Welcome to Etherpad!

This pad text is synchronized as you type, so that everyone viewing this page sees the same text. This allows you to collaborate seamlessly on documents!

Get involved with Etherpad at http://etherpad.org


TOPICS OF DISCUSSION:
    ================================================================================================
    
    
    if focus is on cybersecurity in networks:
if the project was developed differently: 
distinction between characterization vs design people
Drawing parallels between the clean slate approach and game changing technologies
Privacy Red team?

PEOPLE TO INVITE:
        ================================================================================================


chat with:
    Christopher Yoo
    

Fred Schneider
Jen Rexford:

    
    Measurement Oriented Security:
    


How about the UPenn people: what exactly are they working on (cybersecurity and differential privacy)

Vyas Sekar - CMU - middle boxes

Sharon Goldberg


David Clark

Alex Halderman

Stephanie Forest - UNM, computer security, bioengineered stuff and awareness of internet governance issues

Avi Rubin - Hopkins, firewalls

Rebecca Wright - discrete math, Rutgers

Joan Feigenbaum

Mutu also atRutgers



Notes of Meeting with Jen Rexford (amazing meeting)

Niksun Company -> Walter Willinger (also teaching a course this year on cybersecurity)



Notes from Walter Willinger Slides:
    
    Terminology:
        
        Dwell Time:
            The objective is to reduce dwell time and to identify damage done. It is about being able to account for the damage. 
            
            
        The attacker model:
            
            The life-cycle of the attacker is often described through the "intrusion kill chain":
            
            
            Sings of APT activities:
            
            
            Do we assume a strategic attacker: the gaming technologies propose using behavioral analysis to identify malicious/abnormal behavior, deception to attract attackers, and obfuscation to make their lives harder. What are the assumptions about the attacker's skill set: could they not employ adversarial algorithms, obfuscation, and deception themselves? 
            




Where do attacks come from?

According to Walter:
The role of visualization: