Intelligence Amplifying Technology for Cybersecurity
Abstract: With the advent of highly sophisticated cyber-physical malware (CPM), a cyber-attack can cripple critical services. In differentiating CPM from traditional malware, the difference really comes from the open-ended possibilities for malware triggers resulting from the wide spectrum of sensor inputs, and limitless application-specific possibilities for designing malicious payloads. This talk will be about our […]
University Lecture Series at Google, Mountain View, CA, “Intelligence Amplifying Technology: A Contrarian Approach that Applies Euler’s Method to Complex Software”
Abstract: Fredrick Brooks writes “If indeed our objective is to build computer systems that solve very challenging problems, my thesis is that IA > AI, that is, that intelligence amplifying systems can, at any given level of available systems technology, beat AI systems. That is, a machine and a mind can beat a mind-imitating machine […]
CyLab Distinguished Seminar Series at Carnegie Mellon, “An 18th-century Mathematician, a $336 Million Patent, and Software Verifiability,”
Abstract: What does software verifiability have to do with an 18th-century Swiss mathematician? Come to hear the story that starts with Leonhard Euler, progresses to a patent worth hundreds of millions of dollars, and ends with software verifiability for safety and security. Deriving precise enough relevant architectural knowledge and applying that knowledge is critical for […]
Invited Talk @ UBC – An 18th-century Mathematician, a $336 Million Patent, and Software Experimentation
Abstract: What does software experimentation have to do with an 18th-century Swiss mathematician? Come hear the story that starts with Leonhard Euler, progresses to a software patent worth hundreds of millions, and ends with new ideas for experiment-driven software engineering. The construction of software usually involves many people and programs that need to be maintained […]
SecDSM – Recent Trends in Program Analysis for Bug Hunting and Exploitation
Abstract: Software is pervasive, and for better or worse, it now controls most of daily lives. Developing and maintaining secure software is of the upmost importance, but it seems that despite our best efforts we just haven’t gotten it right yet. More importantly we should ask ourselves why haven’t we solved this problem yet? This […]
Derbycon 7 – JReFrameworker: One Year Later
Abstract: JReFrameworker is a Java bytecode manipulation tool released at DEFCON 24 that lowers the barrier to entry for developing Managed Code Rootkits in the Java Virtual Machine. Bytecode manipulations are written entirely in source code, removing the need for any pre-requisite knowledge of bytecode internals and allowing anyone with a basic working knowledge of […]
MathWorks 2017 Research Summit – Demystifying Cybersecurity for CPS Community
Abstract: It is challenging for the cyber-physical systems (CPS) community to understand the essentials of cybersecurity. “Security Patch” or the “Kill Switch for WannaCry” jargon is at best oversimplified and superficial to convey essential cybersecurity knowledge. Cybersecurity problems are often rooted in the complex CPS software. For the CPS community, the challenge is to understand […]
2017 ACSS Conference Keynote Talk – Euler, the 336 Million Dollar Software Patent: Reflecting on How to Solve Hard Software Problems
Abstract: The size and complexity of software, the labor cost of programming, and the dire consequences of software malfunction have made it a nightmare to maintain software-intensive cyber-physical systems. Agile development, programming languages, component libraries etc. help but they do not suffice to ensure correctness and cost-effective maintenance of complex software. The central question is: […]
ISU Cybersecurity Seminar Series – Exploring the space in between bugs and malware
Abstract: We live in an age of software problems with catastrophic consequences. An extra goto in Apple’s SSL implementation compromised certificate checks for the better part of a year. An erroneous integer conversion in the Ariane 5 launch destroyed the European Space Agency rocket and its cargo valued at 500 million dollars. Often the problem […]
IASTATE/ECPE 2016 – Euler, the 336 Million Dollar Software Patent, and Reflecting on How to Solve Hard Software Problems
Abstract: The size and complexity of software, the labor cost of programming, and the dire consequences of software malfunctioning have made it a nightmare to maintain software-intensive cyber-physical systems. Agile development, programming languages, component libraries etc. help but they do not suffice to ensure correctness and cost-effective maintenance of complex software. The central question is: […]