Home

Mathematics of Data Analysis in Cybersecurity (October 22-24, 2014)


CLICK HERE TO PARTICIPATE
Organizing Committee
Description

The goal of this workshop is to bring mathematicians and cybersecurity practitioners together to outline the key challenges in the mathematics of cybersecurity data analysis. The expected outcome of the workshop will be a roadmap for investment in specific mathematical topics that will directly impact the advancement of the science of cybersecurity.

Mathematicians have long been involved in information security through cryptography, and thus algebra and number theory. But modern cyber security is a much larger field, and the perspectives and methodologies of other parts of the mathematical sciences have been only rarely been brought to bear. Given the complexity and dynamics of cyberspace it is essential to have a formal scientific basis for the field of cybersecurity. Indeed, a variety of sources have called for the creation of a "science of cybersecurity", and mathematical methods should play a critical role in such a science.

The purpose of this workshop is to bring together mathematical scientists and cybersecurity practitioners with expertise in several main areas, including especially high dimensional data analysis and cryptography, to establish a road map for bringing more mathematicians into the field of cybersecurity. Sharing our visions of near and far term goals of the field will be the highlight of the conference.


  • Andrew Pollington
    (National Science Foundation)
  • Sivaguru Ravindran
    (University of Alabama at Huntsville )
  • Michael Salpukas*
    (Raytheon Company)
  • John Savage
    (Brown University)
  • Burkhard Schwab
    (Brown University)
  • SeungWon Shin
    (University of Illinois at Urbana-Champaign)
  • Eric Sommers
    (University of Massachusetts)
  • Daniel Sussman *
    (Johns Hopkins University)
  • Ahlam Tannouri
    (Morgan State University)
  • Sam Tannouri
    (Morgan State University)
  • Yahui Tian
    (The University of Texas)
  • Vladislav Voroninski
    (Massachusetts Institute of Technology)
  • Brian Witten*
    (Symantec)
  • Wei Xie
    (Vanderbilt University)
  • Wotao Yin
    (University of California, Los Angeles)
  • Bo Zhang
    (IBM Research)
  • Bin Zheng
    (Pacific Northwest National Laboratory)
  • Quanyan Zhu
    (New York University)
WednesdayOctober 22, 2014
TimeDescriptionSpeakerLocationAbstractsSlides
9:35 - 9:45WelcomeJill Pipher, ICERM11th Floor Lecture Hall
9:50 - 10:25Multiscale Representation of High Dimensional DataLinda Ness, Applied Communication Sciences11th Floor Lecture Hall
PDF
PDF
10:25 - 10:45Coffee/Tea Break11th Floor Collaborative Space
10:45 - 11:20Mathematics and Machine Learning in CybersecurityBrian Witten, Symantec11th Floor Lecture Hall
11:25 - 12:00Some Research Problems and Areas in Cybersecurity and PrivacyTristan Nguyen, US Air Force Office of Scientific Research11th Floor Lecture Hall
PDF
12:00 - 1:45Break for Lunch
1:45 - 2:20Computational Topology, Variable Kernel Density Estimators, and Fraud DetectionMichael Salpukas, Raytheon11th Floor Lecture Hall
PDF
2:25 - 3:00Measuring Internet Population (Good and Bad)- Measurement, Estimation, and CorrelationJohn Heidemann, University of Southern California11th Floor Lecture Hall
PDF
3:00 - 3:20Coffee/Tea Break11th Floor Collaborative Space
3:20 - 3:55The Transition to BGP Security- Is the Juice Worth the Squeeze?Sharon Goldberg, Boston University11th Floor Lecture Hall
4:00 - 4:45Black box cryptanalysisNadia Heninger, University of Pennsylvania11th Floor Lecture Hall
4:15 - 5:00Discussion11th Floor Lecture Hall
5:30 - 7:00Welcome Reception11th Floor Collaborative Space

ThursdayOctober 23, 2014
TimeDescriptionSpeakerLocationAbstractsSlides
9:00 - 9:10Introduction John Harer, Duke University11th Floor Lecture Hall
9:10 - 9:45Introduction to Topological Data Analysis and Machine LearningJohn Harer, Duke University11th Floor Lecture Hall
9:50 - 10:25Obstructions to Compatible Extensions of Mappings.Jose Perea, Duke University11th Floor Lecture Hall
PDF
10:25 - 10:45Coffee/Tea Break11th Floor Collaborative Space
10:45 - 11:20Semantics and HomotopySanjeevi Krishnan, University of Pennsylvania11th Floor Lecture Hall
PDF
11:25 - 12:00Discrete Mathematical Approaches to Graph-Based Cyber Traffic AnalysisCliff Joslyn, Pacific Northwest National Laboratory11th Floor Lecture Hall
PDF
12:00 - 1:45Break for Lunch
1:45 - 2:20Topological analysis of dynamic graphs for cyber network monitoringEmilie Hogan, Pacific Northwest National Laboratory11th Floor Lecture Hall
PDF
2:25 - 3:00Multiscale Analysis of graphs, on graphs, and time-varying graphsMauro Maggioni, Duke University11th Floor Lecture Hall
PDF
3:00 - 3:20Coffee/Tea Break11th Floor Collaborative Space
3:20 - 3:55Authentication GraphsAric Hagberg, Los Alamos National Laboratory11th Floor Lecture Hall
PDF
4:00 - 4:35Computational and Statistical Trade-offs- Towards a Mathematical FrameworkDaniel Sussman, Johns Hopkins University11th Floor Lecture Hall
PDF
4:45 - 5:20In Search of a Calculus of TrustDavid Nicol, University of Illinois at Urbana-Champaign11th Floor Lecture Hall

FridayOctober 24, 2014
TimeDescriptionSpeakerLocationAbstractsSlides
9:00 - 9:10IntroductionTBA11th Floor Lecture Hall
9:10 - 9:40Creating Interpretable Collaborative Patterns to Detect Insider Threats You Chen, Vanderbilt University11th Floor Lecture Hall
9:50 - 10:25Application of Belief Propagation for Detecting Advanced Persistent Threats (APT's)Peter Chin, Boston University11th Floor Lecture Hall
PDF
10:25 - 10:45Coffee/Tea Break11th Floor Collaborative Space
10:45 - 11:20A DHS Perspective on Mathematics in Cyber SecurityAnn Cox, Department of Homeland Security11th Floor Lecture Hall
PDF
PDF
11:25 - 12:00Dimensionality Reduction and Anomaly DetectionMark Crovella, Boston University11th Floor Lecture Hall
12:00 - 1:45Break for Lunch
1:45 - 2:20Towards an Algebraic Network Information TheoryBobak Nazer, Boston University11th Floor Lecture Hall
PDF
2:25 - 3:00Challenges of working with large networksGábor Csárdi, Harvard University11th Floor Lecture Hall
PDF
3:00 - 5:00Free for discussion and collaboration