표제지
Programme
목차
Opening remark / Yong-Kyung Lee 6
Welcoming remark / Jae-hee Jeon 10
주제발표 1. Above the Clouds: A Berkeley View of Cloud Computing / Anthony D. Joseph 14
BIOGRAPHY 16
ABSTRACT 17
Everyone Has Lots of Data to Process! 18
RAD Lab Mission ('05-'11) 19
Cloud as Major Enabler 19
Cloud Computing: True Utility 20
Economics of Cloud Users 20
Economics of Cloud Providers 22
Cloud Security Risks 22
Split Security Responsibilities 23
Physical Security 23
Shared Computing Infrastructure Risks 24
Securing Data in the Cloud 24
Stepping Stone Compromise 25
Advanced Persistent Threat Risk 25
Summary 26
주제발표 2. Online Privacy in the Age of Targeted Advertising / Larry Rohrbough 28
BIOGRAPHY 30
ABSTRACT 31
Motivation 32
Evolution of the Web 33
Evolution of Web Tracking 35
TRUST Studies - UC Berkeley 36
TRUST Studies - Stanford 37
Solutions: Policy / Standards / Legal 39
Technical Solution 39
Going Forward... 40
주제발표 3. Comparing Korean and US Cyber Security Infrastructure / Yongdae Kim 42
BIOGRAPHY 44
ABSTRACT 45
2010 ~ 2011: Security Breaches Everywhere 46
Security Breaches: Goals 47
Security Breaches: Main Tools (Reports) 47
Questions 48
A Few Possible Reasons 48
System/Security Admin in US Univs 49
System/Security Admin in US Company 49
System/Security Admin in US Major Bank 50
Some More Details 50
Spear Phishing (Targeted Phishing) 51
Examples of Spear Phishing 51
APT and Insider Misuse 53
Questions and Reasons Revisited 54
주제발표 4. Towards a Theory of High Confidence Networked Control Systems: Action Webs / S. Shankar Sastry 56
BIOGRAPHY 58
ABSTRACT 60
Motivation: Cybersecurity : Sensor networks & Networked Control Systems (NCS) NCS vulnerabilities 62
The swarm at the edge of the cloud 62
Ubiquitous instrumentation 63
Sensor webs everywhere 63
Widely deployed in critical infrastructures 64
Societal cyber-physical systems 64
Action Webs 65
Challenges for Action Webs 65
Cyber-attacks to NCS 66
NCS security concerns 66
Previous work in WSN security 67
Previous work in security is not enough 67
Cybersecurity for NCS 68
Cybersecurity for NCS: three problems 68
Cybersecurity for NCS 69
Threat assessment 69
Gignac water canal network 70
Gignac canal network 70
Reported attacks on water SCADA systems 71
Regulatory control of canal pools 71
Defender and attacker models 72
Cyber-attack on the Avencq canal pool 72
Cyber-attacks on NCS 73
Attack diagnosis 74
Attacks on supervisory control layer 74
Flow model 75
Finite-dimensional [approximate] model 75
State Estimation 76
Diagnosis scheme for unauthorized withdrawals 76
Diagnosis of unauthorized withdrawals: no attack 77
Attack diagnosis: upstream level sensors hacked 77
Attack diagnosis: downstream level sensors hacked 78
Security implications 78
Attack diagnosis for [other] SCADA systems 79
Resilient control 79
Attacks on regulatory control layer 80
Attack model: switching system of PDEs 80
Switching attack: stability 81
Switching attack: characterization of system stability 81
Interdependent security (IDS) & incetives to secure 82
Interdependent NCS 82
Interdependent failure probabilities 83
Multiplayer game with interdependent security 83
Increasing and decreasing incentives to secure 84
Individual optima [Nash equilibria] and social optima 84
Conclusion and future research 85
Economics of NCS security and reliability 86
NCS security experimentation 86
Towards a theory of high confidence NCS: Action Webs 87
주제발표 5. Computer Privacy Risks: Snooping on Keyboards / Doug Tygar 88
BIOGRAPHY 90
ABSTRACT 91
Keyboard Acoustic Sniffing 93
Acoustic Information in Typing 93
Previous Work vs. Our Approach 94
Key Observation 94
Sound of a Keystroke 95
Overview 95
Feature Extraction 96
Cepstrum vs. FFT 96
Unsupervised Learning 97
Bi-grams of Characters 98
Language Model Correction 98
Word Tri-grams 99
Two Copies of Recovered Text 99
Feedback-based Training 100
Experiment 101
Limitations of Our Experiments 103
Defenses 104
Summary 104
Overview of the Trust Center 106
TRUST Overview 109
TRUST Research 110
TRUST Education and Outreach 111
TRUST Knowledge Transfer 112
TRUST Human Resource Development 113
TRUST Science of Security 114
Summary 118
Panel 120
1. Sehun Kim 120
2. Hongsun Kim 124
[뒷표지] 127