SAVE THE DATE:
2014 Third Annual Cybersecurity Symposium
Tuesday June 10, 2014
See below for information from the 2013 Symposium.
2013 Second Annual Cybersecurity Symposium, May 14-15
Location: The Riggs Alumni Center. Parking in lot 1B, next to Riggs, is free
(despite posted signs) since it's finals week.
Drawing on regional experts of national and international acclaim, MC2’s second Annual Cybersecurity Symposium will showcase the latest research, trends, and topics in cybersecurity, including:
- Keynote addresses by Dr. Fred Schneider, Randy Sabett, Dr. Kathleen Fisher and Dr. Steve Bellovin.
- Tutorials by MC2 faculty and corporate partners
- Tech Talks by MC2 faculty
The MC2 Symposium program will broaden your knowledge, skillset, and awareness of cybersecurity problems and directions, and the event is sure to present unique opportunities to connect with colleagues across academia, industry, and the state and federal government.
2013 Symposium Schedule
|May 14 (Day 1)||Event||Speaker||Title|
|8:15 am||Registration and Breakfast|
|9:00 am||Welcome||Mike Hicks|
|9:15 am||Introductory Remarks||Dean Jayanth Banavar|
|9:30 am||Keynote||Fred Schneider||Doctrine for Cybersecurity
Sponsored by Intelligent Automation Inc.
|11:00 am||Technical Talks||Jen Golbeck||Trust and Privacy in Social Media|
|Jonathan Katz||Ever More Efficient Protocols for Secure Computation|
|Jeff Foster||Enhancing Security and Privacy on Android|
|Min Wu||Exploring the Invisibles for Information Forensics|
|1:45 pm||Keynote||Kathleen Fisher||High Assurance Cyber Military Systems (HACMS)|
|3:00 pm||Tutorials (choose one)||Ian Blumenfeld||An Introduction to Boolean Satisfiability|
|Andrew Ruef||Programming Analyses with LLVM|
|5:00 pm||Adjourn Day 1|
|May 15 (Day 2)||Event||Speaker||Title|
|8:45 am||Registration and Breakfast|
|9:10 am||Introductory Remarks||Mike Hicks|
|9:15 am||Keynote||Randy Sabett||Electronic Countermeasures - The Controversy Over Active Cyber Defense|
|10:30 am||Technical Talks||Mike Hicks||Kitsune: Efficient, General-purpose Dynamic Software Updating for C|
|Rob Maxwell||Using Students to Pen Test Your Network (for credit)|
|Sandy Boyson||Supply Chain Risk Management: The New Frontier in Cybersecurity|
|Dave Levin||Proving the Impossible with Alibi Protocols|
|1:15 pm||Keynote||Steve Bellovin||The PKI Challenge|
|2:30 pm||Tutorials||Elaine Shi||Cryptographic Techniques for Securely Outsourcing Storage and Computation|
|Mike Hicks||Using Symbolic Execution to Find Software Vulnerabilities|
|4:45 pm||Adjourn Symposium|