CCIED Education and Outreach - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

CCIED Education and Outreach

Description:

... Levchenko, Justin Ma, Marvin McNett, David Moore, Sumeet Singh, Michael Vrable ... and Stefan Savage. Experimental technology ... Outreach Talks: Savage ... – PowerPoint PPT presentation

Number of Views:234
Avg rating:3.0/5.0
Slides: 19
Provided by: stefan9
Category:

less

Transcript and Presenter's Notes

Title: CCIED Education and Outreach


1
CCIED Educationand Outreach
  • Geoffrey M. Voelker
  • Feb. 15, 2006

2
CCIED Education and Outreach
  • Education
  • Student Advising
  • Courses
  • Outreach
  • ACM Workshop
  • USENIX Tutorial
  • Industry Collaboration
  • Talks

3
UCSD Student Advising
  • 8 PhD
  • Christian Estan, Chris Kanich, Kirill Levchenko,
    Justin Ma, Marvin McNett, David Moore, Sumeet
    Singh, Michael Vrable
  • 3 MS
  • Jay Chen, Erik Vandekieft, Ming Woo-Kawaguchi
  • 2 Undergraduate
  • Ming Woo-Kawaguchi, Ryan Brown

4
ICSI Student Advising
  • PhD dissertation
  • Weidong Cui (UCB)
  • 6 ICSI interns
  • Juan Caballero (CMU), Martin Casado (Stanford),
    Sarang Dharmapurikar (WUSTL), Christian Kreibich
    (Cambridge), Abhishek Kumar (Georgia Tech), Vinod
    Yegneswaran (UWisc)
  • 6 ICSI PhD committees
  • Carrie Gates (Dalhousie), Jaeyeon Jung (MIT),
    Jayanthkumar Kannan (UCB), Hyang-Ah Kim (CMU),
    James Newsome (CMU), Ruoming Pang (Princeton)

5
CSE 291 (Fall 2005)
  • Homeland Security Cyber Security (Graduate)
  • Technical and policy issues
  • Introduce CSE students to policy perspective
  • Technical problems in policy and social contexts
  • Cyber security in larger context of homeland
    security
  • Introduce policy students to technical issues
  • What and How of cyber security problems
  • Possibilities and limitations of technical
    solutions

6
CSE 291 Structure
  • 4-site distance learning course
  • UW and Microsoft Ed Lazowska
  • UCB Steve Maurer (Public Policy)
  • UCSD Geoff Voelker and Stefan Savage
  • Experimental technology
  • Microsoft ConferenceXP, UW Presenter
  • Live video over Internet2 (1) all rooms, (2)
    slides
  • Webcast and archived
  • Lectures, readings, projects

7
CSE 291 Lectures
  • Lectures by instructors, CCIED PIs
  • Paxson, Savage, Voelker
  • and leading experts
  • Butler Lampson (Microsoft)
  • Accountability and Freedom
  • Dave Aucsmith (Institute for Advanced Technology
    in Governments, Microsoft) also CCIED TAB
    member
  • Crime on the Internet
  • Hal Varian (Berkeley)
  • Economics and computer security
  • Christina Filarowski-Sheaks and Bryan Del Monte
    (U.S. Department of Defense, Pentagon)
  • US Detention Interrogation Policy and the War
    on Terror

8
CSE 291 Projects
  • Red Team Project
  • Implement an exploit (buffer overflow)
  • Discuss policy ramifications for various
    scenarios of attackers and victims
  • White Paper Final
  • Comprehensive policy brief on security topic (30
    pgs)
  • Mix groups of CS and policy students
  • Distributed across sites

9
CSE 291 Summary
  • Materials archived for wide access and
    availability
  • Slide content of all speakers
  • Speaker video, audience video
  • Wiki with full class discussion

http//www.cse.ucsd.edu/voelker/cse291/
10
CSE 127
  • Undergraduate Computer Security
  • Savage resurrected the class starting Spring 2005
  • Security and cryptography basics
  • Exploits defenses in context of CCIED topics
  • DDoS, worms, viruses, phishing, botnets, etc.
  • Project buffer overflow exploits

11
Outreach Workshop
  • ACM WORM Workshop
  • Workshop On Repelling Malcode
  • Co-located with ACM CCS
  • Led by CCIED PIs
  • Savage first PC Chair in 2003, Paxson 2004
  • Savage and Paxson steering committee
  • Angelos Keromytis 2005
  • Farnam Jahanian 2006
  • Forum for academia, industry, government
  • Publish and discuss topics of interest to CCIED
  • Invited talks of published work
  • Provide single venue for top work in area

12
Outreach Tutorial
  • USENIX Security 2006 tutorial (Proposed)
  • Understanding and Addressing the Threat of
    Internet Worms
  • Audience
  • Researchers, Ph.D. students, and practitioners
  • Teach detailed overview of state-of-the-art in
    area
  • Topics
  • Threats DDoS, worms, botnets, etc.
  • Understanding measurement and forensic analysis
    of outbreaks
  • Defenses host- and network-based

13
Outreach Industry
  • Industry collaboration
  • Helen Wang, John Dunagan (Microsoft Research)
  • Rodolfo Milito (Consentry Networks)
  • Industry consultation
  • Consentry Networks, ForeScout, Accel Partners,
    Sequoia Capital

14
Outreach Talks
  • Extensive outreach through lectures and talks
  • Universities (22)
  • Berkeley, Stanford, MIT, UW, Princeton,
    Dartmouth, etc.
  • Industry (8)
  • Microsoft, ATT, Intel, Nortel, etc.
  • Government (7)
  • DoD, DoE, NSA, MITRE, British Consulate, etc.
  • Conference keynotes, invited talks, and panels
    (14)
  • NDSS, WORM, ITSG, TSWG, etc.

15
Outreach Talks Paxson
  • Tutorial co-instructor, IEEE Supercomputing,
    "Cybersecurity at Open Scientific Facilities",
    Oct 2004
  • Invited seminar, Analyzing Network Traffic in
    the Presence of Adversaries, UCB, Oct 2004
  • Guest lecture, Defending Networks, UCB, Nov
    2004
  • Guest lecture, The Threat of Internet Worms,
    UCB, Dec 2004
  • Jon Postel Memorial Lecture, UCLA, Addressing
    the Threat of Internet Worms, Feb 2005
  • Presentation to In-Q-Tel, Defending Networks,
    Feb 2005
  • Guest lecture, UCB, Dealing With Internet
    Worms, Mar 2005
  • Invited seminar, Dartmouth, Addressing The
    Threat of Internet Worms, Apr 2005
  • Invited seminar, MIT, Exploiting Underlying
    Structure for Detailed Reconstruction of an
    Internet-Scale Event, Apr 2005
  • Invited speaker, AUSCERT, The Threat of Internet
    Worms, May 2005
  • Invited seminar, Princeton, Exploiting
    Underlying Structure for Detailed Reconstruction
    of an Internet-Scale Event, Apr 2005
  • Invited seminar, Microsoft Research, Exploiting
    Underlying Structure for Detailed Reconstruction
    of an Internet-Scale Event, Sep 2005
  • Invited seminar, Stanford, Exploiting Underlying
    Structure for Detailed Reconstruction of an
    Internet-Scale Event, Oct 2005
  • Presentation to Tekes Finland ICSI Exchange,
    Helsinki, Network Research at ICSI, Oct 2005
  • Invited talk, CCS WORM, Exploiting Underlying
    Structure for Detailed Reconstruction of an
    Internet-Scale Event, Nov 2005
  • Presentation to Intelligence Technology
    Innovation Center working group on Knowledge
    Discovery and Dissemination, Monitoring Internet
    Activity and Attacks, Nov 2005
  • Security Crystal Ball Workshop, Tracking
    Causality, Jan 2006
  • Presentation to CIO, US Department of Energy,
    Network Security Research Efforts at Berkeley
    Lab, Jan 2006
  • Discussion with British Consulate-sponsored UK
    Information Technology Mission, Perspectives on
    US Cybersecurity Research, Jan 2006

16
Outreach Talks Savage
  • Invited talk, "Internet Outbreaks Epidemiology
    and Defenses", University of Washington, Jan
    2005.
  • Invited talk, "Internet Outbreaks Epidemiology
    and Defenses", ISOC NDSS, Feb 2005.
  • Keynote, "Internet Outbreaks Epidemiology and
    Defenses", JSOE CAP meeting, Feb 2005.
  • Invited talk, "Internet Outbreaks Epidemiology
    and Defenses", Cornell University, Jun 2005.
  • Lecture, Internet Outbreaks Epidemiology and
    Defenses, UCSD COSMOS, Jun 2005.
  • Invited talk, "Scalable Internet Threat
    Detection", Dept of Homeland Security/Army
    Research Office Workshop on Malcode Detection,
    Aug 2005.
  • Lecture, Internet Outbreaks Epidemiology and
    Defenses, CSE 292, Oct 2005.
  • Invited talk, "Scalable Internet Threat
    Monitoring", ACM CCS Workshop on Rapid Malcode,
    Nov 2005.
  • Lecture, Internet Outbreaks Epidemiology and
    Defenses, CSE 291, Nov 2005.
  • Keynote, "Scalable Malware Detection and
    Analysis", Intel Research Council Worksop on
    Network Monitoring and Security, Dec 2005.
  • Distinguished Lecture, "Internet Outbreaks
    Epidemiology and Defenses", University of
    Toronto, Dec 2005.
  • Briefing on CCIED, CTO Nortel, Jan 2006.
  • Briefing on CCIED, Undersecretary of Defense for
    Research, Feb 2006.
  • Invited Panel talk, "Smoke, Mirrors and
    Virtualization", ISOC NDSS, Feb 2006.

17
Outreach Talks Voelker
  • Invited talk, "Internet Quarantine Requirements
    for Containing Self-Propagating Code", ATT Labs,
    Feb 2004.
  • Invited talk, Internet Quarantine Requirements
    for Containing Self-Propagating Code, Microsoft
    Research Asia, Oct 2004.
  • Lecture, "Internet Outbreaks Epidemiology and
    Defenses", CSE 91, Oct 2004.
  • Invited talk, "Internet Outbreaks Epidemiology
    and Defenses", GTA/LAND Joint Networking
    Workshop, UFRJ, Mar 2005.
  • Keynote, Automated Availability Management
    Management in Large in Large-Scale Scale Storage
    Systems, HotP2P, Jul 2005.
  • Invited talk, "Informed Content Delivery
    Network Sensitivity to Interdomain Routing
    Changes", ATT Labs, Aug 2005.
  • Lecture, "Computer Security Primer", CSE 291, Oct
    2005.
  • Keynote, "Using Computer Games to Teach Software
    System Design and Implementation", JSOE CAP
    meeting, Oct 2005.
  • Lecture, "Internet Outbreaks Epidemiology and
    Defenses", CSE 91, Nov 2005.
  • Invited talk, "Internet Outbreaks Epidemiology
    and Defenses", Information Technology Study Group
    (ITSG) Workshop, Oct 2005.
  • Briefing on CCIED, NSA Director of Research, Feb
    2006.

18
Outreach Talks Weaver
  • Invited talk, ACSAC, "Worm Tutorial", Dec 2004.
  • Invited talk, MITRE, "Worm Tutorial", Jun 2005.
  • Invited talk, Technical Support Working Group,
    "Worm Tutorial", Jul 2005.
  • Invited talk, Penn State, "Principles of reactive
    Worm Defense", Nov 2005.
  • Invited talk, Stanford, "Principles of reactive
    Worm Defense", Oct 2005.
  • Upcoming
  • Microsoft (Mar 2006), IEEE (Mar 2006), UW (Mar
    2006)
Write a Comment
User Comments (0)
About PowerShow.com