NSF/IARPA/NSA Workshop on the
Science of Security
The Claremont Resort, Berkeley CA
Monday, 17 November - Tuesday, 18 November 2008

Register | Agenda | Breakouts | Questions | Participants | Venue Information

Agenda

PDF Version for Printing

The tenative agenda (subject to change) is below. All sessions will be in the Napa 3 room except as noted.

Sunday, Nov 16

6-8pm Reception at Claremont (Monterey Room)

Monday, Nov 17

8:30amBreakfast (Napa 3)
9:00amWelcome

Karl Levitt, National Science Foundation
Lisa Porter, Director, Intelligence Advanced Research Projects Activity
Frederick Chang, University of Texas at Austin and former Director of Research, National Security Agency
9:30-10:30Keynote talk: Fred B. Schneider, Department of Computer Science, Cornell University
A Map For Security Science
Abstract: While today much security research is about defending against the attack du jour, there has been theoretical work in computer security and there are the beginnings of a science base for security. This talk will discuss the kinds of questions one might expect a science base to address. It will also give examples of how such questions could be answered. Basic concepts in security, such as attack, policy, and enforcement turn out to be surprisingly subtle to define.

[Slides]

10:30-11 Break
11-noon
Panel: "Is there a science of security (and if so, what might it look like)?" (Moderator: Carl Landwehr, IARPA)
Anupam Datta, Carnegie Mellon University [Slides]
Joshua Guttman, MITRE [Slides]
Michael Reiter, University of North Carolina [Slides]
noon-1:30 Lunch
1:30-2:30
Panel: "What can we learn from other fields?" (Moderator: Cliff Wang, ARO)
Stephanie Forrest, University of New Mexico [Slides]
Alfred Hero, University of Michigan [Slides]
Stuart Russell, University of California, Berkeley [Slides]
2:30-2:45 Discussion
2:45-3:00 Break
3:00-4:15 Breakout group discussions (see breakouts for details):
What can we learn from other fields? (Leader Pierre Moulin, UIUC) (Room: Zinfandel) [Slides]
How can we design systems with known security properties? (Leader Rebecca Wright, Rutgers University) (Room: Gamay) [Slides]
Is there a scientific way to measure security? (Leader Shouhuai Xu, University of Texas at San Antonio) (Room: Cabernet) [Slides]
4:30-5:00 Reconvene for breakout group reports, discussion
6:00 Meet in Claremont Lobby to go to workshop dinner at Garibaldis Restaurant (5356 College Ave.)

Tuesday, Nov 18

8:30am Breakfast
9-9:30amFrederick Chang, University of Texas at Austin and former Director of Research, National Security Agency
9:30-10:30
Panel: "How can we reason about impossible things?" (Moderator: Robert Herklotz, AFOSR)
Byron Cook, Microsoft Research Cambridge/Cambridge University
Dusko Pavlovic, Kestrel Institute/Oxford University [Slides]
Hal Varian, University of California, Berkeley/Google Chief Economist
10:30-10:45 Break
10:45-11:15 John Doyle, Professor of Control & Dynamical Systems, Electrical Engineering, and BioEngineering, California Institute of Technology
Theoretical foundations:Architecture, control, networks, robustness, and complexity [Slides (PPT): 1. Intro, 2. ArchBio, 3. BioBode, 4. Internet]
11:30-12:30
Panel: "Are scientific experiments in security possible?" (Moderator: Karl Levitt)
Roy Maxion, Carnegie Mellon University [Slides]
John Mitchell, Stanford University [Slides]
Vicraj Thomas, BBN Technologies [Slides]
12:30-1:30 Lunch
1:30-2:30 Breakout group discussions: (see breakouts for details)
Complexity (how can we reason about complex systems? how do we design systems with known properties involving complex interactions?) (Leader: Sampath Kannan, NSF) (Room: Zinfandel) [Notes]
Experimentation (what is necessary for scientific experiments in security? what can be learned from experiments?) (Leader: Karl Levitt, NSF) (Room: Gamay)
Composition (how can we assure security properties for systems constructed by composing components that may have known security properties individually?) (Leader: John Rushby, SRI) (Room: Cabernet) [Slides]
2:30-3:00 Summary discussion
3:00-3:15 Break
3:15-4:15 Breakout group discussions: (see breakouts for details)
Questions and Promising Approaches for a Science of Security [Charge Slides]
Steven King, OSD [Slides]
Son Dao, HRL Laboratories [Slides]
4:15-5:00 Discussion, wrap-up