1 / 20

Information Assurance Research in the College of Engineering

Information Assurance Research in the College of Engineering. Information Assurance Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. .

art
Download Presentation

Information Assurance Research in the College of Engineering

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Assurance Research in the College of Engineering

  2. Information Assurance Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

  3. Florida Institute of Technologywas designated a Center for Academic Excellence in Information Assurance Research by the National Security Agency

  4. The Harris Institute forAssured Information serves as a focal point for collaboration and project support

  5. COE Faculty Performing Research in Information Assurance • Richard Ford, Computer Science – Harris Institute • Fredric Ham, Electrical and Computer Engineering • Gerald Marin, Computer Science – Harris Institute • William Allen, Computer Science – Harris Institute • Ryan Stansifer, Computer Science • Liam Mayron, Computer Science – Harris Institute • Marius Silaghi, Computer Science • Adjunct Faculty: Marco Carvalho, Ronda Henning

  6. Adaptive Supervisory Control and Data Acquisition • Funded by the U.S. Department of Energy • Enhanced Protection of Critical Infrastructure • COE Participants: • Drs. Ford, Allen, Ham, Stansifer • Supporting 1 Ph.D. student and 2 M.S. students • Publications: • three conference papers accepted/presented to date • two papers in preparation • $470,000 in funding over two years (current)

  7. Neurocomputingand Interoception • Funded by Harris Corporation • Attempts to allow computers to engage in interoceptivebehaviors, inspired by the brain’s “system of systems” • COE Participants: • Drs. Ford, Carvalho • Supporting 1 M.S. student • Publications: • One paper accepted and presented to date • $65,000 in funding over two semesters

  8. Human Ground Truth in Virtual Worlds • Funded by Harris Corporation • Create new collaborative environments that leverage the power of Virtual Worlds • COE Participants: • Drs. Ford, Carvalho • Supporting 3 students • Publications: • No publications to date – project has just started • $150,000 in funding over one year (current)

  9. Biologically-Inspired Security Infrastructurefor Tactical Environments • Research funded by the Army Research Lab • Improving the Security of Mobile Networks • COE Participants: • Drs. Ford, Allen, Ham, Marin, one Postdoc Researcher • Graduated 1 Ph.D. and 5 M.S. students • Publications: • twelve papers published on this work • $2,785,300 in funding over 3 years (completed)

  10. Assured Information in SOA Environments • Funded by Harris Corporation • Developed a method for evaluating security-centric testing tools for use in SOA environments • COE Participants: • Dr. Tilley • Supported 1 Ph.D. student and 1 M.S. student • Publications: • three conference papers published on this work • $150,000 in funding over one year

  11. Harris Corporation Grants • The Harris Corporation funded several recent projects through the Harris Institute: • Vulnerabilities in Graphics Systems - $125k • Drs. Ford and Allen • Brain-inspired computing for security -$65k • Dr. Ford • Collection of Malware Samples - $100k • Drs. Allen and Ford and graduate students • Metrics for Human Computer Interaction - $60k • Dr. Ford and Dr. Bahr (Psychology)

  12. Using Program Slicing in Software Maintenance • This seminal work by Dr. Keith Gallagher was published in IEEE Transactions on Software Engineering in 1991 • Program slicing helps in understanding foreign code and in debugging, Dr. Gallagher extended this idea to aid in software maintenance. • This work had a significant impact on discovering and correcting the Y2K problem and continues to be widely used for software maintenance • This paper has been cited over 600 times

  13. Software Testing • Information Assurance requires the ability to verify that software is free from vulnerabilities and that it functions as intended • Dr. Cem Kaner has co-authored four books and numerous articles and workshops on software testing principals and practices, including: • Cem Kaner, Jack Falk, & Hung Quoc Nguyen, Testing Computer Software, 2nd edition • Cem Kaner, James Bach, & Bret Pettichord, Lessons Learned in Software Testing • Cem Kaner & David Pels, Bad Software: What To Do When Software Fails

  14. Towards a Secure Software Development Framework Based onan Integrated Engineering Process • AbdulazizAlkussayer, PhD completed in 2011 • Developed a methodology for improving the development of secure software • Publications: • one Journal article, five Conference papers to date • Advisor: William Allen • Abdulaziz is currently on the faculty of a University in Saudi Arabia

  15. Program Comprehension Through Sonification • Lewis Berman, PhD completed in 2011 • Developed a sonification (i.e., non-speech sound) scheme to facilitate the understanding of software which has been shown to be particularly useful for analyzing dynamic program behaviors • Publications: • three Conference papers to date • Advisor: Keith Gallagher

  16. Migrating Software Testing to the Cloud • TauhidaParveen, PhD completed in 2010 • Developed a methodology for migrating software testing to a cloud environment to improve performance and lower costs • Publications: • two Journal articles, six Conference papers to date • Advisor: Scott Tilley • Tauhida is employed at a local security company

  17. Automatic Design of Feistel CiphersUsing Constraint Techniques • Venkatesh Ramamoorthy, PhD completed in 2010 • Developed several improvements to existing cryptographic techniques • Publications: • three Conference papers to date • A patent has been applied for on this work • Advisor: Marius Silaghi • Venkatesh is employed at Array Networks, Inc.

  18. Malicious Mobile Code Related Experiments with an Extensible Network Simulator • Attila Ondi, PhD completed in 2007 • Developed a technique for simulating the spread of malicious code with high fidelity to better evaluate methods for defending against attacks • Publications: • two Journal articles, four Conference papers to date • Advisor: Richard Ford • Attila is employed at Securboration, Inc.

  19. Masters Research in Information Assurance • Reputations for Security in Mobile Ad Hoc Networks, Katherine Hoffman, M.S., 2011 • MANET Security and Antibodies, Stephen Dotson, M.S., 2011 • a biologically-inspired approach to protecting mobile networks • Evaluating the Capabilities of SOA Testing Tools from a Security Perspective, Nawwar Kabbani, M.S., 2010 • A Proactive Defense System for Mobile Ad Hoc Networks, Eyosias Yoseph Imana, M.S., 2009 • A State-Machine-Based Attack Description Language for the Evaluation of Intrusion Detection Systems, Samuel Oswald, M.S, 2009

  20. Masters Research in Information Assurance • Incrementally Learning Rules for Anomaly Detection, Denis Petrusenko, M.S., 2009 • A Mobile Ad Hoc Network (MANET) Simulator with Worm Propagation, Matthew Reedy, M.S., 2009 • A Modular Framework for Next-Generation Testing and Evaluation of Network Applications, Derek Pryor, M.S., 2009 • Discovering a Covert Channel between Virtual Machines Sharing the Same Set of Hardware, James Stimers, M.S., 2008 • Changing the Modulus of Secret Sharing, Accessing Arrays of Secrets and Incentive Mixnets, Timothy Atkinson, M.S., 2007 • The Hunt for Viral Processes, Christiana Ioannou, M.S., 2006

More Related