Organizing Committee
Abstract

The goal of this workshop is to bring mathematicians and cybersecurity practitioners together to outline the key challenges in the mathematics of cybersecurity data analysis. The expected outcome of the workshop will be a roadmap for investment in specific mathematical topics that will directly impact the advancement of the science of cybersecurity.

Mathematicians have long been involved in information security through cryptography, and thus algebra and number theory. But modern cyber security is a much larger field, and the perspectives and methodologies of other parts of the mathematical sciences have been only rarely been brought to bear. Given the complexity and dynamics of cyberspace it is essential to have a formal scientific basis for the field of cybersecurity. Indeed, a variety of sources have called for the creation of a "science of cybersecurity", and mathematical methods should play a critical role in such a science.

The purpose of this workshop is to bring together mathematical scientists and cybersecurity practitioners with expertise in several main areas, including especially high dimensional data analysis and cryptography, to establish a road map for bringing more mathematicians into the field of cybersecurity. Sharing our visions of near and far term goals of the field will be the highlight of the conference.

Confirmed Speakers & Participants

  • Speaker
  • Poster Presenter
  • Attendee
  • Virtual Attendee

Workshop Schedule

Wednesday, October 22, 2014
TimeEventLocationMaterials
9:35 - 9:45am EDTWelcome - Jill Pipher, ICERM11th Floor Lecture Hall 
9:50 - 10:25am EDTMultiscale Representation of High Dimensional Data - Linda Ness, Applied Communication Sciences11th Floor Lecture Hall
10:25 - 10:45am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:45 - 11:20am EDTMathematics and Machine Learning in Cybersecurity - Brian Witten, Symantec11th Floor Lecture Hall 
11:25 - 12:00pm EDTSome Research Problems and Areas in Cybersecurity and Privacy - Tristan Nguyen, US Air Force Office of Scientific Research11th Floor Lecture Hall
12:00 - 1:45pm EDTBreak for Lunch  
1:45 - 2:20pm EDTComputational Topology, Variable Kernel Density Estimators, and Fraud Detection - Michael Salpukas, Raytheon11th Floor Lecture Hall
2:25 - 3:00pm EDTMeasuring Internet Population (Good and Bad)- Measurement, Estimation, and Correlation - John Heidemann, University of Southern California11th Floor Lecture Hall
3:00 - 3:20pm EDTCoffee/Tea Break11th Floor Collaborative Space 
3:20 - 3:55pm EDTThe Transition to BGP Security- Is the Juice Worth the Squeeze? - Sharon Goldberg, Boston University11th Floor Lecture Hall 
4:00 - 4:45pm EDTBlack box cryptanalysis - Nadia Heninger, University of Pennsylvania11th Floor Lecture Hall 
4:15 - 5:00pm EDTDiscussion11th Floor Lecture Hall 
5:30 - 7:00pm EDTWelcome Reception11th Floor Collaborative Space 
Thursday, October 23, 2014
TimeEventLocationMaterials
9:00 - 9:10am EDTIntroduction - John Harer, Duke University11th Floor Lecture Hall 
9:10 - 9:45am EDTIntroduction to Topological Data Analysis and Machine Learning - John Harer, Duke University11th Floor Lecture Hall 
9:50 - 10:25am EDTObstructions to Compatible Extensions of Mappings. - Jose Perea, Duke University11th Floor Lecture Hall
10:25 - 10:45am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:45 - 11:20am EDTSemantics and Homotopy - Sanjeevi Krishnan, University of Pennsylvania11th Floor Lecture Hall
11:25 - 12:00pm EDTDiscrete Mathematical Approaches to Graph-Based Cyber Traffic Analysis - Cliff Joslyn, Pacific Northwest National Laboratory11th Floor Lecture Hall
12:00 - 1:45pm EDTBreak for Lunch  
1:45 - 2:20pm EDTTopological analysis of dynamic graphs for cyber network monitoring - Emilie Hogan, Pacific Northwest National Laboratory11th Floor Lecture Hall
2:25 - 3:00pm EDTMultiscale Analysis of graphs, on graphs, and time-varying graphs - Mauro Maggioni, Duke University11th Floor Lecture Hall
3:00 - 3:20pm EDTCoffee/Tea Break11th Floor Collaborative Space 
3:20 - 3:55pm EDTAuthentication Graphs - Aric Hagberg, Los Alamos National Laboratory11th Floor Lecture Hall
4:00 - 4:35pm EDTComputational and Statistical Trade-offs- Towards a Mathematical Framework - Daniel Sussman, Johns Hopkins University11th Floor Lecture Hall
4:45 - 5:20pm EDTIn Search of a Calculus of Trust - David Nicol, University of Illinois at Urbana-Champaign11th Floor Lecture Hall 
Friday, October 24, 2014
TimeEventLocationMaterials
9:00 - 9:10am EDTIntroduction - TBA11th Floor Lecture Hall 
9:10 - 9:40am EDTCreating Interpretable Collaborative Patterns to Detect Insider Threats - You Chen, Vanderbilt University11th Floor Lecture Hall 
9:50 - 10:25am EDTApplication of Belief Propagation for Detecting Advanced Persistent Threats (APT's) - Peter Chin, Boston University11th Floor Lecture Hall
10:25 - 10:45am EDTCoffee/Tea Break11th Floor Collaborative Space 
10:45 - 11:20am EDTA DHS Perspective on Mathematics in Cyber Security - Ann Cox, Department of Homeland Security11th Floor Lecture Hall
11:25 - 12:00pm EDTDimensionality Reduction and Anomaly Detection - Mark Crovella, Boston University11th Floor Lecture Hall 
12:00 - 1:45pm EDTBreak for Lunch  
1:45 - 2:20pm EDTTowards an Algebraic Network Information Theory - Bobak Nazer, Boston University11th Floor Lecture Hall
2:25 - 3:00pm EDTChallenges of working with large networks - Gábor Csárdi, Harvard University11th Floor Lecture Hall
3:00 - 5:00pm EDTFree for discussion and collaboration  

Lecture Videos

Semantics and Homotopy

Sanjeevi Krishnan
University of Pennsylvania
October 23, 2014

Some Research Problems and Areas in Cybersecurity and Privacy

Tristan Nguyen
US Air Force Office of Scientific Research
October 22, 2014