNATIONAL Semantic Technology Institute International PlanetData - Ensuring Impact.
ActionWebs : Education and Outreach ActionWebs Kickoff Meeting December 17, 2009 │Berkeley, California Education Overview Kristen Gates, Ed.D University.
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
Academics and Research Working Group Teaching Future Generations.
M M ultimedia E E ducational R R esource for L L earning and O O nline T T eaching.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
1 Sustaining Technical Programs The NSF’s Advanced Technological Education Program and American Competitiveness Mike Lesiecki, MATEC A Member of the Academic.
College of Basic and Applied Sciences Advising/Retention Report.
TRUST NSF Site Visit, Berkeley, March 19-20, 2007 TRUST Summer Study Programs Ruzena Bajcsy, UC Berkeley Kristen Gates, UC Berkeley.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Stanford Technology Ventures Program Slide 1 State Policy Academy on Entrepreneurship New Orleans, July 16, 2001 “Human Capital.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
November 6, 2003 Leveraging Resources and Building Partnerships for Critical Infrastructure Protection John B. Noftsinger, Jr., Associate Vice President.
Cultivating the Next Generation Geoscience Workforce: The View from NSF Jill L. Karsten & Lina C. Patino NSF Directorate for Geosciences 2008 Joint Annual.
Partnerships and Broadening Participation Dr. Nathaniel G. Pitts Director, Office of Integrative Activities May 18, 2004 Center.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
1 High Performance Buildings Research & Implementation Center (HiPerBRIC) National Lab-Industry-University Partnership February 5, 2008.
Robert LePage 6/4/14. Community Focused Workforce and Economic Development 2 A major component of STCC and HCC role is to support the development of the.
Session Chair: Peter Doorn Director, Data Archiving and Networked Services (DANS), The Netherlands.
Science & Technology Centers Program Center for Science of Information National Science Foundation Science & Technology Centers Program Bryn Mawr Howard.
Using Intermediary Organizations to Gain Access to Quality Internships Presented by: Deanna Hanson, California Director, NAF.
Carla Wade Digital Learning and STEM Education Specialist Oregon Department of Education.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
Mainstreaming Gender Concerns in Applying Science, Technology and Innovation to Support Sustainable Well-Being Shirley M. Malcom, Ph.D.
“The NESSI Strategy: The Way Ahead” BCI´07 Jose M. Cavanillas Vice-chairman NESSI Steering Committee Director Atos Origin – Research & Innovation.
1 Investing in America’s Future The National Science Foundation Strategic Plan for FY Advisory Committee for Cyberinfrastructure 10/31/06 Craig.
Griffiss Institute Center for Information Assurance.
DOE 2000, March 8, 1999 The IT 2 Initiative and NSF Stephen Elbert program director NSF/CISE/ACIR/PACI.
NATIONAL ACADEMY OF ENGINEERING Phase I Educational Partnership: Climate Change, Engineered Systems and Society  Initial Partners: NAE, U VA – Charlottesville,
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Janos Sztipanovits Dr. Janos Sztipanovits E. Bronson Ingram Distinguished Professor of EECS Director of ISIS Vanderbilt University Nashville, TN Overview.
Cybersecurity: Think Globally, Act Locally Dr. Peter Freeman NSF Assistant Director for CISE Educause Net2003 April 30, 2003.
Charles H. Matthews, Chair, LCoB Steven Doehler, DAAP Carlee Poston Escue, CECH Jason Heikenfeld, CEAS University of Cincinnati “UC|3: The Role of Innovation.
David Mogk Dept. of Earth Sciences Montana State University April 8, 2015 Webinar SAGE/GAGE FACILITIES SUPPORTING BROADER EDUCATIONAL IMPACTS: SOME CONTEXTS.
8 July 2005MM Sprinkle UC Berkeley TRUST :Team for Research in Ubiquitous Secure Technologies An Overview Shankar Sastry (Berkeley), Ruzena Bajcsy (Berkeley),
TRUST : Team for Research in Ubiquitous Secure Technology National Science Foundation Site Visit February 24-26, 2009 │Berkeley, California Health Infrastructures.
TechCon Food systems history… Agriculture has a 10,000 year history Farmers are estimated to be 38 to 45% of the global work force In the developing.
Center for Cybersecurity Research and Education (CCRE)
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
1 Research Centers in Computer Science: A New Way of Doing Science Fred Roberts, DIMACS, Rutgers University.
GOAL: Connect the value of a growing IT talent pipeline to the development of smarter communities. Lonnie Emard Executive Director, CESM.
TRUST 2 nd Year Site Visit, March 19 th, 2007 TRUST Knowledge Transfer EMR Project Vanderbilt (Sztipanovits, Karsai, Ledeczi, Xue) Stanford (Mitchell,
TRUST 2 nd Year Site Visit, March 19 th, 2007 SECuR-IT: A Summer School and Immersion Program Kristen Gates, UC Berkeley Sigurd Meldal, SJSU John Mitchell,
Internet2 Strategic Directions October Fundamental Questions  What does higher education (and the rest of the world) require from the Internet.
TRUST September 13, 2004 NSF STC Review TRUST:Team for Research in Ubiquitous Secure Technologies Developing Human Resources Connections to the Critical.
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
Education and Human Resource development By Ruzena Bajcsy TRUST TRUST:Team for Research in Ubiquitous Secure Technologies September 13th 2004 NSF STC Review.
참 잘 오셨소, 어서 오십시오 The National Center for Information and Communications Technologies A National Science Foundation.
Strategic Plan: Goals, Objectives & Success Measures Administrative Forum, South Campus June 17,
An Innovative Internship Model ( version 3 1/3/2012 )
EPSCoR means “Experimental Program to Stimulate Competitive Research
Department of Computer and Information Sciences
Cyber Security – An Existential Threat? (IIC, Singapore)
South Big Data Innovation Hub
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
Dallas Integrated Higher Education Network
BRIDGING DIVIDES: towards digital dividends for all
The National Initiative for Cybersecurity Education (NICE)  AFCEA International Cyber Education, Research, and Training Symposium January 17, 2018 Bill.
8 Building Blocks of National Cyber Strategies
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
Vice Provost, Old Dominion University Cyber Business Roundtable
Presentation transcript:

TRUST September 13 th 2004NSF STC Site Visit TRUST :Team for Research in Ubiquitous Secure Technologies Shankar Sastry (Berkeley), Mike Reiter (CMU), Steve Wicker (Cornell), John Mitchell (Stanford), Janos Sztipanovits (Vanderbilt)

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 2 Attacks are growing in sophistication Serious hackers

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 3 Technology Generations of Information Assurance 1st Generation (Prevent Intrusions) Intrusions will Occur Some Attacks will Succeed Cryptography Trusted Computing Base Access Control & Physical Security Multiple Levels of Security 2nd Generation (Detect Intrusions, Limit Damage) Firewalls Intrusion Detection Systems Boundary Controllers VPNs PKI 3rd Generation (Operate Through Attacks) Big Board View of Attacks Real-Time Situation Awareness & Response Intrusion Tolerance Graceful Degradation Hardened Core Functionality Performance Security

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 4 TRUST ed Systems and Software TRUST is more than resistance to information attack: Today’s systems and networks are fragile, difficult-to- compose and maintain: – Non-robust – Non-adaptive – Untrustworthy Point failures bring down systems Difficult, costly-to-compose useful systems from multiple components Poor or nonexistent means for building reliable systems from necessarily unreliable components Poor understanding of vulnerabilities of networks, performance under – and uncharacterized attacks No clear history, pedigree on data, code

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 5 TRUST worthy Systems More than an Information Technology issue Complicated interdependencies and composition issues – Spans security, systems, and social, legal and economic sciences – Cyber security for computer networks – Critical infrastructure protection – Economic policy, privacy TRUST : “holistic” interdisciplinary systems view of security, software technology, analysis of complex interacting systems, economic, legal, and public policy issues Goals: – Composition and computer security for component technologies – Integrate and evaluate on testbeds – Address societal objectives for stakeholders in real systems

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 6 Research Agenda Security Science (Schneider) – Software Security (Mitchell) – Trusted Platforms (Boneh) – Applied Cryptography Protocols (Wagner) – Network Security (Joseph) Systems Science (Schmidt) – Interdependency Modeling and Analysis (Anantharam) – Secure Network Embedded Systems (Wicker) – Model Based Integration of Trusted Components (Sztipanovits) – Secure Information Management Tools (Birman) Social, Economic and Legal Considerations (Samuelson) – Economics, Public Policy and Societal Challenges (Varian) – Digital Forensics and Privacy (Tygar) – Human computer Interfaces and Security (Reiter)

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 7 Integration of Research Agenda Four testbeds chosen to be responsive to national needs: Computer and network security, Critical infrastructure protection, Privacy – Integration testbed (Sztipanovits) – Secure Network Embedded Systems (Wicker) – Planet Lab (Culler) – Cyber Defense Technology Experimental Research testbed (DETER) (Benzel/Joseph/Sastry) Technical Management Plan through time sensitive internal deliverables of software, systems among team members Exchange of scientific personnel among team members

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 8 Broad Security and Privacy Vision Privacy Computer and Network Security Power Grid Testbed Network Security Testbed Secure Networked Embedded Systems Testbed Software Security Trusted Platforms Applied Crypto- graphic Protocols Network Security Secure Network Embedded Sys Forensic and Privacy Complex Inter- Dependency mod. Model-based Security Integration. Econ., Public Pol. Soc. Chall. Secure Compo- nent platforms HCI and Security Secure Info Mgt. Software Tools Component Technologies Societal Challenges IntegrativeTestbeds TRUST will address social, economic and legal challenges Specific systems that represent these social challenges. Component technologies that will provide solutions Critical Infrastructure

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 9 Education Development Security must be consciously engineered into new and legacy critical infrastructure systems Every component level needs rethinking and education: need to build in TRUST: security science, systems science and social, legal, economic considerations into every course in undergrad and grad curricula (“liberal” technologically literate education)

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 10 Human Resource Development: leveraging our experience Cornell has had partnerships with the Information Assurance Institute at AFRL, Rome CMU students have extensive access to Software Engineering Institute and CERT. Stanford has extensive interactions with USPS, Secret Service, and brings the Center for Strategic and International Studies for policy matters Vanderbilt runs the Institute for Software Integrated Systems and Institute for Public Policy Studies At Berkeley, we have the Center for Information Technology Research in the Interest of Society (CITRIS), aimed at bringing innovative technologies to societal scale systems

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 11 Course Work Development Course work to have TRUST built in at all levels--undergrad, grad, advanced seminars. Repositories will be maintained professionally by the Vanderbilt System CAPE/ELM. – Security Science: operating systems, programming languages, cryptography, secure networking, … – Social Sciences: Bringing policy, social, economic issues to student community: economics of information technology, information management, privacy and security – Systems Science: “systems integration using software” curriculum needs to be developed from scratch, capstone design course for undergrads (or 5 th year MS) – NSA-NSF Cybersecurity Center of Excellence in Information Assurance Education to be developed at San Jose State, on going certification efforts for other Centers of Excellence at CMU

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 12 Workforce Training Undergrad and Grad Student mentorship and development features – Exchanging students and postdocs – REU activities at partner campuses – Student Entrepreneurship clubs (Vertex, Bases) – Partnership with Cornell Information Assurance Institute US workforce in research challenge areas with infrastructure holders, industry partners Summer and Winter Educational Institutes and Retreats for TRUST – In-depth discussion of research challenge areas – Testbed and integrative activities

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 13 Diversity Plans K-12 Outreach: Berkeley Foundation for Opportunities in IT (BFOIT) for Oakland/Bay Area secondary schools Summer Research in Information Assurance for HBCU faculty: CMU as a Center of Academic Excellence in Information Assurance education has worked with Howard, Morgan State, UTEP, Hampton, Texas A&M, Corpus Christi, Cal State Fullerton: emphasizes both teaching and research at CyLab Curriculum Development for Hispanic Serving Institutions: NSA/NSF Center at SJSU in Information Assurance education Summer Internship for HBCU faculty in Systems Science (SIPHER): California Community Colleges, Fisk, Tennessee State, UAB, Morehouse, Spelman, Tuskegee, …

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 14 Diversity Plans Summer Undergraduate Program in Engineering Research at Berkeley (SUPERB). Undergrad research for students from institutions serving under- represented groups. Overwhelming demand for TRUST. Women’s Colleges: Summer Immersion Institute for students from Colleges like Mills, Smith, Ithaca College with sponsorship of CRA-W Community Outreach: public “town hall” style forums about privacy and security, economic and legislative issues for secure systems. Engagement with local and state authorities, media and first responders.

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 15 Knowledge Transfer Plans: TRUST as a Public Private Partnership TRUST as a DMZ (trusted intermediary!) between industry, government, non-profit and academia for answering hard questions: – Who will pay for security – Should the Feds play the role of market maker – Roadmaps for guiding investment – The role of regulation/insurance Open dissemination of research: – Publications and software – Short courses at ACM/IEEE/Infrastructure Protection meetings – Public lectures and forums – Curriculum development and courses

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 16 Technology Transfer to Start Ups, Industry and Infrastructure Stakeholders Strategies for improving tech transfer Economic, Legal and Social Implications of TRUST technology built into technology Testbeds to demonstrate robustness and scalability Developing an eco-system with different constituencies by – Focused Workshops – Strategic Investment Sessions between stakeholders, industry, government – Internships for students in industry and infrastructure sectors – Internships for post docs and faculty as entrepreneur incubators at venture partners

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 17 Leadership and Outreach to other groups EU-IST and US partnerships in dependability and TRUST OSTP/DHS workshops Workshops for venture partners Special issues of ACM/IEEE/… ESCHER, a non-profit for repositorying TRUST software ACM-SIGBED Partnerships with Singapore (Nanyang) and Taiwan (National Chiao Tong and National Taiwan University)

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 18 Management Exec Committee made up of PIs + Ruzena Bajcsy (Diversity Outreach Coordinator) Project Manager and Executive Director for Education and Outreach (TBD) Each team (Security Technology, Systems Science, Social Science) has its coordinator Each technical challenge area has its lead faculty, responsible for meeting deliverables/re-negotiating deliverables Technical Management Plan through deliverables, which can be renegotiated at the bi-annual retreats

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 19 Management Interdependency among elements built in by interleaving deliverables and using testbeds for integrating and evaluating research products External Advisory Committee consists of representatives from academia, stakeholders in the government, industry, and utility stakeholders

TRUST Sept. 13 th, 2004 NSF STC Center Site Visit 20 Why an NSF-STC TRUST ? Interdisciplinary problems with issues of law, privacy, economics, and public policy Problem is too large and complex for any one team. Need to simultaneously work on Security Science, Systems Science (of complex systems), and Social Science issues No single silver bullet, but a number of novel and promising approaches Huge leverage with education, industrial transition, diversity efforts with comprehensive team