1 / 18

CCIED Education and Outreach

CCIED Education and Outreach. Geoffrey M. Voelker Feb. 15, 2006. CCIED Education and Outreach. Education Student Advising Courses Outreach ACM Workshop USENIX Tutorial Industry Collaboration Talks. UCSD Student Advising. 8 PhD

martha
Download Presentation

CCIED Education and Outreach

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CCIED Educationand Outreach Geoffrey M. Voelker Feb. 15, 2006

  2. CCIED Education and Outreach • Education • Student Advising • Courses • Outreach • ACM Workshop • USENIX Tutorial • Industry Collaboration • Talks

  3. UCSD Student Advising • 8 PhD • Christian Estan, Chris Kanich, Kirill Levchenko, Justin Ma, Marvin McNett, David Moore, Sumeet Singh, Michael Vrable • 3 MS • Jay Chen, Erik Vandekieft, Ming Woo-Kawaguchi • 2 Undergraduate • Ming Woo-Kawaguchi, Ryan Brown

  4. ICSI Student Advising • PhD dissertation • Weidong Cui (UCB) • 6 ICSI interns • Juan Caballero (CMU), Martin Casado (Stanford), Sarang Dharmapurikar (WUSTL), Christian Kreibich (Cambridge), Abhishek Kumar (Georgia Tech), Vinod Yegneswaran (UWisc) • 6 ICSI PhD committees • Carrie Gates (Dalhousie), Jaeyeon Jung (MIT), Jayanthkumar Kannan (UCB), Hyang-Ah Kim (CMU), James Newsome (CMU), Ruoming Pang (Princeton)

  5. CSE 291 (Fall 2005) • Homeland Security & Cyber Security (Graduate) • Technical and policy issues • Introduce CSE students to policy perspective • Technical problems in policy and social contexts • Cyber security in larger context of homeland security • Introduce policy students to technical issues • What and How of cyber security problems • Possibilities and limitations of technical solutions

  6. CSE 291 Structure • 4-site distance learning course • UW and Microsoft: Ed Lazowska • UCB: Steve Maurer (Public Policy) • UCSD: Geoff Voelker and Stefan Savage • Experimental technology • Microsoft ConferenceXP, UW Presenter • Live video over Internet2: (1) all rooms, (2) slides • Webcast and archived • Lectures, readings, projects

  7. CSE 291 Lectures • Lectures by instructors, CCIED PIs • Paxson, Savage, Voelker • …and leading experts • Butler Lampson (Microsoft) • Accountability and Freedom • Dave Aucsmith (Institute for Advanced Technology in Governments, Microsoft) [also CCIED TAB member] • Crime on the Internet • Hal Varian (Berkeley) • Economics and computer security • Christina Filarowski-Sheaks and Bryan Del Monte (U.S. Department of Defense, Pentagon) • US Detention & Interrogation Policy and the War on Terror

  8. CSE 291 Projects • Red Team Project • Implement an exploit (buffer overflow) • Discuss policy ramifications for various scenarios of attackers and victims • White Paper Final • Comprehensive policy brief on security topic (30 pgs) • Mix groups of CS and policy students • Distributed across sites

  9. CSE 291 Summary • Materials archived for wide access and availability • Slide content of all speakers • Speaker video, audience video • Wiki with full class discussion http://www.cse.ucsd.edu/~voelker/cse291/

  10. CSE 127 • Undergraduate Computer Security • Savage resurrected the class starting Spring 2005 • Security and cryptography basics • Exploits & defenses in context of CCIED topics • DDoS, worms, viruses, phishing, botnets, etc. • Project: buffer overflow exploits

  11. Outreach: Workshop • ACM WORM Workshop • Workshop On Repelling Malcode • Co-located with ACM CCS • Led by CCIED PIs • Savage first PC Chair in 2003, Paxson 2004 • Savage and Paxson steering committee • Angelos Keromytis 2005 • Farnam Jahanian 2006 • Forum for academia, industry, government • Publish and discuss topics of interest to CCIED • Invited talks of published work • Provide single venue for top work in area

  12. Outreach: Tutorial • USENIX Security 2006 tutorial (Proposed) • Understanding and Addressing the Threat of Internet Worms • Audience • Researchers, Ph.D. students, and practitioners • Teach detailed overview of state-of-the-art in area • Topics • Threats: DDoS, worms, botnets, etc. • Understanding: measurement and forensic analysis of outbreaks • Defenses: host- and network-based

  13. Outreach: Industry • Industry collaboration • Helen Wang, John Dunagan (Microsoft Research) • Rodolfo Milito (Consentry Networks) • Industry consultation • Consentry Networks, ForeScout, Accel Partners, Sequoia Capital

  14. Outreach: Talks • Extensive outreach through lectures and talks • Universities (22) • Berkeley, Stanford, MIT, UW, Princeton, Dartmouth, etc. • Industry (8) • Microsoft, AT&T, Intel, Nortel, etc. • Government (7) • DoD, DoE, NSA, MITRE, British Consulate, etc. • Conference keynotes, invited talks, and panels (14) • NDSS, WORM, ITSG, TSWG, etc.

  15. Outreach Talks: Paxson • Tutorial co-instructor, IEEE Supercomputing, "Cybersecurity at Open Scientific Facilities", Oct 2004 • Invited seminar, “Analyzing Network Traffic in the Presence of Adversaries”, UCB, Oct 2004 • Guest lecture, “Defending Networks”, UCB, Nov 2004 • Guest lecture, “The Threat of Internet Worms”, UCB, Dec 2004 • Jon Postel Memorial Lecture, UCLA, “Addressing the Threat of Internet Worms”, Feb 2005 • Presentation to In-Q-Tel, “Defending Networks”, Feb 2005 • Guest lecture, UCB, “Dealing With Internet Worms”, Mar 2005 • Invited seminar, Dartmouth, “Addressing The Threat of Internet Worms”, Apr 2005 • Invited seminar, MIT, “Exploiting Underlying Structure for Detailed Reconstruction of an Internet-Scale Event”, Apr 2005 • Invited speaker, AUSCERT, “The Threat of Internet Worms”, May 2005 • Invited seminar, Princeton, “Exploiting Underlying Structure for Detailed Reconstruction of an Internet-Scale Event”, Apr 2005 • Invited seminar, Microsoft Research, “Exploiting Underlying Structure for Detailed Reconstruction of an Internet-Scale Event”, Sep 2005 • Invited seminar, Stanford, “Exploiting Underlying Structure for Detailed Reconstruction of an Internet-Scale Event”, Oct 2005 • Presentation to Tekes Finland <-> ICSI Exchange, Helsinki, “Network Research at ICSI”, Oct 2005 • Invited talk, CCS WORM, “Exploiting Underlying Structure for Detailed Reconstruction of an Internet-Scale Event”, Nov 2005 • Presentation to Intelligence Technology Innovation Center working group on Knowledge Discovery and Dissemination, “Monitoring Internet Activity and Attacks”, Nov 2005 • Security Crystal Ball Workshop, “Tracking Causality”, Jan 2006 • Presentation to CIO, US Department of Energy, “Network Security Research Efforts at Berkeley Lab”, Jan 2006 • Discussion with British Consulate-sponsored UK Information Technology Mission, “Perspectives on US Cybersecurity Research”, Jan 2006

  16. Outreach Talks: Savage • Invited talk, "Internet Outbreaks: Epidemiology and Defenses", University of Washington, Jan 2005. • Invited talk, "Internet Outbreaks: Epidemiology and Defenses", ISOC NDSS, Feb 2005. • Keynote, "Internet Outbreaks: Epidemiology and Defenses", JSOE CAP meeting, Feb 2005. • Invited talk, "Internet Outbreaks: Epidemiology and Defenses", Cornell University, Jun 2005. • Lecture, “Internet Outbreaks: Epidemiology and Defenses”, UCSD COSMOS, Jun 2005. • Invited talk, "Scalable Internet Threat Detection", Dept of Homeland Security/Army Research Office Workshop on Malcode Detection, Aug 2005. • Lecture, “Internet Outbreaks: Epidemiology and Defenses”, CSE 292, Oct 2005. • Invited talk, "Scalable Internet Threat Monitoring", ACM CCS Workshop on Rapid Malcode, Nov 2005. • Lecture, “Internet Outbreaks: Epidemiology and Defenses”, CSE 291, Nov 2005. • Keynote, "Scalable Malware Detection and Analysis", Intel Research Council Worksop on Network Monitoring and Security, Dec 2005. • Distinguished Lecture, "Internet Outbreaks: Epidemiology and Defenses", University of Toronto, Dec 2005. • Briefing on CCIED, CTO Nortel, Jan 2006. • Briefing on CCIED, Undersecretary of Defense for Research, Feb 2006. • Invited Panel talk, "Smoke, Mirrors and Virtualization", ISOC NDSS, Feb 2006.

  17. Outreach Talks: Voelker • Invited talk, "Internet Quarantine: Requirements for Containing Self-Propagating Code", AT&T Labs, Feb 2004. • Invited talk, “Internet Quarantine: Requirements for Containing Self-Propagating Code”, Microsoft Research Asia, Oct 2004. • Lecture, "Internet Outbreaks: Epidemiology and Defenses", CSE 91, Oct 2004. • Invited talk, "Internet Outbreaks: Epidemiology and Defenses", GTA/LAND Joint Networking Workshop, UFRJ, Mar 2005. • Keynote, “Automated Availability Management Management in Large in Large-Scale Scale Storage Systems”, HotP2P, Jul 2005. • Invited talk, "Informed Content Delivery & Network Sensitivity to Interdomain Routing Changes", AT&T Labs, Aug 2005. • Lecture, "Computer Security Primer", CSE 291, Oct 2005. • Keynote, "Using Computer Games to Teach Software System Design and Implementation", JSOE CAP meeting, Oct 2005. • Lecture, "Internet Outbreaks: Epidemiology and Defenses", CSE 91, Nov 2005. • Invited talk, "Internet Outbreaks: Epidemiology and Defenses", Information Technology Study Group (ITSG) Workshop, Oct 2005. • Briefing on CCIED, NSA Director of Research, Feb 2006.

  18. Outreach Talks: Weaver • Invited talk, ACSAC, "Worm Tutorial", Dec 2004. • Invited talk, MITRE, "Worm Tutorial", Jun 2005. • Invited talk, Technical Support Working Group, "Worm Tutorial", Jul 2005. • Invited talk, Penn State, "Principles of reactive Worm Defense", Nov 2005. • Invited talk, Stanford, "Principles of reactive Worm Defense", Oct 2005. • Upcoming: • Microsoft (Mar 2006), IEEE (Mar 2006), UW (Mar 2006)

More Related