2018년 May 8일

Keynotes


Keynote 1: Dr. Cliff Wang (US Army Research)
Title: “Cyber Deception: an Emergent Research Area”
Date and time: 9:30 AM, June 5th, 2018
Abstract:
Deception has been used since early days of warfare. Until most recently deception techniques such as honeynet have also been adopted in the cyber space. However, most approaches are ad hoc at best. There are increasing interests in establishing a formal model that can be used to capture key characteristics of cyber deception and to evaluate the effectiveness of using deception as a proactive network defense tool. This talk will share some of initial thoughts in identifying new opportunities in cyber deception and exploring new research ideas in this space
Biography:
Dr. Cliff Wang graduated from North Carolina State University with a PhD in computer engineering in 1996. He has been carrying out research in the area of computer vision, medical imaging, high speed networks, and most recently information security. He has authored over 50 technical papers and 3 Internet standards RFCs. Dr. Wang also authored/edited for 16 books in the area of information security and hold 3 US patents on information security system development.
Since 2003, Dr. Wang has been managing extramural research portfolio on information assurance at US Army Research Office. In 2007 he was selected as the director of the computing sciences division at ARO while in the same time managing his program in cyber security. For the past ten years, Dr. Wang managed over $200M research funding which led to significant technology breakthroughs. Dr. Wang also holds adjunct full professor faculty position at the Department of Electrical and Computer Engineering at North Carolina State University. Dr. Wang is a Fellow of IEEE.

Keynote 2: Dr. Jaeyeon Jung (Samsung Electronics)
Title: “Securing a large scale IoT ecosystem”
Date and time: 9:00 AM, June 6th, 2018
Abstract:
Real-world examples showing the insecurity of Internet-of-Things (IoT) devices abound – ranging from hacked cameras exposing live feeds of private homes to fridge being caught in sending spam emails. In this talk, we will discuss the lifecycle of an Internet-of-Things device, many different stakeholders involved during the lifetime (e.g., chip manufacturer, device manufacturer, service providers, users, installers), and security challenges encountered at each stage of the lifecycle. Rather than focusing on individual security problems, we will look at the multiple aspects of security including hardware security, certificate management, access control, multilevel security, and usable security. Come to this talk to find out real security issues that industries are dealing with every day and what contributions that you can make toward securing a large scale IoT ecosystem.
Biography:
Jaeyeon Jung is a vice president of service R&D at Mobile Communications Business in Samsung Electronics. Prior to joining Samsung, she was a principal security architect at Microsoft Research (2011-2016) and a research scientist at Intel Labs Seattle (2007-2011) after a brief stint as a software architect at Mazu networks (2006-2007). She obtained her PhD from MIT in 2006. Currently, she leads various cloud engineering efforts in Samsung including Samsung account service and the IoT backend service. See https://www.linkedin.com/in/jaeyeonjung/ for more information.

Keynote 3: Prof. Kevin Fu (University of Michigan)
Title: “Analog Sensor Cybersecurity and Transduction Attacks”
Date and time: 8:30 AM, June 7th, 2018
Abstract:
Medical devices, autonomous vehicles, and the Internet of Things depend on the integrity and availability of trustworthy data from sensors to make safety-critical, automated decisions.  How can such cyberphysical systems remain secure against an adversary using intentional interference to fool sensors?  Building upon classic research in cryptographic fault injection and side channels, research in analog cybersecurity explores how to protect digital computer systems from physics-based attacks.  Analog cybersecurity risks can bubble up into operating systems as bizarre, undefined behavior.  For instance, transduction attacks exploit vulnerabilities in the physics of a sensor to manipulate its output. Transduction attacks using audible acoustic, ultrasonic, or radio interference can inject chosen signals into sensors found in devices ranging from fitbits to implantable medical devices to drones and smartphones.
Why do microprocessors blindly trust input from sensors, and what can be done to establish trust in unusual input channels in cyberphysical systems?  Why are students taught to hold the digital abstraction as sacrosanct and unquestionable?  Come to this talk to learn about undefined behavior in basic building blocks of computing and educational opportunities for embedded security and discuss how to design out analog cybersecurity risks by rethinking the computing stack from electrons to bits.
Biography:
Kevin Fu is Associate Professor of EECS at the University of Michigan where he directs the Security and Privacy Research Group (SPQR.eecs.umich.edu) and the Archimedes Center for Medical Device Security (secure-medicine.org).  His research focuses on analog cybersecurity-how to model and defend against threats to the physics of computation and sensing.  His embedded security research interests span from the physics of cybersecurity through the operating system to human factors. Past research projects include MEMS sensor security, pacemaker/defibrillator security, cryptographic file systems, web authentication, RFID security and privacy, wirelessly powered sensors, medical device safety, and public policy for information security & privacy.
Kevin was recognized as an IEEE Fellow, Sloan Research Fellow, MIT Technology Review TR35 Innovator of the Year, and recipient of a Fed100 Award and NSF CAREER Award. He received best paper awards from USENIX Security, IEEE S&P, and ACM SIGCOMM. He co-founded healthcare cybersecurity startup Virta Labs. Kevin has testified in the House and Senate on matters of information security and has written commissioned work on trustworthy medical device software for the National Academy of Medicine. He is a member the Computing Community Consortium Council, ACM Committee on Computers and Public Policy, and the USENIX Security Steering Committee. He advises the American Hospital Association and Heart Rhythm Society on matters of healthcare cybersecurity. Kevin previously served as program chair of USENIX Security, a member of the NIST Information Security and Privacy Advisory Board, a visiting scientist at the Food & Drug Administration, and an advisor for Samsung’s Strategy and Innovation Center. Kevin received his B.S., M.Eng., and Ph.D. from MIT. He earned a certificate of artisanal bread making from the French Culinary Institute.