US flag signifying that this is a United States Federal Government website   Official website of the Department of Homeland Security

Homeland Security

CSD 2012 Principal Investigators’ Meeting

October 9 – 11, 2012
Washington, DC

In early October 2012, CSD gathered its research performers of the 34 funded projects awarded under BAA 11-02, as well as their international co-funding partners, for a kickoff meeting where they discussed how the collective work being performed will come together over the lifespan of each project’s research, development and technology transition to significantly advance cybersecurity. Presentations from the meeting are below.

The full agenda is available here.

Introductions/Welcome

PresenterTitleDownload
Douglas Maughan
Director, Cyber Security Division (CSD) Homeland Security Advanced Research Projects Agency (HSARPA)
Cyber Security Division OverviewPDF (2.1MB)

DHS S&T Homeland Security Advanced Research Projects Agency Director’s Remarks

PresenterTitleDownload
Paul Benda
Director, HSARPA
HSARPA OverviewPDF (2.1MB)

New Projects

PresenterTitleDownload
Douglas Maughan
Director, CSD HSARPA
BAA 11-02 Project IntroductionsPDF (1MB)

Closing Remarks

PresenterTitleDownload
Douglas Maughan
Director, CSD HSARPA
Cyber Security Division Overview – Staff IntroductionsPDF (0.4MB)

TTA 1 – Software Assurance

PresenterTitleDownload
Henny Sipma
Kestrel Technology, LLC
Gold Standard Method for Benchmarking C Source Code Static Analysis ToolsPDF (1MB)
George Kuan
HRL Laboratories, LLC
Tunable Information FlowPDF (2.1MB)
Hassan Radwan
Applied Visions, Inc.
Code Pulse: SwA Visual Analytics for Dynamic Analysis CodePDF (3.1MB)

TTA 2 – Enterprise-level Security Metrics

PresenterTitleDownload
Sushil Jajodia
George Mason University
Metrics Suite for Enterprise-Level Attack Graph AnalysisPDF (2.1MB)
David Nicol
University of Illinois at Urbana-Champaign
A Tool for Compliance and Depth of Defense MetricsPDF (2.1MB)

TTA 3 – Usable Security

PresenterTitleDownload
Jim Blythe
USC ISI
CUTS: Coordinating User and Technical SecurityPDF (1MB)
Larry Koved
IBM Research
Usable Multi-Factor Authentication and Risk-Based AuthorizationPDF (2.1MB)
Weidong Shi
University of Houston
Continous and Active Authentication for Mobile Devices Using Multiple SensorsPDF (1MB)

TTA 4 – Insider Threat

PresenterTitleDownload
Nicole L. Beebe
University of Texas at San Antonio
Insider Threat Detection: Using Lightweight Media ForensicsPDF (2.1MB)

TTA 5 – Resilient Systems and Networks

PresenterTitleDownload
Ron Waltro
BBN Technologies (Raytheon)
Real-time Protocol ShepherdsPDF (2.1MB)
Cynthia E. Irvine
Naval Postgraduate School
Methodology for Assessment of Security PropertiesPDF (1MB)

TTA 6 – Modeling of Internet Attacks

PresenterTitleDownload
Wenke Lee
Georgia Institute of Technology
Comprehensive Understanding of Malicious Overlay NetworksPDF (1MB)
John Goodall
Oak Ridge National Laboratory
Visually Fusing Contextual Data for Situational UnderstandingPDF (1MB)
Salvatore Stolfo
Columbia University
Project DoppelgangerPDF (1MB)
John Heidemann
USC ISI
Retro-Future Kick-offPDF (1MB)

TTA 7 – Network Mapping and Measurement

PresenterTitleDownload
Nicolas Weaver
International Computer Science Institute
Netalyzr NG: Measuring DNS, DNSSEC, and TLS from the EdgePDF (1MB)
Robert Beverly
Naval Postgraduate School
High-Frequency Active Internet Topology MappingPDF (1MB)
Bradley Huffaker
Cartographic Capabilities for Critical Cyberinfrastructure (C4)
Cartographic Capabilities for Critical Cyberinfrastructure (C4)PDF (3.1MB)
Joe Adams
Merit Network, Inc.
Enabling Operational Use of RPKI via Internet Routing RegistriesPDF (1MB)

TTA 8 – Incident Response Communities

PresenterTitleDownload
Shari Lawrence Pfleeger
I3P
I3P Project: What Makes a Good CSIRT?PDF (2.1MB)

TTA 9 – Cyber Economics

PresenterTitleDownload
Lawrence A. Gordon
Smith School of Business, University of Maryland
Reducing the Challenges to Making Cybersecurity Investments in the Private SectorPDF (1MB)
Nicolas Cristin
Carnegie Mellon University
Understanding & Disrupting the Economics of CybercrimePDF (1MB)

TTA 10 – Digital Provenance

PresenterTitleDownload
Fabian Monrose
UNC Chapel Hill
Efficient Tracking, Logging, and Blocking of Accesses to Digital ObjectsPDF (2.1MB)
Jeffrey Isherwood
Exelis Inc.
Evidentiary Integrity for Incident Response (EIIR)PDF (1MB)
Ragib Hasan
University of Alabama at Birmingham
Secure Location Provenance for Mobile DevicesPDF (1MB)

TTA 11 – Hardware-Enabled Trust

PresenterTitleDownload
Paul A. Rivera
Def-Logix, Inc.
Hardware Enabled Zero Day ProtectionPDF (1MB)
Dimitrious Pendarakis
IBM Research
Hardware Support for Malware Defense and End-to-End TrustPDF (1MB)

TTA 12 – Moving Target Defense

PresenterTitleDownload
Ruby B. Lee
Princeton University
Moving Target Defense for Secure Hardware DesignPDF (1MB)

TTA 13 – Nature-Inspired Cyber Health

PresenterTitleDownload
Christopher Oehmen
PNNL
LINEBACKER: LINE-speed Bio-inspired Analysis and Characterization for Event RecognitionPDF (1MB)
Raj Rajagopalan
HP Labs/Honeywell
Bio-Inspired Anomaly DetectionPDF (1MB)

TTA 14 – SWAMP

PresenterTitleDownload
Miron Livny
Morgridge Institute of Technology
TTA #14: Software Assurance MarketPlace (SWAMP)PDF (1MB)

Other Presentations

Industry Partners & DHS Component

PresenterTitleDownload
Joe Jarzombek
Director for Software Assurance Cyber Security & Communications, Department of Homeland Security
Software Assurance Automation: Enabling Security and Resilience Throughout the Software LifecyclePDF (3.1MB)

International Partners

PresenterTitleDownload
David McIlroy
National Security Science & Technology Center (NSSTC) Canberra DTSO, Australia
DHS Cyber Security Division Broad Agency Announcement 2012 PI Meeting, Australia PresentationPDF (1MB)
Guy Turcotte
Mission Critical Cyber Security Section Defence R&D Canada
DRDC Cyber Defence S&T Program: An Overview

 

 

PDF (3.1MB)
Rod Howes
Defence R&D Canada
Canadian Safety and Security PartnershipPDF (1MB)
Eelco Stofbergen
National Cyber Security Centre, Ministry of Security and Justice Netherlands
The Dutch Approach to Cyber Security and ResearchPDF (1MB)
Jan Priet Barthel
Netherlands Organization for Scientific Research Netherlands
Cyber Security Research in the NetherlandsPDF (3.1MB)
Martin Eriksson
Information Assurance Department, The Swedish Civil Contingencies Agency (MSB)
The Swedish Civil Contingencies Agency, R&D InitiativesPDF (3.1MB)

DHS S&T CSD Programs

PresenterTitleDownload
Terry Benzel
UCS Information Sciences Institution
The DETER Project: Leading-edge Experimental Facilities and Methodologies for the Cyber-Security Research CommunityPDF (2MB)
Luke Berdnt
CSD HSARPA
Homeland Open Security Technologies (HOST)PDF (0.2MB)
Scott Tousley, Greg Wigton, Mike Pozmantier
CSD HSARPA
Summary of Assessments & Evaluation, Experiments & Pilots, and Transition to PracticePDF (0.2MB)
Manish Karir
CSD HSARPA
PREDICT: Protected Repository for Defense of Infrastructure against Cyber ThreatsPDF (0.4MB)
Gary Bridges
SRI International
Transition to Education: Increasing the Outcomes of Your ResearchPDF (0.6MB)
KC Claffy
CAIDA/UCSD
Leveraging the Science and Technology of Internet Mapping for Homeland SecurityPDF (14MB)
John Heidemann
USC ISI
AMITE: Annotation and Mapping of Internet Topology at the EdgesPDF (1MB)
Wenke Lee
Georgia Institute of Technology
Next-Generation DNS Monitoring ToolsPDF (0.4MB)
Dan Massey
Colorado State University
WIT: A Watchdog System for Internet Routing, Australian BGP Monitoring ServicePDF (0.5MB)

CSD Small Business Innovation Research (SBIR) Projects

PresenterTitleDownload
Ken Prole
Secure Decisions
Code Dx: Software Assurance Analysis and Visual AnalyticsPDF (2MB)
Sean Moore
Centripetal Networks, Inc.
SBIR Case Study: Centripetal Networks – How CNI Leveraged DHS S&T SBIR Funding to Launch a Successful Cyber Security CompanyPDF (0.1MB)
Nikolai Mansourov
KDM Analytics
Tool Output Integration Framework (TOIF)PDF (1MB)
Paul Anderson
GrammaTech, Inc.
Multi-Platform Program AnalysisPDF (0.2MB)
David Weinstein
viaForensics
NAND/NOR Chip ForensicsPDF (0.6MB)
Howard Kaplan
Queralt, Inc.
SMART Authorization for Physical & Logical ConvergencePDF (0.2MB)

Back to Top

Last Published Date: December 17, 2013
Back to Top