• No results found

Singapore UK Cyber Security Workshop February 2015

N/A
N/A
Protected

Academic year: 2021

Share "Singapore UK Cyber Security Workshop February 2015"

Copied!
12
0
0

Loading.... (view fulltext now)

Full text

(1)
(2)

Tuesday 24 Feb 2015 (Nanyang Executive Center@NTU, LT2) Dress Code: Long sleeve shirt with no tie

Time Activity

0900-0915 hrs Registration

0915 – 0930 hrs Opening and short introduction from all participants 0930 – 1000 hrs Session 1:

i. National Research Foundation (NRF)

 Cyber security research in Singapore, Mr Lim Hwee Kwang ii. EPSRC

 The UK Research Councils and How They Support Research and Doctoral Skills Training in Cyber security, Dr John Braid 1000 – 1030 hrs Tea Break

1030 – 1200 hrs Session 2: Presentation by Universities/ Research institute i. Nanyang Technological University

 Prof Thambipillai Srikanthan ii. Imperial College London

Secure by Design, Resilient Through Adaptation: Difficult Problems and The Challenge of Integration, Dr Emil Lupu iii. National University of Singapore

 Trustworthy Systems from Untrusted Component Amalgamations, Prof Abhik Roychoudhury

iv. Lancaster University

 Security and concurrency challenges in programmable networks, Dr Shishir Nagaraja

1200 – 1300 hrs Lunch

1300 -1430 hrs Session 3: Presentation by Universities/ Research institute i. University of Newcastle

Challenges in Protecting Critical Infrastructure: People and Systems, Prof. Aad van Moorsel

ii. Singapore University of Technology and Design (SUTD)

 Design of Secure Cyber Physical Sytems, Prof Aditya P Mathur

iii. University of Southampton

 Security Models for Cyber-Physical Systems, Prof. Vladimiro Sassone

(3)

Time Activity 1430 – 1500 hrs Tea Break

1500 – 1600 hrs Session 4: Presentation by Universities/ Research institute i. A*STAR

 Cyber Security & Intelligence (CSI), Dr Vrizlynn Thing

 Cyber-Physical Security, Dr Zhou Jianying ii. University of Oxford

 Cyber Security: Old Problems and New Contexts, Prof Andrew Martin

1600 – 1630 hrs Wrap up for Day 1

1900 – 2130 hrs Dinner hosted by Matt Crossman, Regional Director SEA Science and Innovation

Venue: 76A Ridley Park, S248501 Dress Code: Smart Casual

Wednesday 25 Feb 2015 (Research Technoplaza (RTP))

Dress Code: Long sleeve shirt with no tie

Time Activity

0900 – 1015 hrs Project Demo by NTU Venue: CHiPES (Level 3) 1015 – 1045 hrs Tea Break

1045 – 1115 hrs Session 5: Presentation by Industry i. BT Security

 Mr Hoo Chuan Wei Venue: NTU Reality Theatre (Level 2)

1115 – 1200 hrs Final Plenary discussion on opportunities for collaboration and closing Venue: NTU Reality Theatre (Level 2)

1200 – 1330 hrs Lunch

(4)

Profiles on Singapore Researchers

1. Dr Jianying Zhou, Head of Infocomm Security Department, Institute for Infocomm

Research(I2R)

Jianying Zhou has been managing a number of R&D projects including EU funded project SMEPP-033563, A*STAR funded project SEDS-0721330047, EMA funded project SecSG-EPD090005RFP(D), and NRF funded project SecUTS-NRF2014NCR-NCR001-031.

Dr. Zhou received PhD in Information Security from University of London, MSc in Computer Science from Chinese Academy of Sciences, and BSc in Computer Science from University of Science and Technology of China. His research interests are in applied cryptography, computer and network security, cyber-physical security, mobile and wireless security.

Dr. Zhou worked in China, Singapore, and USA before joining I2R. He was an adjunct professor in Kyushu University, Shanghai Jiaotong University and University of Science and Technology of China. He is actively involved in the academic community, having served over 150 times in international crypto and security conference committees as general chair, program chair, and PC member, having been in the editorial board and as a regular reviewer for over 30 international journals. He has published over 200 referred papers at international conferences and journals. He is a co-founder and steering committee member of International Conference on Applied Cryptography and Network Security (ACNS), which is ranked in top 20 crypto and security conferences.

2. Prof Abhik Roychoudhury, Professor of Computer Science, and Vice Dean (Graduate

Studies) at School of Computing, National University of Singapore.

Abhik Roychoudhury received his Ph.D. in Computer Science from the State University of New York at Stony Brook in 2000. Since 2001, he has been employed at the National University of Singapore. His research has focused primarily on software testing and analysis, trustworthy software and real-time embedded software. His research has received various awards and honors, the most recent being his appointment as ACM Distinguished Speaker in 2013. He is currently leading the TSUNAMiproject , a large five-year long targeted research effort funded by National Research Foundation in the domain of software security. His research has been funded by various agencies and companies, including the National Research Foundation (NRF),

(5)

Ministry of Education (MoE), A*STAR, Defense Research and Technology Office (DRTech), DSO National Laboratories, Microsoft and IBM. He has authored a book on "Embedded Systems and Software Validation" published by Elsevier (Morgan Kaufmann) Systems-on-Silicon series in 2009, which has also been officially translated to Chinese by Tsinghua University Press. He has served in various capacities in the program committees and organizing committees of at least fifty conferences, and is currently serving as an Editorial Board member of IEEE Transactions on Software Engineering (TSE).

3. Dr Vrizlynn Thing, Head Cyber Security & Intelligence (CSI) R&D Department, Institute of

Infocomm Research (I2R)

Vrizlynn Thing department focuses on digital forensics, cybercrime analysis, cyber security & intelligence, and mobile security research and technology development. She is also an Adjunct Associate Professor at the National University of Singapore (School of Computing), and the Singapore Management University (School of Information Systems). She has over 13 years of security and forensics R&D experience with in-depth expertise in various aspects of cyber security, forensics & intelligence. Her research draws on her multidisciplinary background in computer science (Ph.D. from Imperial College London, United Kingdom), and electrical, electronics, computer and communications engineering (B.Eng. and M.Eng by Research from Nanyang Technological University, Singapore). During her career, she has taken on various advisory and consultancy roles for national level cyber security initiatives. She also participates actively as the Lead Scientist of collaborative projects with industry partners such as MNCs, SMEs and the government agencies.

4. Prof Aditya Mathur, Head of Information Systems Technology and Design Pillar, Singapore

University of Technology and Design(SUTD)

Aditya has designed and taught numerous courses in Computer Science ranging from freshman to senior graduate levels. Focus on student engagement and active learning are two critical components of Aditya’s teaching style. He has authored several textbooks. His most well known book “Introduction to Microprocessors” was first published in 1980 by Tata McGraw Hill and its third edition is now in its 36th reprint. This book, the first on the subject in India, led to the initiation and subsequent proliferation of undergraduate courses in microprocessors. His most recent book is titled “Foundations of Software Testing” and was published by Addison Wesley Professional in 2008. In collaboration with Barry Wittman and Tim Korb, Mathur has co-authored A Gentle Introduction to Programming Using Java. This book is intended to serve as a text in freshman programming courses.

(6)

Research

Aditya’s research spans software testing, reliability, and process control. His foundational work, published in over 130 papers, relates to investigations into the effectiveness of testing techniques and their applicability to the testing of sequential and distributed software systems, methods for the estimation of software system reliability, and techniques and tools for managing a collection of Internet-enabled devices.

Service

Aditya was a member of a small team of faculty members who started the first computer science department in India.Subsequently Aditya served as the head of this department. Later Aditya served as the associate head and head of Computer Science, Associate Dean of College of Science, and Director of the Software Engineering Research Center – all at Purdue University.

Education

 PhD, Electrical Engineering, 1977  MS, Electrical Engineering, 1972

 BS, Electrical Engineering and Computer Science, 1970 Research Projects

Software testing and reliability: Aditya has been a crusader for the use of code coverage criteria in the estimation of software reliability or as an orthogonal metric to assess confidence in the reliability estimates. He has proposed the “Saturation Effect” as a motivating device, and as a fundamental principle, for the quantitative test assessment using an increasingly powerful suite of criteria. Vendors to enhance marketing of their test tools often use this device. Mathur, in collaboration with Raymond DeCarlo, has pioneered research into the use of feedback control in software development. This research has led to the development of a new area now known as Software Cybernetics.

Information retrieval: Aditya, in collaboration with Luo Si and Jason Fish, is the prime architect of the INDURE expertise search system. This system is in use at four universities in the state of Indiana and serves as a model for expertise search systems under development in other states. The success of INDURE led the State of Indiana to fund the MapIN project. The goal of this ongoing project is to extend the academic expertise in INDURE by including the expertise in the commercial sector.

(7)

Profiles on UK Delegates

1. Dr John Baird, Lead for Cyber Security within the Partnership for Conflict, Crime and

Security Research, Engineering and Physical Sciences Research Council (EPSRC)

Since May 2011 John has been the Lead for the interdisciplinary RCUK Digital Economy Theme. This is a major initiative in the RCUK strategy to cross-connect disciplines and have impact through large scale interdisciplinary research. The Digital Economy Theme has evolved new ways of carrying out research, innovative means of achieving impact, new research ecologies, supporting high quality research students from new sources and has been an agent of transformational change. Since August 2013 he has also taken on the lead for EPSRC’s activities in Cyber-security within the Partnership for Conflict, Crime and Security Research (PaCCS, formerly known as the RCUK GU Programme).

John joined the Research Councils after doing post-doctoral research in pharmacology. He has held a variety of positions, including responsibility for EPSRC’s fellowships activities and Knowledge Transfer and Impact activities (including KTP and LINK) as well as heading EPSRC’s Chemistry Programme.

2. Prof. Aad van Moorsel, University of Newcastle

Aad van Moorsel is a Professor in Distributed Systems and Head of School in the School of Computing Science at Newcastle University. His group conducts research in security, privacy and trust. Almost all of the group's research contains elements of quantification, be it through system measurement, predictive modelling or on-line adaptation.

Aad worked in industry from 1996 until 2003, first as a researcher at Bell Labs/Lucent Technologies in Murray Hill and then as a research manager at Hewlett-Packard Labs in Palo Alto, both in the United States. He got his PhD in computer science from Universiteit Twente in The Netherlands (1993) and has a Masters in mathematics from Universiteit Leiden, also in The Netherlands. After finishing his PhD he was a postdoc at the University of Illinois at Urbana-Champaign, Illinois, USA, for two years. Aad became the Head of the School of Computing Science in 2012.

Research Interests

My group takes the perspective of the user and the decision-maker, and asks the questions: how can we run IT, make decisions about IT, and implement IT such that the business is secured but efficient and people feel safe but can be productive.

We provide new, scalable technologies and methodologies in pursue of the holy grail: make decisions, operate and optimize information systems for the proven good of an organisation without any human intervention. That will never succeed completely, but it poses us interesting research targets. Our research is based on sound foundations in systems research. Our research is heavy on quantification, combining system measurement with mathematical modelling and system implementation. We build software and systems, apply math, and invent algorithms and architectures.

(8)

3. Dr. Emil Lupu, Faculty of Engineering, Department of Computing, Imperial College London

Dr. Emil Lupu leads the Academic Centre of Excellence in Cyber Security Research at Imperial College and is an Associate Director with Imperial’s Institute for Security Science and Technology. His research interests are in the design of trustworthy and adaptive systems that are resilient to malicious compromise across a broad range of applications ranging from wireless sensor networks to cloud environments. His current research projects include work on detecting and diagnosing malicious data injections in wireless sensor networks, analysis of threat propagation in cloud environments and making decisions with partially trusted information, amongst others.

Dr Lupu’s past work has led to numerous contributions to policy-based network and systems management covering all aspects of the policy life-cycle: specification, analysis, refinement, deployment and learning. This work has been applied in both pervasive computing environments and more traditional networked infrastructures.

4. Prof. Vladimiro Sassone, Electronic and Computer Science, Faculty of Physical

Sciences and Engineering, University of Southampton

Vladimiro Sassone is Professor of Computer Science in ECS, University of Southampton, and Director of the Centre of Excellence for Cyber Security Research. His background is in the theory of computing, with emphasis on computational models for concurrency, language-based security and types, and on formal methods. Recently his work focussed on predictive (Bayesian) trust models, privacy and anonymisation, and anonymity mechanisms such as TOR. In particular he has pioneered the application of Markov models to trust evaluation and of game-theory and mechanism design to the design and evaluation of incentive schemes in anonymity networks. His current interests include safety/security co-design, cyber security of cyber-physical systems and the Internet-of-Things. Professor Sassone is president of European Association for Theory and Practice of Software, member of the Academia Europaea, of the board of the European Association for Theoretical Computer Science, and editor in chief of the Springer ARCOSS series and of ACM Selected Readings in Computing.

5. Dr. Shishir Nagaraja,School of Computing and Communications, Faculty of Science

and Technolgy

Dr. Shishir Nagaraja is a Senior Lecturer at Lancaster University. He specialises in network security and privacy. His long term research aim is to develop secure programmable networks. His current interests lie in solving security and concurrency challenges in the context of SDN and NFV. He is also engaged in several projects on privacy-enhancing technologies such as unobservable communication networks, location-anonymous cameras, and location-anonymous audio recorders. He has been instrumental in discovering social malware and uncovering ISP-level censorship practices across the world. He is concurrently Adjunct Professor at ECE, UIUC. He holds several patents in security. Dr. Nagaraja holds a Ph.D. from Cambridge University. His thesis explored the foundational aspects of adversarial complex networks.

(9)

6. Prof. Andrew Martin, Director, Centre for Doctoral Training in Cyber Security, Department of Computer Science, University of Oxford.

Prof. Andrew Martin undertakes research and teaching in the area of Systems Security, in the University of Oxford. He conceived the University's new Cyber Security Centre and helps to direct it, leading the University's successful bid to be recognised as a Centre of Excellence in Cyber Security Research. He directs the new Centre for Doctoral Training in Cyber Security, which admits 17 students each year for inter-disciplinary education and research.

His recent research focus has been on the technologies of Trusted Computing, exploring how they can be applied in grid and cloud computing contexts, as well as in mobile devices, in order to address their emerging security challenges. He has published extensively in this area, hosting several related international events in Oxford and speaking on the subject all over the world. These technologies are now emerging as crucial components in the internet of things, which is proving a fruitful additional research area.

Andrew wrote a doctoral thesis on the subject 'Machine-Assisted Theorem Proving for Software Engineering', in the early 1990s. He then worked as a Research Fellow in the Software Verification Research Centre at the University of Queensland, Australia. Returning to the UK, he was briefly a lecturer at the University of Southampton, before returning to Oxford to take up his present post in 1999. Dr Martin is a fellow of Kellogg College, Oxford.

(10)

Date: 24 February 2015 Time: 9am to 4.30pm

Venue : Nanyang Executive Centre (NEC), Lecture Room 2

(11)

Date : 25 Feb 2015 (Wednesday) Time : 8.30 am to 1.30 pm

Venue : Research Techno Plaza (RTP),

CHiPES (level 3) & NTU Reality Theatre (level 2)

By Car: (Please refer to the green coloured route in the map above)  Coming from Pan Island Expressway (PIE) towards Tuas.

 Exit PIE via Exit 38, Pioneer Road North and turn right into Nanyang Technological University (NTU).

 Upon entering NTU, keep left and turn left at the Nanyang Crescent T-junction.  Keep left and drive for about 2 km until you see the 9-storey Research Techno Plaza

(RTP) Building on your right.

 Turn into the driveway of RTP and head towards the underground carpark.

 After parking your vehicle, look for the door to "BorderX Block Lift Lobby" and take Lift #3 or #4 to Level 3.

(12)

By Mass Rapid Transit & Bus: (Refer to the red coloured route in the map above) Route A

 Take a Mass Rapid Transit (MRT) train to the Boon Lay train station in the west.  Proceed to the bus interchange and take SBS Transit bus number 179.

 The bus will travel along Nanyang Drive, and will pass the Halls of Residences, School of Arts, Media & Design and the School of Biological Sciences. Alight at the bus stop just after RTP.

 Enter the RTP lobby, go to the BorderX Block Lift Lobby and take Lift #3 or #4 to Level Level 3.

Route B

 Take a Mass Rapid Transit (MRT) train to the Pioneer train station in the west.  Upon exiting the control station, turn left, head to the bus-stop below the train

station and take SBS Transit bus number 179

 The bus will travel along Nanyang Drive, and will pass the Halls of Residences, School of Arts, Media & Design and the School of Biological Sciences. Alight at the bus stop just after RTP.

 Enter the RTP lobby, go to the BorderX Block Lift Lobby and take Lift #3 or #4 to Level 3.

References

Related documents

(3) a statement of owner equity which shows the sources of the change in owner equity during the year; (4) a cash flow statement and debt repayment ability analysis;.. (5)

Therefore, it is important to establish standardized Arabic solutions including selecting the Arabic generic and country code top-level domain names (Arabic gTLD and ccTLD)..

While this report offers a glimpse into the type and scope of substance abuse prevention and recovery services available at UIHOs, enhanced data from the Uniform Data System

approaching 30 minutes of scheduled pickup time). We next describe in detail, the cognitive activities of the expert van dispatcher, as the focus of our HTA development. We

operational for an agreed upon (between Transit Services and the Proponent) period of time to determine that all aspects of the system continue to perform as required; i.e. that

This guidance introduces a risk-based approach to pandemic influenza risk management and encourages Member States to develop flexible plans, based on national risk assessment, taking

• Inventory Agent (VA) checks the ability to deliver the raw materials from the supplier and the time that the finished products of the customer order will be ready to deliver and

2.1 In consideration of you agreeing to abide by the terms of this EULA, we grant you a personal, nontransferable, non-exclusive license to use the Software, Website, and the