1st Annual Symposium

Cybersecurity & Information Assurance

Featured Speakers

  • Kevin A. Kwiat

    Principal Computer Engineer, U.S. Air Force Research Laboratory in Rome, NY

    Kevin A. Kwiat has been with the U.S. Air Force Research Laboratory (AFRL) in Rome, New York for over 28 years. He received the BS in Computer Science and the BA in Mathematics from Utica College of Syracuse University, and the MS in Computer Engineering and the Ph.D. in Computer Engineering from Syracuse University. He holds 4 patents. In addition to his duties with the Air Force, he is an adjunct professor of Computer Science at the State University of New York at Utica/ Rome, an adjunct instructor of Computer Engineering at Syracuse University, and a Research Associate Professor with the University at Buffalo. He completed assignments as an adjunct professor at Utica College of Syracuse University, a lecturer at Hamilton College, a visiting scientist at Cornell University, and as a visiting researcher at the University of Edinburgh as part of the Air Force Office of Scientific Research “Window on Europe” program. He has been by recognized by the AFRL Information Directorate with awards for best paper, excellence in technology teaming, and for outstanding individual basic research. His main research interest is dependable computer design.

    Presentation Title: Survivability in Cyberspace

    Abstract: Defense of cyberspace is challenging. The seemingly endless breadth of cyberspace coupled with the technological depth of its composition can divide defensive approaches to be either overarching or highly specific. In order to abstract away details for the purpose of tractability, overarching approaches can suffer because simplistic models for threats, vulnerabilities, and exploits tend to yield defenses that are too optimistic. Approaches that deal with specific threats, vulnerabilities and exploits may be more credible but can quickly lose their meaningfulness as technology changes. Whether approaches are near-or-far term, there are two underlying attributes remain essential: the ability to survive and the ability to fight through.

    The justification for treating survival and fight-through as inseparable is: although cyberspace’s apparent vastness seems to convey a limitless supply of information and network-related resources, the actual amount of these resources under any single genuine entity’s control is typically very limited. However, an attacker’s aim to overtake resources may not be easily bounded. Thus, driving the goal’s dual survive-and-fight through make-up is that while the part of cyberspace under single, genuine control is limited, for that same part of cyberspace an adversary’s aim is to maximize control. This dictates that survive and fight-through remain joined. Considered separately, the accumulated loss of resources to the adversary will eventually undermine the ability to survive or the ability to fight through – but that is not so for both. That is, surviving an attack by sustaining its damage and fighting through that attack- again and again if necessary – with those remaining resources under the defender’s control allows the system to emerge, and remain, undefeated.

    Approved for Public Release; Distribution Unlimited: 88ABW-2010-1117

  • Jungwoo Ryoo

    Associate Professor of Information Science and Technology, Penn State University, Altoona, PA

    Jungwoo Ryoo is an associate professor of Information Sciences and Technology (IST) at the Pennsylvania State University-Altoona. Dr. Ryoo is also a graduate/affiliated faculty member of the college of IST at Penn State. His research interests include information assurance and security, software engineering, and computer networking. He is the author of numerous academic articles and conducts extensive research in software security, network/cyber security, security management (particularly in the government and medical sector), software architectures, architecture description languages (ADLs), object-oriented software development, formal methods and requirements engineering. Many of Dr. Ryoo’s research projects have been funded by both state and federal government agencies. He also has substantial industry experience in architecting and implementing secure, high performance software for large-scale network management systems. He received his Ph.D. in Computer Science from the University of Kansas in 2005.

    Presentation Title: Round-trip Security Engineering Using Tactics, Patterns, and the Two-Tier Programming Toolkit

    Abstract: Security patterns are well known solutions to recurring security design problems. The current use of patterns often focuses on the isolated adoption of them during the design phase, which falls short of taking advantage of the full potential of patterns and can even leads to a false sense of security. The use of security patterns during the design phase of a software development life cycle (SDLC) doesn’t guarantee the faithful implementation of the security patterns due to the possibility of programming errors or oversight. On the other hand, once properly associated with relevant security requirements, security patterns can serve as a crucial bridge that establishes a traceability relationship between requirements and implementation.

    The keynote speech will introduce novel concepts such as tactics and round-trip security engineering to demonstrate how security patterns can realize their true potential as one of the most important tools software engineers can use to build security into their software and make it more resilient to various security threats.

  • William R. Beckett

    Lead Principal-Technical Architect, AT&T Laboratories, Middletown, NJ

    William Beckett has designed and developed solutions for DDoS defense, secure electronic payments, customer care and financial reporting. Current work is developing visualization solutions for mobility service quality management. He holds a BA from Messiah College and an MS from Boston University.

    Presentation Title: Retrospective on DDoS Service Implementation

    Abstract: Implementing a security service on a large tier 1 network presents numerous challenges. Among the most critical problems are scaling products designed for enterprise implementations and integrating security solutions into an existing network. The talk will be a retrospective of implementing a DDoS solution in the AT&T network. We will look at challenges related to data collection, mitigating attacks and provisioning new service for customers.

  • Justin Cappos

    Assistant Professor of Computer Science and Engineering, Polytechnic Institute of New York University, NY

    Justin Cappos is an assistant professor at NYU’s Polytechnic Institute where he performs research on systems security. Justin focuses on understanding high-impact, large-scale problems by building and measuring deployed systems. His Seattle testbed is used in networking and security research and education. Seattle is deployed on tens of thousands of computers. His dissertation work was on Stork, a secure and efficient package manager that has been in use for the past 8 years. Security improvements in Stork have been adopted by most major Linux package managers including APT, YUM, Pacman, and YaST, leading to its use on millions of computers.

    Presentation Title: The Key to Security: Thinking With A Security Mindset

    Abstract: To many academics, computer security is uniquely diverse. At a top security conference, it is common to see papers on the mathematics of cryptography, secure processors, private data inference through scraping Facebook, machine learning techniques for decoding encrypted VoIP traffic, web browser scripting attacks, the economics of SPAM, onion routing, program verification, and other diverse topics. It can be hard to see a common link between these topics. As such, it can be hard to know what constitutes “security” as a field.

    In this talk, I will discuss how the common theme in security isn’t a technique, but is instead a concept — thinking with a security mindset. Using a security mindset is a way of considering how something can be (ab)used to cause it to behave in a different way than intended. To reinforce this idea, I will discuss a myriad of technical and non-technical examples that demonstrate thinking with a security mindset, including why one would repeatedly buy $0.01 of gas for hours at a time, how Bejeweled2 could steal your passwords / PIN, a way that a web server can cause a laptop to emit wireless beacons on your home wireless network, and an easy way to find thousands of vulnerable Linux servers.

  • Fred Carl

    Director, InfoAge Museum, Wall, NJ

    Since 1993 Fred Carl has donated time, expertise and funds to save Camp Evans. His goal is to inspire persons to learn science and history at this unique historic site. In 1998 he founded InfoAge Science History Center in Wall, NJ, a place to inspire kids to learn science. He serves as Director. Under his leadership, InfoAge has grown from a concept to a science community center with 17 museum spaces, a radar history archive and a library hosted in seven buildings. Twelve organizations have joined the InfoAge consortium. Saved from demolition twice, Camp Evans is now a National Historic Landmark and a historic district. It a place to show future generations how Americans used advanced technology to create modern communication and to show how the development of radar helped save democracy during WWII.

    Fred is a graduate of Monmouth University with a B.S. Degree in science education and a M.S. degree in computer science. During his professional career was employed by Amdahl Corp., IBM and Micro Strategies as a software engineer and pre-sales support engineer. His is an expert in dahlia culture and a recommended speaker by the Garden Clubs of NJ.

    Fred has two daughters and two grandchildren.

    Presentation Title: Camp Evans – a former secret base – a time capsule of technology history.

    Abstract: This presentation provides an overview of the communication technology history and its impact upon world events at the National Historic Landmark, Camp Evans. Established as a trans-oceanic wireless station in 1912, the site was used by the U. S. Navy in WWI and later by the Radio Corporation of America (RCA). Information security and enemy information collection played a roll in WWI. As WWII approached the old wireless site was expanded by the U. S. Army for radar and related technology development. Information security was essential during WWII. During the Cold War, the site continued to serve our national interest. The critical nature of the work is underscored by Senator Joe McCarthy 1953 visit to improve security in the radar laboratory.

  • Eamon Doherty

    Associate Professor and Director, Cybercrime Training Laboratory, Petrocelli College of Continuing Studies, FDU, Teaneck, NJ

    Doherty holds a Ph.D. in computer science from the University of Sunderland in England. He has published several academic papers, including one on augmentative communications programs designed for vegetative and comatose persons. His work in this area was presented at many conferences, including the 2000 Conference on Universal Usability held in Washington, D.C.

    Previously, Doherty worked to create various communication systems for paralyzed patients. With the help of graduate computer science students, Doherty has been instrumental in developing applications using Cyberlink, a computer interface that can be operated through facial movements or electrical brain transmissions. Projects included an emergency telephone communications system for paralyzed patients who are also voice-impaired, multilingual communications systems for such patients and a mind/body-operated robotic arm.

    Doherty’s recent interest in network security began in health care with the development of computer and network security systems for nursing home and retirement village residents. Supported by a grant from the National Guard, he is currently developing online classes in computer forensics and computer security administration for FDU’s online graduate degree and certificate programs in homeland security.

    Presentation Title: Hands-On Computer Forensics Demonstrations

    Abstract: This demonstration will highlight two commonly used software forensics tools that help extract simulated digital evidence from a digital camera and a cell phone. One of the pictures from these devices has the GPS coordinates embedded in it. A software tool will be applied to the picture to display a satellite view and the street map of where the picture was taken. This information helps in crime scene analysis and investigation. Other investigation tools such as a write blocker, a forensic examination machine, and the Cellebrite Mobile Forensics and Data Transfer system will be shown. Some consumer items that information security professionals encounter in the field, such as a tie with a microphone and a camera, will also be demonstrated.

Forensics Demonstration

Abstract

This demonstration will highlight two commonly used software forensics tools that help extract simulated digital evidence from a digital camera and a cell phone. One of the pictures from these devices has the GPS coordinates embedded in it. A software tool will be applied to the picture to display a satellite view and the street map of where the picture was taken. This information helps in crime scene analysis and investigation. Other investigation tools such as a write blocker, a forensic examination machine, and the Cellebrite Mobile Forensics and Data Transfer system will be shown. Some consumer items that information security professionals encounter in the field, such as a tie with a microphone and a camera, will also be demonstrated.

Speakers

Presentation by Dr. Eamon Doherty, Associate Professor and Director, Cybercrime Training Laboratory, Petrocelli College of Continuing Studies, FDU, Teaneck, NJ

Presentation by Elly Goei, Alumnus, FDU, Teaneck, NJ