US flag signifying that this is a United States Federal Government website   Official website of the Department of Homeland Security

Homeland Security

CSD 2012 Principal Investigators’ Meeting

October 9 – 11, 2012
Washington, DC

In early October 2012, CSD gathered its research performers of the 34 funded projects awarded under BAA 11-02, as well as their international co-funding partners, for a kickoff meeting where they discussed how the collective work being performed will come together over the lifespan of each project’s research, development and technology transition to significantly advance cybersecurity. Presentations from the meeting are below.

The full agenda is available here.


Douglas Maughan
Director, Cyber Security Division (CSD) Homeland Security Advanced Research Projects Agency (HSARPA)
Cyber Security Division OverviewPDF (2.1MB)

DHS S&T Homeland Security Advanced Research Projects Agency Director’s Remarks

Paul Benda
Director, HSARPA
HSARPA OverviewPDF (2.1MB)

New Projects

Douglas Maughan
Director, CSD HSARPA
BAA 11-02 Project IntroductionsPDF (1MB)

Closing Remarks

Douglas Maughan
Director, CSD HSARPA
Cyber Security Division Overview – Staff IntroductionsPDF (0.4MB)

TTA 1 – Software Assurance

Henny Sipma
Kestrel Technology, LLC
Gold Standard Method for Benchmarking C Source Code Static Analysis ToolsPDF (1MB)
George Kuan
HRL Laboratories, LLC
Tunable Information FlowPDF (2.1MB)
Hassan Radwan
Applied Visions, Inc.
Code Pulse: SwA Visual Analytics for Dynamic Analysis CodePDF (3.1MB)

TTA 2 – Enterprise-level Security Metrics

Sushil Jajodia
George Mason University
Metrics Suite for Enterprise-Level Attack Graph AnalysisPDF (2.1MB)
David Nicol
University of Illinois at Urbana-Champaign
A Tool for Compliance and Depth of Defense MetricsPDF (2.1MB)

TTA 3 – Usable Security

Jim Blythe
CUTS: Coordinating User and Technical SecurityPDF (1MB)
Larry Koved
IBM Research
Usable Multi-Factor Authentication and Risk-Based AuthorizationPDF (2.1MB)
Weidong Shi
University of Houston
Continous and Active Authentication for Mobile Devices Using Multiple SensorsPDF (1MB)

TTA 4 – Insider Threat

Nicole L. Beebe
University of Texas at San Antonio
Insider Threat Detection: Using Lightweight Media ForensicsPDF (2.1MB)

TTA 5 – Resilient Systems and Networks

Ron Waltro
BBN Technologies (Raytheon)
Real-time Protocol ShepherdsPDF (2.1MB)
Cynthia E. Irvine
Naval Postgraduate School
Methodology for Assessment of Security PropertiesPDF (1MB)

TTA 6 – Modeling of Internet Attacks

Wenke Lee
Georgia Institute of Technology
Comprehensive Understanding of Malicious Overlay NetworksPDF (1MB)
John Goodall
Oak Ridge National Laboratory
Visually Fusing Contextual Data for Situational UnderstandingPDF (1MB)
Salvatore Stolfo
Columbia University
Project DoppelgangerPDF (1MB)
John Heidemann
Retro-Future Kick-offPDF (1MB)

TTA 7 – Network Mapping and Measurement

Nicolas Weaver
International Computer Science Institute
Netalyzr NG: Measuring DNS, DNSSEC, and TLS from the EdgePDF (1MB)
Robert Beverly
Naval Postgraduate School
High-Frequency Active Internet Topology MappingPDF (1MB)
Bradley Huffaker
Cartographic Capabilities for Critical Cyberinfrastructure (C4)
Cartographic Capabilities for Critical Cyberinfrastructure (C4)PDF (3.1MB)
Joe Adams
Merit Network, Inc.
Enabling Operational Use of RPKI via Internet Routing RegistriesPDF (1MB)

TTA 8 – Incident Response Communities

Shari Lawrence Pfleeger
I3P Project: What Makes a Good CSIRT?PDF (2.1MB)

TTA 9 – Cyber Economics

Lawrence A. Gordon
Smith School of Business, University of Maryland
Reducing the Challenges to Making Cybersecurity Investments in the Private SectorPDF (1MB)
Nicolas Cristin
Carnegie Mellon University
Understanding & Disrupting the Economics of CybercrimePDF (1MB)

TTA 10 – Digital Provenance

Fabian Monrose
UNC Chapel Hill
Efficient Tracking, Logging, and Blocking of Accesses to Digital ObjectsPDF (2.1MB)
Jeffrey Isherwood
Exelis Inc.
Evidentiary Integrity for Incident Response (EIIR)PDF (1MB)
Ragib Hasan
University of Alabama at Birmingham
Secure Location Provenance for Mobile DevicesPDF (1MB)

TTA 11 – Hardware-Enabled Trust

Paul A. Rivera
Def-Logix, Inc.
Hardware Enabled Zero Day ProtectionPDF (1MB)
Dimitrious Pendarakis
IBM Research
Hardware Support for Malware Defense and End-to-End TrustPDF (1MB)

TTA 12 – Moving Target Defense

Ruby B. Lee
Princeton University
Moving Target Defense for Secure Hardware DesignPDF (1MB)

TTA 13 – Nature-Inspired Cyber Health

Christopher Oehmen
LINEBACKER: LINE-speed Bio-inspired Analysis and Characterization for Event RecognitionPDF (1MB)
Raj Rajagopalan
HP Labs/Honeywell
Bio-Inspired Anomaly DetectionPDF (1MB)


Miron Livny
Morgridge Institute of Technology
TTA #14: Software Assurance MarketPlace (SWAMP)PDF (1MB)

Other Presentations

Industry Partners & DHS Component

Joe Jarzombek
Director for Software Assurance Cyber Security & Communications, Department of Homeland Security
Software Assurance Automation: Enabling Security and Resilience Throughout the Software LifecyclePDF (3.1MB)

International Partners

David McIlroy
National Security Science & Technology Center (NSSTC) Canberra DTSO, Australia
DHS Cyber Security Division Broad Agency Announcement 2012 PI Meeting, Australia PresentationPDF (1MB)
Guy Turcotte
Mission Critical Cyber Security Section Defence R&D Canada
DRDC Cyber Defence S&T Program: An Overview



PDF (3.1MB)
Rod Howes
Defence R&D Canada
Canadian Safety and Security PartnershipPDF (1MB)
Eelco Stofbergen
National Cyber Security Centre, Ministry of Security and Justice Netherlands
The Dutch Approach to Cyber Security and ResearchPDF (1MB)
Jan Priet Barthel
Netherlands Organization for Scientific Research Netherlands
Cyber Security Research in the NetherlandsPDF (3.1MB)
Martin Eriksson
Information Assurance Department, The Swedish Civil Contingencies Agency (MSB)
The Swedish Civil Contingencies Agency, R&D InitiativesPDF (3.1MB)

DHS S&T CSD Programs

Terry Benzel
UCS Information Sciences Institution
The DETER Project: Leading-edge Experimental Facilities and Methodologies for the Cyber-Security Research CommunityPDF (2MB)
Luke Berdnt
Homeland Open Security Technologies (HOST)PDF (0.2MB)
Scott Tousley, Greg Wigton, Mike Pozmantier
Summary of Assessments & Evaluation, Experiments & Pilots, and Transition to PracticePDF (0.2MB)
Manish Karir
PREDICT: Protected Repository for Defense of Infrastructure against Cyber ThreatsPDF (0.4MB)
Gary Bridges
SRI International
Transition to Education: Increasing the Outcomes of Your ResearchPDF (0.6MB)
KC Claffy
Leveraging the Science and Technology of Internet Mapping for Homeland SecurityPDF (14MB)
John Heidemann
AMITE: Annotation and Mapping of Internet Topology at the EdgesPDF (1MB)
Wenke Lee
Georgia Institute of Technology
Next-Generation DNS Monitoring ToolsPDF (0.4MB)
Dan Massey
Colorado State University
WIT: A Watchdog System for Internet Routing, Australian BGP Monitoring ServicePDF (0.5MB)

CSD Small Business Innovation Research (SBIR) Projects

Ken Prole
Secure Decisions
Code Dx: Software Assurance Analysis and Visual AnalyticsPDF (2MB)
Sean Moore
Centripetal Networks, Inc.
SBIR Case Study: Centripetal Networks – How CNI Leveraged DHS S&T SBIR Funding to Launch a Successful Cyber Security CompanyPDF (0.1MB)
Nikolai Mansourov
KDM Analytics
Tool Output Integration Framework (TOIF)PDF (1MB)
Paul Anderson
GrammaTech, Inc.
Multi-Platform Program AnalysisPDF (0.2MB)
David Weinstein
NAND/NOR Chip ForensicsPDF (0.6MB)
Howard Kaplan
Queralt, Inc.
SMART Authorization for Physical & Logical ConvergencePDF (0.2MB)

Back to Top

Last Published Date: December 17, 2013
Back to Top