Security Research at the Center for Advanced Technology in Telecommunications

Similar documents
Center for Advanced Technology in Telecommunications (CATT) Research Overview

Cyber Security at NSU

Certified Cyber Security Analyst VS-1160

EC-Council Ethical Hacking and Countermeasures

Certified Cyber Security Analyst VS-1160

Information Assurance Program at West Point

UNM Information Assurance Scholarship for Service (SFS) Program

Teaching Information Security to Engineering Managers

University of Maryland Cybersecurity Center (MC 2 )

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY )

How To Become A Cybersecurity Consultant

Bellevue University Cybersecurity Programs & Courses

Welcome to the NSF Webinar on our newest solicitation on hardware security.

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Denial of Service Attacks and Resilient Overlay Networks

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Cybersecurity Definitions and Academic Landscape

Call for Papers for Next-Generation Networking and Internet Symposium

The University of Alabama Cyber Research Initiatives. Cyber Forensics Research Cyber Security Research

MARYLAND CYBERSECURITY CENTER

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

Introduction to Cyber Security / Information Security

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Participants: Introduction:

Crafting an Undergraduate Information Security Emphasis Within Information Technology

TUSKEGEE CYBER SECURITY PATH FORWARD

Detailed Description about course module wise:

Page: Designed & Executed By: Presents Cyber Security Training

Encouraging young people to develop the aptitude and skills to become the core of a strong cybersecurity community.

Computer Science at James Madison University

Homeland Open Security Technology HOST Program

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Turgut Ozal University. Computer Engineering Department. TR Ankara, Turkey

Forensic Cyber Security Research Expert

W ith an estimated 14 billion devices connected to

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA

POLICIES TO MITIGATE CYBER RISK

MSc Computer Security and Forensics. Examinations for / Semester 1

Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

Meeting Cyber Security Challenges

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

Educational Requirement Analysis for Information Security Professionals in Korea

1 Culminating project

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

e-code Academy Information Security Diploma Training Discerption

Your customers protected against cybercrime. New commercial opportunities for you

Microsemi Security Center of Excellence

HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham

PREPARE YOUR INCIDENT RESPONSE TEAM

Graduate Information Science and Technology Program

Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department

This is great news for us and UTC. We are going to start looking for funding and development of programs beneficial to UTC and the community.

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Actions and Recommendations (A/R) Summary

S 2 Virginia Tech Program Overview

A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

CHAPTER 10: COMPUTER SECURITY AND RISKS

Yier Jin RESEARCH INTERESTS

A brief on Two-Factor Authentication

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

ASK PC Certified Information Systems Security Expert - CISSE

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

Voice Over IP: Security & QOS Test Lab

Agenda Item 2. USM Cyber Security Landscape and Contributions to the State

MEDIA, TECHNOLOGY, AND INFORMATION LAW. Yale Law School

Introduction to Hardware Security and Trust

Digital Forensics Workforce Training for Wounded Warriors

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Information Assurance Curricula and Certifications

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Introduction to Computer Networking: Trends and Issues

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

I n t r o d u c t i o n

FALL 2012 / SPRING 2013

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

POLYTECHNIC SCHOOL OF ENGINEERING NEW YORK UNIVERSITY

Acceptable Use Policy ("AUP")

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities

Chapter 1: Introduction

WHAT IS NYC MEDIA LAB?

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Cybersecurity Strategic Talent Management. March, 2012

Monitoring applications to increase security in 40G and 100G networks

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas

CEH Version8 Course Outline

KING FAHD UNIVERSITY OF PETROLEUM & MINERALS COLLEGE OF COMPUTER SCIENCES AND ENGINEERING DEPARTMENT OF INFORMATION & COMPUTER SCIENCE

Cyber Innovation and Research Consortium

Train Like You Will Fight

Developing Network Security Strategies

UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16

GRADUATE APPLICATION INSTRUCTIONS

Bachelor of Information Technology (Network Security)

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

Transcription:

Security Research at the Center for Advanced Technology in Telecommunications

Highlights NSA Center of Excellence in IA Education, 2002- NSF/NSA Cyber Corps Program (ASPIRE), 2002- NY State funded Cybercrime Initiative, 2006- NSA Center of Excellence in IA Research, 2008- Center for Interdisciplinary Studies in Security and Privacy, 2009- Six Departments across NYU and NYU-Poly National Science Foundation, 2010 support for 25-30 PhD students Vibrant graduate research and education Over a dozen faculty members actively involved More than $16 million in external funding for research, education and outreach over the last 10 years Computer Security Awareness Week, 2005- Embedded Systems Challenge, 2008-

Network Security Robust DDoS Defense System J. Chao. High Speed IPS J. Chao VoIP security H. Schulzrinne, N. Memon, R. Karri Countering DoS Attacks With Multipath Overlays A. Keromytis Wireless Fingerprinting Sybill attacks and defenses Lakshmi, Courant P2P security Keith Ross Host/Dev Security Disk Forensics - Reassembly of Scattered File Fragments N Memon Secure Device Pairing N. Saxena Visual Passwords Design and Evaluation Cloud security J. Cappos Virtualization security J. Cappos

Multimedia Security Hardware Trust Digital Watermarks Audio/Video Authentication Steganography, Steganalysis, E. Wong Image Forensics Digital Rights Management Cyber Security Processor (CYSEP) J. Chao Accelerator to support Secure VoIP R. Karri Security-aware multicore architectures R. Karri, N. Memon, H. Hadimioglu Secure Virtualization R. Karri, N. Memon Fault Attack Resistant High-Speed Crypto Architectures R. Karri Scan Chains In Crypto Hardware R. Karri

NSF ASPIRE award prepares its recipients with strong technical training and a security mindset that looks beyond just technology while approaching problems. ASPIRE nurtures leadership, community service and good citizenship in its scholars, producing a cadre of Scholarship for Service graduates ready for some of the most crucial challenges of our time. Graduated about 70 ASPIRE Fellows Core faculty: Memon, Karri, Cappos, Frankl, Zimmernan, Ghose, Nissenbaum, Kapila

Center for Interdisciplinary Studies in Security and Privacy (CRISSP) (http://crissp.poly.edu/) MORE SECURE CRITICAL INFRASTRUCTURE STONGER SECURITY THRU USABILITY LAW AND POLICY THAT REFLECT THE CABABILITIES AND LIMITATIONS OF TECHNOLOGY BALANCE OF SECURITY AND PRIVACY PUBLIC POLICY LAW, ETHICS SECURITY TECHNOLOGY HUMAN BEHAVIOR BUSINESS ECONOMICS MORE SECURE VIRTUAL ENTERPRISES STRONGER CYBERLAW ENFOCEMENT MORE COST EFFECTIVE ENTERPRISE SECURITY

CRISSP Participating departments Security technology (NYU-Poly, NYU-Courant) Law (NYU-Law) Ethics (NYU-Steinhardt) Public Policy (NYU-Wagner) Business and Economics (NYU-Stern) Human Behavior (NYU-Poly, NYU) Funded by NYU-NYU-Poly seed funds, NSF IGERT, NYU-AD Research Institute Core Faculty: Memon, Nissenbaum, Ghose, Zimmerman, Karri, Cappos.

6 th in the series October, 2012 Looking for Sponsors for 2012 $500 $25K!! http://isis.poly.edu/csaw High school, BS, MS, and PhD >200 unique participants More than 450 total event registrations >100 unique universities AT&T Best Paper award!!

EMBEDDED SYSTEMS CYBER SECURITY AWARENESS WEEK @ POLYTECHNIC INSTITUTE OF NYU CHALLENGE 2011 FUNDED BY THE NATIONAL SCIENCE FOUNDATION REGISTER FOR THIS YEAR S COMPETITION ONLINE AT: www.poly.edu/csaw REGISTRATION OPENS AUGUST 1, 2011 REGISTRATION DEADLINE SEPTEMBER 1, 2011 AWARDS CEREMONY NOVEMBER 11, 2011 TEST YOUR SKILLS AGAINST THE BEST The Embedded Systems Challenge is an annual hardware hacking competition organized by Polytechnic Institute of New York University. Students from all levels from universities across the country/world are invited to compete. The competition focuses on several hardware security challenges. Reference designs will be sent electronically to all participants. An FPGA board and development tools are mailed to all the participants. As a sponsor, Xilinx has provided the FPGA boards for 2008, 2009 and 2010 competitions. Finalists get a free trip to NYC to participate in the awards ceremony. 1 ST PLACE: $500 2 ND PLACE: $250 3 RD PLACE: $100 5 th in the series October 2012 Looking for sponsors for 2012 Objectives Whitehat hardware hacking Open source hardware trust benchmarks Funded by NSF, Army, AFRL, Industry 2 summer interns in Intel SeCoE 2 summer interns in Intel Processor.. 2-3 ESC participants joined Intel full time