Schedule

Monday, May 22nd

8:00am~9:00am Breakfast & Registration
  Coffee, juice, and various breakfast treats will be served in room 417 of the Dirac Science Library to start the day.
9:00am~9:15am Opening Remarks
9:15am~10:00am Translation in Cryptography: Signatures
  Guiseppe Ateniese. We will describe recently-developed techniques that can be used to “translate” between digital signatures. Given a signature from Alice on a certain message, we will show how a proxy can convert it into a signature from Bob on the same message without knowing Alice's or Bob's secret keys. We will describe several applications of this cryptographic primitive, including: sharing of certificates, generating space-efficient proofs that a path was taken, transparent certification in ad-hoc networks, and online group signatures. We will also provide the basics of digital signatures and pairings-based cryptography. Based on a joint work with Susan Hohenberger (MIT).
10:00am~10:30am Break
10:30am~11:45am Translation in Cryptography: Encryptions
  Giuseppe Ateniese. We will describe recently-developed techniques that can be used to “translate” between ciphertexts. In particular, we will introduce new techniques that allow a proxy to convert ciphertexts intended for Alice into ciphertexts readable by Bob. The proxy does not know Alice's or Bob's secret keys and won't learn the encrypted message during the translation. We will describe several applications of this cryptographic primitive, including: defeating spam of encrypted data , enabling access control in file/storage systems, and digital rights management. We will also provide the basics of encryption, semantic security, and bilinear problems. Based on a joint work with Kevin Fu (MIT), Matt Green (JHU), Susan Hohenberger (MIT).
11:45am~1:30pm Lunch Break
1:30pm~2:45pm Legal & Ethical Issues
  Jim Davis. We will analyze the legal and ethical issues surrounding information security, including the questions raised by heightened connectivity and the legal implications of free data transmission.
2:45pm~3:15pm Break
3:15pm~4:15pm Panel Discussion: Emerging Directions in Cryptographic Research
  Giuseppe Ateniese. Panel members will take questions from the audience.
4:30pm~5:30pm Panel Discussion: The Future of the Profession
  Jim Davis. Panel members will take questions from the audience.
5:30pm~7:00pm Reception
  A catered reception will be served in room 151 of the Love building. All attendees are welcome to come and mingle with the speakers present.

Tuesday, May 23rd

8:00am~8:45am Breakfast
  Coffee, juice, and various breakfast treats will be served in room 417 of the Dirac Science Library to start the day.
8:45am~10:00am Worms and Viruses of the Internet
  Evangelos Kranakis. In this talk we will survey how viruses and worms propagate in a network. We will discuss: Malicious Logic, Worm Attacks and the Internet, Classification of Worms, How to be More Effective, Population Models and Dynamics of Worm Propagation, Best Effort Models, Zero Time Models, and Search Models.
10:00am~10:30am Break
10:30am~11:15am Enhancing Intrusion Detection in Future Wireless Systems
  Evangelos Kranakis. Wireless systems are increasingly being used for important communication and it is a challenge to keep electronic data transmissions secure. In this talk we will discuss Challenges, Risks and Threats in Wireless Systems and how to enhance future Wireless IDS using Radio Frequency Fingerprinting and Mobility Profiles.
11:30am~1:30pm Lunch Break
1:30pm~2:30pm Panel Discussion: Emerging Directions in Security Research
  Evangelos Kranakis. Panel members will take questions from the audience.
2:30pm~3:15pm DoD Information Assurance Schloarship Program (IASP)
  The Department of Defense Information Assurance Education and Training Scholarship Program is targeted at rising junior and senior undergraduate students and graduate students who are looking for a full-ride scholarship.
3:15pm~3:45pm Break
3:45pm~4:45pm Panel Discussion: Security In Practice / Government Perspective
  US Department of Defense. Panel members will take questions from the audience.
4:45pm~5:00pm Break
5:00pm~6:00pm Employment Opportunities
  Melody Venable. We will discuss job opportunities available in the field of Information Security and answer questions from the audience.

Wednesday, May 24th

8:00am~8:45am Breakfast
  Coffee, juice, and various breakfast treats will be served in room 417 of the Dirac Science Library to start the day.
8:45am~10:00am Strong Security for Feeble Devices
  Breno de Medeiros. This talk describes simple, anonymous RFID identification protocols. By making specific setup, communication, and concurrency assumptions that are realistic in the RFID application setting, we arrive at a model that guarantees strong security and availability properties, while still permitting the design of practical RFID protocols.
10:00am~10:30am Break
10:30am~11:15am Towards Provable Security for Ubiquitous Applications
  Mike Burmester. We shall investigate the security of pervasive systems with focus on availability issues in the presence of a powerful adversary that can control some nodes and eavesdrop, re-route, modify, delay, and insert messages on all communication channels. We will articulate a formal security framework that is tuned for the analysis of protocols for constrained systems and show how this can be used with applications that involve MANET and RFID systems. In our approach we use optimistic protocols for which the overhead is minimal when the adversary is passive. When the adversary is active, depending on the application, the additional cost is either used to trace malicious behavior or born by non-constrained components of the system. Our goal is to design mechanisms that support self-healing and that promote a fault-free system state, or a stable system state, in the presence of a Byzantine adversary.
11:15am~12:00pm FSU Infosec Program
  Melody Venable. We will discuss details of the FSU Information Security program and answer questions for potential applicants.


SAIT Logo FSU Logo