LERSAIS is host to a Seminar Series that brings researchers and practitioners to Pittsburgh to share emerging developments and research in the area of Information Assurance. The field of Cyber Security faces new challenges and demands on a daily basis and these seminars serve to keep students, faculty, and business leaders abreast of issues in both the laboratory and industry.
Professionals and investigators who would like more information on this series, or have an idea for a topic, are invited to contact Prof. James Joshi.
The seminars are open to all. Check out our upcoming presentations.
Fall 2019
Upcoming LERSAIS Cybersecurity Seminar
(organized by SCI, LERSAIS and Pitt Cyber)
Dr. Shamik Sural
The Joint LERSAIS and PittCyber Distinguished Cybersecurity Seminar
November 18
Optimal User Assignment in Constrained Role Based Access Control Systems
Dr. Shamik Sural
Professor, Indian Institute of Technology (IIT) Kharagpur and fulbright scholar at Rutgers University
Time/Location
11:00 AM - 12:00 PM
November 18
Information Sciences Building, 3rd floor theatre
135 North Bellefield Ave
Abstract:
One of the critical requirements towards success of any business organization is efficient management of its human capital. In a typically resource constrained organizational environment, maximizing the utilization of its available workforce is imperative. However, tasks cannot simply be assigned to arbitrary employees since they need to have the necessary capabilities for executing the same. Furthermore, security constraints forbid any ad hoc assignments and also enforce major dependencies on other employees who have access to the same tasks. Owing to the increasing size and scale of organizations, both in terms of the number of employees as well as resources to be managed, it is imperative that efficient computational solutions be developed to automate the process of employee to task assignment.
Since role-based access control (RBAC) is still the most commonly used access control model for commercial information systems, we consider organizational policies and constraints to be modeled with RBAC. In the first part of the talk, we will look into the problem of determining a minimal set of users and their role assignments in an RBAC system with a set of Separation of Duty and Cardinality constraints. We model it as a hypergraph coloring problem and provide efficient heuristics for its solution. We next consider a related though different situation in which the goal is to achieve optimal user deployment for a given set of users, roles and constraints. Here optimality is in the sense of maximizing the number of assignments of users to roles. Our experimental results show the efficiency of the proposed approaches while generating close to optimal solutions.
Biography:
Shamik Sural is a full professor in the Department of Computer Science and Engineering, Indian Institute of Technology (IIT) Kharagpur and is currently heading its Computer and Informatics Center. He received the Ph.D. degree from Jadavpur University, Kolkata, India in the year 2000. Before joining IIT in 2002, Shamik spent more than a decade in the Information Technology industry working in India as well as in Michigan, USA.
Shamik is a recipient of the Alexander von Humboldt Fellowship for Experienced Researchers, which enabled him to carry out collaborative research at TU Munich, Germany in 2009-10. He is spending the Fall 2019 semester at Rutgers University as a Fulbright scholar engaged in both teaching and research. Shamik is a senior member of IEEE and has previously served as the Chairman of the IEEE Kharagpur section. He is currently serving on the editorial boards of IEEE Transactions on Dependable & Secure Computing and IEEE Transactions on Services Computing. He has published more than two hundred research papers in reputed international journals and conferences. His research interests include computer security, data mining and multimedia systems.
Dr. Indrajit Ray
The Joint LERSAIS and PittCyber Distinguished Cybersecurity Seminar
December 6
That’s My DNA: Digital Signatures to Ensure Authenticity and Integrity of Synthetic DNA Molecules
Dr. Indrajit Ray
Professor, Computer Science, Colorado State University and Program Director, NSF
Time/Location
3:00 PM - 4:00 PM
December 6
Information Sciences Building, 3rd floor theatre
135 North Bellefield Ave
Abstract:
DNA synthesis has become increasingly common, and many synthetic DNA molecules are licensed as intellectual property (IP). DNA samples are shared between academic labs, ordered from DNA synthesis companies and manipulated for a variety of different purposes, mostly to study their properties and improve upon them. However, it is not uncommon for a sample to change hands many times with very little accompanying information and no proof of origin. This poses significant challenges to the original inventor of a DNA molecule, trying to protect her IP rights. More importantly, following the anthrax attacks of 2001, there is an increased urgency to employ microbial forensic technologies to trace and track agent inventories. However, attribution of physical samples is next to impossible with existing technologies. We try to bring in advances in the digital domain to solve this problem. In this talk, we discuss our efforts to physically embed digital signatures in DNA molecules synthesized in the laboratory. We encounter several challenges that we do not face in the digital world that makes this problem interesting. These challenges arise primarily from the fact that changes to a physical DNA molecule can affect its properties, random mutations can accumulate in DNA samples over time, DNA sequencers can sequence (read) DNA erroneously and DNA sequencing is still relatively expensive which means that laboratories would prefer not to read and re-read their DNA samples to get error-free sequences. Moreover, unlike in the digital world where an erroneously received message can be re-sent with little additional cost, it is expensive to re-send an erroneously received sample since the physical sample needs to be created once more. It makes more sense to determine if the erroneously received sequence can still be used.
Biography:
Dr. Indrajit Ray is a Professor of Computer Science at Colorado State University. He joined CSU in 2001 moving from the University of Michigan-Dearborn where he worked as an Assistant Professor from August 1997 – July 2001. Dr. Ray obtained his Ph.D. in Information Technology from George Mason University in August 1997. Indrajit’s primary research is in computer security and privacy. His major contributions have been in security risk modeling and security protocol design using applied cryptographic techniques. Other areas in which he has made valuable contributions are trust models for security and micro-data disclosure control. He has published more than 150 technical papers. His research has been well funded through various federal agencies. He has advised several Ph.D. students many of whom hold tenured positions in academia. He has also played leadership roles in the academic community by serving as program chairs in various conferences. In 2015 he served as General Chair of the 2015 ACM CCS conference which is the flagship conference of ACM SIGSAC, and in 2017 as the General Chair of the 2017 IEEE CNS conference. He was the founder of the IFIP TC 11, WG 11.9 on Digital Forensics and its first Chair. Recently, Indrajit has helped establish the CSU site of the NSF funded I/UCRC Center for Configuration Analytics and Automation, where he is Co-Director. This multi-university research center that includes fee-paying members from the industry and FFRDCs works with enterprises and government entities to improve service assurability, security and resiliency of enterprise IT systems, cloud/SDN data centers, and cyber-physical systems by applying innovative analytics and automation. Currently, he is serving as a Program Director at the National Science Foundation, where is responsible for the Secure and Trustworthy Cyberspace program.
Archived LERSAIS Cybersecurity Seminar
Seminar Archives
- Spring 2019
- Fall 2018
- Fall 2017
- Spring 2017
- Spring 2016
- Fall 2015
- Spring 2015
- Fall 2014
- Spring 2014
- Fall 2013
- Fall 2012
- Fall 2011
- Spring 2011
- Fall 2010
- Spring 2009
- Fall 2008
- Fall 2007
- Spring 2007
- Fall 2006
- Spring 2006
- Fall 2005
- Spring 2005
Index of Speakers
- Adam, Nabil R. (CIMIC, Rutgers)
- Ahmed, Tanvir (Principal Member of Technical Staff, Database Security Group, Oracle)
- Anton, Ana (Annie) I. (Associate Professor, North Carolina State University)
- Anwar, Mohd (Visiting Scholar, University of Pittsburgh)
- Baurer, Lujo (Research Scientist, Carnegie Mellon University)
- Brustolony, José Carlos (Assistant Professor, University of Pittsburgh)
- Cao, Feng (CISCO Systems)
- Claycomb, Bill (Senior Member of Technical Staff, SEI; Research Scientist, CERT)
- Clemm, Alexander (Principal Engineer, Cisco)
- Cohen, Fred (CEO, Fred Cohen & Associates; Research Professor, University of New Haven; Adjunct Professor, University of San Francisco)
- Cranor, Lorrie (Associate Research Professor, Carnegie Mellon University)
- Cukier, Michel (Assistant Professor, University of Maryland)
- Cybenko, George (Professor, Dartmouth College)
- Du, Wenliang [Kevin] (Assistant Professor, Syracuse University)
- Eltoweissy, Mohamed (2010, 2006) (Chief Scientist of Secure Cyber Systems, Pacific Northwest National Laboratory)
- Farkas, Csilla (University of South Carolina)
- Ferraiolo, David (Computer Scientist, National Institute of Standards and Technology)
- Ghinita, Gabriel (Assistant Professor, University of Massachusetts)
- Heim, Patrick (Vice President Enterprise Security, McKesson Corporation)
- Hoffman, Lance J. (Professor, George Washington University)
- Hong, Jason (Asst. Professor, Carnegie Mellon University)
- Kantarcioglu, Murat (Assistant Professor, University of Texas, Dallas)
- Kim, Gene (Co-founder, Chief Technology Officer, Tripwire Inc.)
- Keener, Dave (Chief Security Officer, Vigilant Minds Inc.)
- Koski, Susan M. (Vice President, Corporate Information Security Manager of Network and Perimeter Defense, Mellon Financial Corporation)
- Landau, Susan (Distinguished Engineer, Sun Microsystems)
- Lee, Adam (Assistant Professor, University of Pittsburgh)
- Lee, Wenke (Associate Professor, Georgia Institute of Technology)
- Lindstrom, Pete (Research Director, Spire Security, LLC)
- Liu, Ling (Associate Professor, Georgia Institute of Technology)
- Liu, Peng (Assistant Professor, Penn State University)
- Ludwig, Heiko (Research Staff Member and Manager, IBM Research)
- Mironov, Ilya (Research Scientist at Google)
- McDaniel, Patrick (Professor of Computer Science and Engineering, Pennsylvania State University)
- Machanavajjhala, Ashwin (Assistant Professor, Duke University)
- Maino, Fabio (Distinguished Engineer, Cisco)
- Maxion, Roy (Research Professor in Computer Science and Machine Learning)
- Myers, Andrew (Associate Professor, Cornell University)
- Nepal, Surya (Principal Research Scientist, CSIRO ICT Centre, Australia)
- Ning, Peng (Assistant professor, NC State University)
- Pu, Calton (Professor, John P. Imlay, Jr. Chair in Software, Georgia Institute of Technology)
- Roque, Antonio (Professor and Vice Chancellor for Research, University of California, Davis)
- Ray, Indrakshi (Assistant Professor, Colorado State University)
- Sailer, Reiner (IBM Thomas J. Watson Research Center)
- Scherer, Steve (Principal Staff Software Engineer, Motorola, Inc.)
- Shrestha, Rasu (Chief Innovation Officer, UPMC Executive Vice President, UPMC Enterprises)
- Smith, Sean V. (Assistant Professor, Dartmouth College)
- Squicciarini, Anna (Assistant Professor, Penn State University)
- Scurlock, Antonio "T" (Chief, Cybersecurity Plans & Coordination (CPC) Office of the Assistant Secretary (OAS), Cybersecurity & Communications (CS&C), Department of Homeland Security (DHS))
- Srinivasan, Kannan (Research Officer, National Research Council of Canada)
- Srivastava, Mudhakar (Research Scientist, IBM Thomas J. Watson Research Center)
- Shmatikov, Vitaly (Professor, Cornel Tech)
- Vaidya, Jaideep (Assistant Professor, Rutgers University)
- Wing, Jeannette M. (President's Professor and Head of Computer Science Department, Carnegie Mellon University)
- Wu, Felix (Professor, UC Davis)
- Yan, Guanhua (Technical Staff Member, Los Alamos National Laboratory)
- Yavuz, Atilla (Research Scientist, Bosch Research and Technology Center)
- Zhang, Tao (Chief Scientist, Cisco Systems)
- Zhang, Youtao (Assistant Professor, University of Pittsburgh)
- Zhao, Ben Y. (Associate Professor, UC Santa Barbara)
- Zic, John (2010, 2008)(Visiting Associate Professor, University of New South Wales)
Index of Represented Schools and Businesses
- Bosch Research and Technology Center (Pittsburgh, PA)
- Carnegie Mellon University, CyLab
- Carnegie Mellon University, Computer Science Department (Jeannette M. Wing, Roy Maxion)
- Carnegie Mellon University, Department of Engineering & Public Policy
- Carnegie Mellon University, Human Computer Interaction Institute
- Carnegie Mellon University, Software Engineering Institute
- CERT Enterprise Threat and Vulnerability Management Team
- Cisco Systems (Fabio Maino, Alexander Clemm, Feng Cao, Tao Zhang)
- Colorado State University
- Cornell University
- Cornell Tech
- CSIRO ICT Centre (Australia)
- Dartmouth College, Thayer School of Engineering
- Dartmouth College, Department of Computer Science
- Department of Homeland Security (DHS)
- Duke University
- Fred Cohen & Associates
- George Washington University
- Georgia Institute of Technology (Calton Pu, Ling Liu, Wenke Lee)
- Google Research
- IBM Thomas J. Watson Research Center (Mudhakar Srivastava, Reiner Sailer)
- IBM Research - Almaden
- Los Alamos National Laboratory, Information Sciences Group
- Maryland, University of
- Massachusetts, University of
- McKesson Corporation
- Mellon Financial Corporation
- Motorola, Inc.
- National Institute of Standards and Technology, Computer Security Division
- National Research Council of Canada, Institute for Information Technology - Wireless Systems (IIT-WS)
- New Haven, University of
- New South Wales, University of (John Zic 2010, John Zic 2008)
- North Carolina State University (Ana Anton, Peng Ning)
- Oracle, Database Security Group
- Pacific Northwest National Laboratory
- Penn State University, College of Information Sciences and Technology (Anna Squicciarini, Peng Liu)
- Pennsylvania State University, Computer Science and Engineering
- Pittsburgh, University of; School of Information Sciences
- Pittsburgh, University of; Department of Computer Science (Adam Lee, José Carlos Brustolony, Youtao Zhang)
- Rutgers University (Nabil R. Adam, Jaideep Vaidya)
- San Francisco, University of
- South Carolina, University of
- Spire Security, LLC (Malvern, PA)
- Sun Microsystems
- Syracuse University
- Texas, University of; Dallas
- Tripwire Inc.
- UC Davis
- UC Santa Barbara
- UPMC Enterprises
- Vigilant Minds Inc.
- Virginia Tech, The Bradley Department of Electrical and Computer Engineering
Index of Talks
- Access Control on Data through SQL Transformation
- An Anonymous Fair-Exchange E-Commerce Protocol
- Attack-Resistant Location Estimation in Wireless Sensor Networks
- Auditable Controls Of Best In Class IT Operations and Security Organizations
- Automated N-Tier System Management through Experimental Measurements
- Automatic Generation and Analysis of Attack Graphs
- BioSENSE: Biologically-inspired Secure Elastic Networked Sensor Environment
- Blowfish Privacy: Tuning Privacy-Utility Tradeoffs in Statistical Databases using Policies
- Botnet Detection and Response
- Building and using Hardware-based Trusted Third Parties
- Building our own Trojan Horse: Communications Surveillance and Creating Communications (In)Security
- Building Trusted Collaborations
- Cybersecurity Role and Operations of the Department of Homeland Security
- Combating Cyber Threats with High-Performance Computers
- Confidentiality-Preserving Distributed Proofs of Conjunctive Queries
- Considerations for Security Outsourcing
- Countering Targeted File Attacks using LocationGuard
- Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel
- Defending against Internet Worm Attacks
- Detecting and Characterizing Spam Campaigns in Online Social Networks
- Enabling Secure Communications in Sensor Networks
- ETA: Efficient and Tiny and Authentication for Heterogeneous Wireless Systems
- Evolution of Access Control in Commercial Products
- An Experimental Analysis of Scans and Their Impact on Attacks
- The Future of Information Security
- Geometric and Cryptographic Transformations for Private Matching of Spatial Datasets
- Got Discipline? The Four Disciplines of Security Management
- Grey: Flexible Access Control For Everyone
- A Hybrid Approach for Private Record Linkage
- The Importance of Measurement and Decision Making to a Science of Security
- Information Policy Issues in the Post-attack Age
- Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks
- Isolation And Integrity Management In Dynamic Virtualized Environments
- Life Changing Innovation: data to actionable insights to impactful change
- A Lightweight Security Protocol for Wireless Communications
- Locator/ID Separation Protocol (LISP): Security Consideration in the Design of a Next Generation Network Architecture
- Machine Learning and Privacy: Friends or Foes?
- Making better information security decisions by identifying and reducing cognitive errors and providing expert guidance
- Managing Information Security at a Fortune 100 - a View from the Trenches
- Managing Privacy, Security and Trust in E-Learning and Social Networks
- Measuring and Managing Quality of Service in a Cloud Environment
- Mobile Device Embedded Security - History and Current Challenges
- On Leveraging Social Informatics for Cyber Security
- On Privacy-Preserving Data Mining
- On the Road Towards Network-embedded Management
- Privacy Enhancing Techniques for Social Network
- Privacy-preserving Telemetry in Google Chrome: Seeing the Forest Without Seeing the Trees
- Process Detection in Network Security and Autonomic Computing
- Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers
- Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks
- The Role Mining Problem - A Formal Perspective
- Securing Large-Scale Consumer Vehicle Networks
- Security in Internet of Things (IoT)
- Security in Web Applications
- Science of Cybersecurity