Written by Dr. Barbara Endicott-Popovsky, Director
University of Washington Center for Information and Cybersecurity
This past academic year was pivotal for the Center—a time to look back at our accomplishments and to prepare for taking significant steps forward in 2007-2008.
Last year was marked by two major accomplishments. First, our Center received re-certification from the NSA as a Center of Excellence in Information Assurance Education. To receive this recognition required demonstration that our academic offerings have grown since inception. Our application showed significant progress, and there is even more to come!
The second achievement is personal. I completed my doctoral studies in Computer Science/Computer Security with Dr. Deborah Frincke as major professor. My dissertation: A Methodology for Calibrating Forensic-Ready, Low Layer Network Devices, resulted in 17 publications in national and international venues.
During this same period, the Center continued advancing information assurance at the University of Washington, establishing annual venues highlighting the University’s commitment to the field.
- The Unintended Consequences of the Information Age lecture series—a collaboration among the iSchool, the Law School, CSE, URBP, UWEO, the CISO, UWTV—broadcasts programs of interest to the general public on current information security topics.
- NWSec Conference at Tacoma—a collaboration among UWIT, the Tacoma student GreyHat organization, CSE, the iSchool, the CISO, local industries in South Sound—provides a venue for student and faculty research, as well as a platform for presentation by national experts.
- Information Security Compliance and Risk Management Institute (ISC-RMI)—a collaboration among the iSchool, the CIAC, the Shidler Center (Law School), CSE, UWEO, the CISO, Microsoft, Christiansen IT Law—brings together a distinguished faculty that includes information security and privacy professionals, attorneys and compliance professionals from around the country to present and discuss the protection and use of information and computer systems
- Annual Northwest Regional Collegiate Cyber Defense Exercise—a collaboration among the iSchool, UWEO, UWIT, the student GreyHat group, the US Military Academy at West Point, Ft. Lewis. This competition challenges college teams of graduate/undergraduate students to manage and protect an existing “commercial” network infrastructure. This year 5 schools participated—the iSchool, UWIT, Highline Community College, University of Alaska Fairbanks.
In addition, many of the Center’s participating departments made significant strides in information assurance research (a selection of publications is enumerated below). This provides an excellent basis for achieving certification as an NSA Center of Excellence in Information Assurance Research (CAE-R), an opportunity offered us by the NSA this month. I’ll be seeking consensus among participating departments before moving forward.
2006-2007 CIAC Achievements
- Information Assurance and Cybersecurity Certificate
The Information School and UW Educational Outreach graduated its 3rd Cohort (25 students) for the Information Assurance and Cybersecurity Certificate. The 4th Cohort has 34 students—22 non-matriculated and 12 graduate students. Current students will assist in research projects from the ISC-RMI and the New Zealand Honeynet Project.
- Cyber Attack/Defend Exercises at Ft. Lewis
For the 3rd year running, West Point conducted cyber attack/defend training at Ft. Lewis for iSchool and UWIT students. Several interested universities attended at the Center’s invitation. This year the Center will expand this effort to launch a regional contest to include student teams from local community colleges, University Hawaii Manoa, University of Alaska/Fairbanks, Idaho and Eastern Washington. As plans firm, we will notify interested departments about how students can get involved.
- Information Assurance Online Course
A course in Information Assurance was designed for online delivery in collaboration with UWEO and the Information School through a grant received from the NSA. It was offered through rolling enrollment beginning in Summer and prepares students to protect their own home networks.
- Special Topics in Computer Security (CSE)
Tadayoshi Kohno began offering a graduate seminar in Computer Security topics that will be repeated again this year.
The CISO’s office brought OWASP (Open Web Application Security Project) training to campus, opening the opportunity to select students to fill available seats. This program trains staff and students in secure coding practice.
- Information Assurance Scholarship Program
The IASP (Information Assurance Scholarship Program) admitted the 2nd student from the University of Washington, Ryan Bird who is finishing his MSIM degree in the Information School. Patrick Tague, our 1st scholarship student will be going to work with SPAWAR in San Diego upon graduation with this PhD in Electrical Engineering where he is studying with Radha Poovandran.
This year, the Strategic Planning for Critical Infrastructures master degree program in Urban Planning qualified for scholarships for DOD civilian and military students through an agreement developed with the National Defense University.
- The Unintended Consequences of the Information Age Lecture Series.
1) Lecture 1: Privacy: Reconciling Reality aired over UWTV and the Research Channel during Fall and Winter. Jointly sponsored by the CIAC and the Information School with assistance from PNNL, it is ably moderated by Ed Lazowska and will be scheduled for airing again this year.
2) Lecture 2: At Odds: Victims Rights vs. Free Speech aired over UWTV and the Research Channel during Fall and Winter. Jointly sponsored by the CIAC, the Shidler Center, the Information School, and the Law School, with assistance from PNNL, this second installment in the series was introduced by Rob McKenna, the State’s Attorney General and will be scheduled for airing again this year.
3) Lecture 3: Our Infrastructures: Online and Vulnerable? was edited over the summer and will air this year in 3 segments. Jointly sponsored by INSER, the Master of Science in Strategic Planning for Critical Infrastucture from the Department of Urban Planning, the CIAC, and the Information School with support from T-Mobile, this series provides a compelling case for increased research in cybersecurity as related to critical infrastructure.
4) Winter and Spring, 2 more lectures are planned. Thus far, I’ve received recommendations that include music download impacts, and the challenges of e-voting! I will be seeking more suggestions from other departments for compelling topics!
- Grey Hat Conferences in Tacoma
Orlando Baiocchi, UWIT, guiding the Tacoma Grey Hat group, held two events last year—The NWSec in Winter and the IP3 security seminar in Spring. They will repeat these events this year.
In collaboration with the Law School, the iSchool and the National Resource Judge Program, the CIAC participated in judicial education on digital forensic evidence 56 judges from the Western region and the Pacific Rim attended.
Working with Northwest Security Institute (NSI), The Boeing Company and PNNL, the Center supported, and was part of the organizing team, for SADFE (Systematic Approaches to Digital Forensic Engineering) held in Seattle in April 2007. The NSI, a local non-profit organization, promotes and attracts information assurance events to the Seattle area.
- MOU with University of Hawaii Manoa
This summer, the Center continued to collaborate, under a memorandum of understanding, with the Information and Computer Science Department at the University of Hawaii Manoa, an EPSCoR university. ICS wishes to launch its own Center this year; the CIAC has received funding to assist them in developing curriculum, their NSA-CAE application, and a collaborative research agenda with the University of Washington.
Information Assurance research is being conducted across the university. A sample list of publications in this area is provided below. A researcher was selected from three departments active in the Center—Computer Science and Engineering, Electrical Engineering and the Information School—to demonstrate the depth and breadth of activity at the University.
Computer Science and Engineering: Steve Gribble
1. SpyProxy: Execution-based Detection of Malicious Web Content, by Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, and Henry M. Levy. To appear in the Proceedings of the 16th USENIX Security Symposium (USENIX Security 2007), Boston, MA, August 2007.
2. HomeViews: Peer-to-Peer Middleware for Personal Data Sharing Applications, by Roxana Geambasu, Magdalena Balazinska, Steven D. Gribble, and Henry M. Levy. To appear in the Proceedings of the 2007 SIGMOD International Conference on Management of Data (SIGMOD 2007), Beijing, China, June 2007.
3. Why We Search: Visualizing and Predicting User Behavior, by Eytan Adar, Daniel Weld, Brian Bershad, and Steven Gribble. To appear in the Proceedings of the 16th International World Wide Web Conference (WWW 2007), Banff, Alberta, Canada, May 2007.
4. The Importance of History in a Media Delivery System, by Richard Dunn, Henry Levy, Steven Gribble, and John Zahorjan. Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS 2007), Bellevue, WA, February 2007.
5. Cutting through the Confusion: A Measurement Study of Homograph Attacks, by Tobias Holgers, David E. Watson, and Steven D. Gribble. Proceedings of the 2006 USENIX Annual Technical Conference (USENIX ’06), Boston, MA, May 2006.
6. A Safety-Oriented Platform for Web Applications, by Richard S. Cox, Jacob Gorm Hansen, Steven D. Gribble, and Henry M. Levy. Proceedings of the 2006 IEEE Symposium on Security and Privacy, Oakland, CA, May 2006.
7. A Crawler-based Study of Spyware on the Web, by Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, and Henry M. Levy. Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006), San Diego, CA, February 2006.
Electrical Engineering: Radha Poovandran
1. Basel Alomair, Loukas Lazos, and Radha Poovendran, Passive Attacks on a Class of Authentication Protocols for RFID, to appear in International Conference on Information Security and Cryptology, 2007.
2. Krishna Sampigethaya, Mingyan Li, Leping Huang and Radha Poovendran, AMOEBA: Robust Location Privacy Scheme for VANET, to appear in IEEE JSAC Special Issue on Vehicular Networks, October 2007.
3. Krishna Sampigethaya, Mingyan Li, Radha Poovendran, Richard Robinson, Linda Bushnell, and Scott Lintelman, Secure Wireless Collection and Distribution of Commercial Airplane Health Data, to appear in AIAA/IEEE Digital Avionics Systems Conference (DASC), 2007.
4. Patrick Tague, Mingyan Li and Radha Poovendran, Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution, to appear in IEEE Annual International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), 2007.
5. Javier Salido, Loukas Lazos, and Radha Poovendran, Energy and Bandwidth-Efficient Key Distribution in Wireless Ad-Hoc Networks: A Cross-Layer Approach, to appear in IEEE/ACM Transactions on Networking, 2007.
6. Patrick Tague and Radha Poovendran, A Canonical Seed Assignment Model for Key Predistribution in Wireless Sensor Networks, to appear in ACM Transactions on Sensor Networks, 2007.
7. Loukas Lazos, Radha Poovendran, and Jim Ritcey, Probabilistic Detection of Mobile Targets in Heterogeneous Sensor Networks, Proceedings of 6th International Symposium on Information Processing in Sensor Networks (IPSN), April 2007.
8. Mingyan Li, Rainer Falk, Florian Kohlmayer, Andreas.Koepf, Radha Poovendran, High-Assurance SDR-based Avionics RFID System, to appear in 2007 SDR Forum Technical Conference, 2007.
9. Richard Robinson, Krishna Sampigethaya, Mingyan Li, Scott Lintelman, Radha Poovendran, David von Oheimb, Secure Network-Enabled Commerical Airplane Operations: IT Support Infrastructure Challenges, to appear in First CEAS European Air and Space Conference Century Perspectives (CEAS), 2007.
10. Richard Robinson, Mingyan Li, Krishna Sampigethaya, Radha Poovendran, Scott Lintelman, David von Oheimb, Jens-Uwe Buer, Impact of Public Key Enabled Applications on the Operation and Maintenance of Commercial Airplanes, to appear in AIAA Aviation Technology, Integration and Operations (ATIO) conference, 2007.
11. Richard Robinson, Mingyan Li, Krishna Sampigethaya, Radha Poovendran, Scott Lintelman, David von Oheimb, Jens-Uwe Buer, Jorge Cuellar, Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety, to appear in International Conference on Computer Safety, Reliability and Security (Safecomp), 2007.
12. Loukas Lazos, Radha Poovendran, and Jim Ritcey, On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets, International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), April 2007.
13. Mingyan Li, Iordanis Koutsopoulos, and Radha Poovendran, Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks, IEEE INFOCOM, 2007.
14. Richard Robinson, Krishna Sampigethaya, Mingyan Li, Scott Lintelman, Radha Poovendran, David von Oheimb, Challenges for IT Infrastructure Supporting Secure Network-Enabled Commercial Airplane Operations, to appear in American Institute of Aeronautics and Astronautics (AIAA) Infotech@Aerospace conference, 2007.
15. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, Radha Poovendran, Cliff Wang, and Sumit Roy (ed.), Advances in Information Security series, Vol. 30, Springer, 2007, ISBN 978-0-387-32721-1.
Information School: Barbara Endicott-Popovsky
1.Taylor, C.A., Endicott-Popovsky, B.E. and Frincke, D.A., Specifying Digital Forensics: Formalizing Forensics Policies, in Proceedings of the Annual Meeting of the Institute for Operations Research and Management Science (INFORMS) Conference 2007, 4-7 November 2007, Seattle, WA, pp. TBD.
2.Endicott-Popovsky, B., Frincke, D., and Taylor, C. (2007), A Theoretical Framework for Organizational Network Forensic Readiness, The Journal of Computers, Issue 3.
3.Endicott-Popovsky, B and Frincke, D., The Observability Calibration Test Development Framework, in Proceedings from the Eighth IEEE Systems, Man and Cybernetics Information Assurance Workshop 20-22 June 2007, United States Military Academy, West Point, NY.
4.Seifert, C., Steenson, R., Welch, I., Komisarczuk, Endicott-Popovsky, B., Capture: A Tool for Behavioral Analysis of Applications and Documents, in Proceedings of the 7th Digital Forensic Research Workshop, Pittsburgh, PA, 13-15 August 2007.
5.Taylor, C., Endicott-Popovsky, B., and Frincke, D., Specifying Digital Forensics: A Forensics Policy Approach, in Proceedings of the 7th Digital Forensic Research Workshop, Pittsburgh, PA, 13-15 August 2007.
6.Endicott-Popovsky, B.E., Chee, B. and Frincke, D.A., (2007). Calibration Testing of Network Tap Devices, Chapter 3 in Advances in Digital Forensics III, Springer, New York.
7.Endicott-Popovsky, B.E. and Frincke, D.A., Embedding Hercule Poirot in Networks: Addressing Inefficiencies in Digital Forensic Investigations, in Proceedings of the Human Computer Interface (HCI) Conference 2007, Beijing, China, 20-27 July 2007.
8.Endicott-Popovsky, B.E., Fluckiger, J.D. and Frincke, D.A., Establishing Tap Reliability in Expert Witness Testimony: Using Scenarios to Identify Calibration Need, in Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, WA, 10-22 April 2007.
9.Taylor, C., Endicott-Popovsky, B., and Phillips, A., Forensics Education: Assessment and Measures of Excellence, in Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, WA, 10-22 April 2007.
10.Endicott-Popovsky, B.E., Chee, B. and Frincke, D. Role of Calibration as Part of Establishing Foundation for Expert Testimony, in Proceedings 3rd Annual IFIP WG 11.9 Conference January 29-31, Orlando, FL.
11.Erbacher, R., Endicott-Popovsky, B.E., Frincke, D., Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution, in Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, 10-22 April 2007, Seattle, WA, pp. 150-151.
The CIAC continues to pursue grants through government and corporate sources. This year the Center received a $68,000 NSA grant funding a scholarship student (Ryan Bird–the iSchool/MSIM program) and 2 education projects, with an option for $213,000 for scholarships to DOD students applying through the IASP-DOD program. During 2007-2008 a major fund-raising effort will be launched to sustain and grow the Center.