POSTER WINNERS:
HARDWARE SECURITY:
Title: Heart-to-Devices (H2D) Authentication: Challenges and Solutions
Authors: Zimu Guo and Nima Karimian
SOFTWARE/SYSTEMS SECURITY:
Title: ProvUSB: Block-level Provenance for USB Storage Devices
Authors: Dave (Jing) Tian and Adam Bates
NETWORKING SECURITY:
Title: Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
Author: Bradley Reaves,, Adam Bates, and Henry Carter
FORMAL SECURITY:
Title: DSeRC: Design Security Rule Check
Authors: Adib Nahiyan and Gustavo Contreras
07:30-08:30am | Registration and Breakfast |
08:30-08:45am | Introductory and Welcome Remarks Dr. Forrest Masters, Associate Dean for Research and Facilities, UF Dr. John Harris, ECE Department Chair, UF. Dr. Juan Gilbert, CISE Department Chair, UF |
Session 1 | Plenary Session Session Chair: Patrick Traynor, University of Florida |
08:45-09:20am | 1st Keynote Address: Dhinesh Manoharan, Director, Product Security Engineering, Intel, Title: IOT Security: Navigating a Perfect Storm |
09:25-10:00am | 2nd Keynote Address: Nayeem Islam, VP, Qualcomm, Title: Intelligent Pre-emptive Security on mobile devices |
10:00-10:20am | Isaac Cohen, Director, United Technology Research Center, Title: Cyber Physical Systems Security |
10:20-10:50am | Break |
Session 2 | Session Chair: Jia Di, University of Arkansas |
10:50-11:10am | Daniel Marrujo, Lead Microelectronics Reliability Engineer, Defense Microelectronics Activity, Title: Current Challenges for Integrated Circuit Security. |
11:10-11:30am | Ron Perez, Systems Security Fellow at Cryptography Research, Inc., Title: An industry view on the progression to System on Chip Roots of Trust. |
11:30-11:50am | Matthew Scholl, Deputy Division Chief, Computer Security Division, NIST, Title: NIST Cybersecurity Activities, Now and in the Future |
11:50-01:20pm | Lunch Session Chair: Navid Asadi, University of Florida Lunch Speaker: Swarup Bhunia, FICS, University of Florida, Title: Authentication: from Microchip to Medicine. |
Session 3 | Session Chair: Chris Daverse, SRC |
01:20-01:55pm | 3rd Keynote Address: Joe Jarzombek, Global Manager, Software Supply Chain, Synopsys Software Integrity Group, Title: Mitigating Risks Attributable to Supply Chain Processes and Products: addressing the most exploitable vectors of attack. |
02:00-02:20pm | Jason Morrow, Walmart Technology – Security Operations Center, Title: Security Operations Centers – Key Success Factors |
02:20-02:40pm | Mike Strizich, President, Micronet Solutions, Inc., Title: Reverse Engineering State of the Art Challenges |
02:40-03:00pm | Jonathon D. Mellott, Ph.D., CTO, The Athena Group, Title: Threats and Countermeasures: Strategies for Evolutionary Delivery of Security Capabilities. |
03:00-04:00pm | Student Poster Session, Demos Session Chair: Patrick Traynor, University of Florida |
04:00-05:30pm | Panel 1: Cyber Physical Systems Security: What are the Challenges and Best Practices? Moderator: Ken Heffner (Honeywell)Panelists: Kevin Butler (UF), Isaac Cohen (UTRC), Marco Carvalho (FIT), Selcuk Uluagac(FIU) |
Wednesday, February 10, 2016
07:30-08:30am | Registration and Breakfast |
Session 4 | Session Chair: Sohrab Aftabjahani, Intel |
08:30-09:00am | 4th Keynote Address: Jason Sanabia, President and CEO, Raith America, Inc. Title: Reversing the Lenses of the SEM for Nanotechnology, and Now Back Again for Reverse Engineering. |
09:00-09:20am | Serge Leef, Vice President, New Ventures, Mentor Graphics, Title: Fortifying Supply Chain Through Secure SoC Design |
09:20-09:40am | Bill Eklow, Distinguished Engineer, Cisco, Title: Mitigating Boundary-scan attacks by applying IJTAG architecture and protocol to traditional 1149.1 Boundary-scan. |
09:40-10:00am | Domenic Forte, FICS, University of Florida, Title: Human-to-Device Authentication |
10:00-10:30am | Break |
Session 5 | Session Chair: Richard Vigeant, Draper |
10:30-10:50am | Brian Murray, Director, Zf TRW, Title: Challenges in Automotive Security |
10:50-11:10am | Yier Jin, University of Central Florida, Title: IOT Security: From Hacking to Defense |
11:10-11:30am | David Ott, Research Director, University Research Office, Intel Labs, Title: IOT Security Challenges and Intel University Research Initiatives. |
11:30-11:50pm | Arnett Brown, Senior Lead Engineer, Booze Allen Hamilton (BAH), Title: The DARPA SHIELD Program. |
11:50-01:20pm | Lunch, Award Presentation Lunch Speaker: Carlos Aguayo Gonzalez, CTO, PFP Cybersecurity, Title: PFP: IoT Security from Cradle to Grave |
Session 6 | Session Chair: Fareena Saqib, Florida Institute of Technology (FIT) |
01:20-01:40pm | Janice Meraglia, Vice President, Government And Military Programs at Applied DNA Sciences, Applied DNA Science, Title: Proactive Cyber Physical Protection Using DNA |
01:40-02:00pm | Richard Newell, Microsemi, Title: Secure Production Programming of FPGAs. |
02:00-02:20pm | Daniela Oliveira, FICS, University of Florida, Title: Inconsistent Deception at the Operating system Level as Adjuvant Therapy Against Advanced Persistent Threats. |
02:20-02:40pm | Tom Shrimpton, FICS, University of Florida, Title: Making Square Pegs Round with Format-Transforming Encryption |
02:40-03:10pm | Student Poster Session, Demos |
03:10-04:40pm | Panel 2: Cybersecurity Metrics and Standards: Why they have been a challenge? Moderator: TBAPanelists: Tony Jeffs (Cisco), Prabhat Mishra (UF), Matt Casto (AFRL), Apostol Vassilev (NIST), Steve Trimberger (Xilinx) |
04:40-05:00pm | Concluding Remarks |
Poster Presentations
Poster # | Poster Title | Authors |
1 | Title: A Comprehensive Solution for Defending IoT Supply Chain | Authors : Kun Yang, Domenic Forte, and Mark M. Tehranipoor |
2 | Title: The Case for Unpredictability and Deception as OS Features | Authors: Ruimin Sun, Andrew Lee, Sandhya Vinjam, Donald Porter (Stony Brook), Matt Bishop (UC Davis), Daniela Oliveira. |
3 | Title: The Case for Provenance as a First Class Citizen in Operating Systems | Authors: Adam Bates and Kevin R.B. Butler |
4 | Title: SSL Certificate Verification Enhancements for the Server | Authors: Grant Hernandez, Adam Bates, and Kevin R.B. Butler |
5 | Title: ProvUSB: Block-level Provenance for USB Storage Devices. | Authors: Dave (Jing) Tian (University of Florida), Adam Bates (University of Florida), Kevin Butler (University of Florida), Raju Rangaswami (Florida International University). |
6 | Title: Impact of X-ray Tomography on the Reliability of FPGAs. | Authors: Md Mahbub Alam, Navid Asadizanjani, Mark Tehranipoor, and Domenic Forte |
7 | Title: Non-destructive PCB Reverse Engineering Using X-ray Tomography. | Authors: Navid Asadizanjani, Domenic Forte, Mark Tehranipoor |
8 | Title: Heart-to-Devices (H2D) Authentication: Challenges and Solutions | Authors: Zimu Guo, Nima Karimian, Mark M. Tehranipoor and Domenic Forte |
9 | Title: Design of Low-Cost Memory-Based Security Primitives and Techniques for High-Volume Products. | Authors: Md. Tauhidur Rahman, Zimu Guo, Domenic Forte and Mark Tehranipoor. |
10 | Title: Secure split-test for Preventing Distribution of Unlicensed and Rejected ICs by Untrusted Foundry and Assembly. | Authors: Md. Tauhidur Rahman, Gustavo K. Contreras, Domenic Forte, and Mark Tehranipoor. |
11 | Title: Techniques to Improve RO-PUF Robustness Against Environmental Variations and Aging. | Authors: Md. Tauhidur Rahman, Fahim Rahman, Domenic Forte, and Mark Tehranipoor. |
12 | Title: Secure Vulnerability Analysis of Design-for-Test Exploits for Asset Protection. | Authors: Gustavo K. Contreras, Adib Nahiyan, Dominic Forte, Mark Tehranipoor. |
13 | Title: DSeRC: Design Security Rule Check. | Authors: Adib Nahiyan, Kan Xiao, Gustavo Contreras, Domenic Forte and Mark Tehranipoor. |
14 | Title: Lightweight On-Chip Sensors for Combating Recycled ICs. | Authors: Bicky Shakya, Ujjwal Guin, Mark Tehranipoor, Domenic Forte |
15 | Title: Trust-Hub: Development of Trust Benchmarks, Trojan Benchmarks, and Hardware Validation Platforms. | Authors: Miao (Tony) He, Bicky Shakya, Rahul Vittal, Domenic Forte, and Mark Tehranipoor |
16 | Title: Randomness at Materials Level: poly-Si for Physical unclonable functions (PUFs). | Authors: Haoting Shen, Fahim Rahman, Bicky Shakya, Domenic Forte, Mark Tehranipoor |
17 | Title: The Frigate Compiler for Secure Computation. | Authors: Benjamin Mood, Debayan Gupta, Henry Carter, Kevin Butler, and Patrick Traynor. |
18 | Title: Tracking Data Flow in Soft IPs through Structural Checking Tool. | Authors: Thao Le and Jia Di. |
19 | Title: Keeping an Eye Out for Blindspots. | Authors: Olabode Anise, Rad Akefirad, Donovan Ellis, Yuriy Brun, Justin Cappos, Natalie Ebner, Daniela Oliveira, and Yanyan Zhuang. |
20 | Title: *Droid: Assessment and Evaluation of Android Application Analysis Tools | Authors: Bradley Reaves, Jasmine Bowers, Sigmond Albert Gorski III, Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza, Karachiwala, Nolen Scaife, Byron Wright, Kevin Butler, William Enck, Patrick Traynor |
21 | Title: Spear Phishing Emails: User Age Influences Susceptibility to Psychological Weapons of Influence. | Authors: Huizi Yang, Sandeep Dommaraju, Harold Rocha, Devon Weir, Donovan Ellis, Melis Muradoglu, Daniela Oliveira and Natalie Ebner. |
22 | Title: Threshold defined logic engines and applications. | Authors: Anirudh Iyengar and Swaroop Ghosh. |
23 | Title: Security and privacy issues of non-volatile memories and solutions. | Authors: Nitin Rathi and Swaroop Ghosh. |
24 | Title: Multi-Dimension Self-Referencing for Golden Free Trojan Detection under Process Noise. | Authors: Tamzidul Hoque, Robert Karam, Swarup Bhunia. |
25 | Title: Remote Authentication Scheme to Prevent Physical Tampering of PCB. | Authors: Shuo Yang, Tamzidul Hoque, Swarup Bhunia. |
26 | Title: Current-based PUF Implemented into Memory | Authors: Fengchao Zhang, Shuo Yang, Swarup Bhunia. |
27 | Title: Comprehensive Security Analysis of Commercial and Industrial Internet of Things Devices. | Authors: Jacob Wurm and Yier Jin. |
28 | Title: Hardware-Supported Cross-Layer Cybersecurity Solutions. | Authors: Orlando Arias and Yier Jin. |
29 | Title: Emerging Devices in Hardware Security Applications Beyond PUF. | Authors: Kaveh Shamsi and Yier Jin. |
30 | Title: Trust Validation of Hardware Intellectual Property (IP) Cores. | Authors: Farimah Farahmandi and Prabhat Mishra. |
31,32 | Title: Personalized Security for Advanced Persistent Threats: From Detecting Host Atypical Behavior to Generating People’s and Group’s Signatures | Authors: Aokun Chen1, Pratik Brahma1, Sai Srivatsav Durgam1, Brandon Mathews2, Dapeng Wu1, Daniela Oliveira1, Jed Crandall3, Michalis Faloutsos4, Xuetao Wei5 1. University of Florida 2. MIT Lincoln Laboratory 3. University of New Mexico 4. University of California Riverside 5. University of Cincinnati |
33 | Title: Trace Buffer Attack and Countermeasures. | Authors: Yuanwen Huang and Prabhat Mishra. |
34 | Title: Trojan Attacks and Trojan-Resilient Design in FPGA. | Authors: Sanchita Mal-Sarkar (Cleaveland State University) |
35 | Title: Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge | Authors: Bradley Reaves, Ethan Shernan, Adam Bates, Henry Carter and Patrick Traynor |
36 | Title: CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. | Authors: Nolen Scaife, Henry Carter, Patrick Traynor, Kevin Butler. |
37 | Title: FICS Experimental Lab Facilities. | Authors: Navid Asadizanjani, Domenic Forte, Mark Tehranipoor. |
38 | Title: An online database for counterfeit defects. | Authors: Navid Asadizanjani, Domenic Forte, Mark Tehranipoor. |