Panel I: "Networks Security: The Triumph and Tribulation"
- Wenjing Lou, Virginia Tech, USA
- Sushil Jajodia, George Mason University, USA
- Neeraj Suri, Technical University of Darmstadt, Germany
- Aziz Mohaisen, VeriSign, USA
Computer networks are integral part of any computer system and as a result of technological advancements over the last two decades, computer networks of today have highly complex architectures,consisting of highly diverse set of components: Nodes comprise of diverse computing devices, sensors, smart phones, mobile units embedded on a vehicle, UAVs, ammunition, or soldiers; networks are networks of fixed wired networks, cellular networks, and wireless ad hoc networks; and communication links can be copper, optical, radio or satellite links. These can be highly dynamic 3-D networks and span ground, air, and under-water. Securing such networks against cyber attacks is a major challenge because these networks have a large attack surface and operate in large, highly dynamic environments with severe constraints on the computational devices, battery power, limited and noisy wireless bandwidth, and unpredictable node mobility.
Challenges in securing today’s complex computer networks include adversary and attack modeling, risk analysis, risk management, attack detection, attack prevention, damage analysis and recovery from attacks, development of protocols and cryptographic methods to deal with security threats and formal methods to prove the security of a network. To comprehensively and effectively address these challenges, we have assembled a panel of excellent researchers with complementary expertise to effectively cover all important aspects of securing computer networks of today and tomorrow.
Panel II: "Wireless Security: Securing the Lower and Higher Layers"
- David Wagner, University of California at Berkeley, USA
- Yingying Chen, Stevens Institute of Technology, USA
- Walid Saad, Virginia Tech, USA
- Jesse Walker, Intel, USA
Gone are the days of secure routing protocols and such, instead there has been a shift towards researching wireless security at the higher and lower layers. This is particularly evident given the significant amount of research being done in smartphone security and privacy, as well as the vast amount of research being initiated in the area of “physical layer security.” This panel will examine this observation and touch upon diverse topics such as mobile OS security, usable security, location security and privacy, etc. In the process of the discussion, the panel intends to address the high-level question “Where has the middle of the stack gone in wireless security research?”.