Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
Line 1: Line 1:
==Challenges in Learning from Behaviour==
+
== ''Advanced Metering Infrastructures Security'' ==
 +
 
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''TIME:'''&nbsp; Friday 9 June 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
+
| '''TIME:'''&nbsp; Thursday 19 October 2023, 14:00h<br />'''PLACE:'''&nbsp;  Kristen Nygaards Hall, 5th floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
Coffee and snacks will be served.<br />
+
All interested are welcome. Coffee and snaks served.<br />
 
<br />'''AGENDA:'''<br />
 
<br />'''AGENDA:'''<br />
14:00h Welcome at IFI and AF''Security''<br />14:15 Invited talk<br />
+
14:00 Invited talk<br />
* TITLE: ''Challenges in Learning from Behaviour'' &nbsp;
+
* TITLE: ''Security Analyses of Four Large Advanced Metering Infrastructures'' &nbsp;
* SPEAKERS: David Aspinall and Robert Flood, University of Edinburgh
+
* SPEAKER: Prof. Sujeet Shenoi, University of Tulsa, USA
| <center>[[File:photo-David-Aspinall.jpg|90px|link=https://homepages.inf.ed.ac.uk/da/]]<br />David Aspinall</center>
+
| <center>[[File:photo-Sujeet-Shenoi.jpg|150px|link=https://faculty.utulsa.edu/faculty/sujeet-shenoi/]]</center>
| <center>[[File:photo-Robert-Flood.jpg|110px|link=https://www.linkedin.com/in/robert-flood-0a2637197/]]<br />Robert Flood</center>
+
| <center>[[File:Logo-Tulsa.jpg|150px|link=https://utulsa.edu/]]</center>
| <center>&nbsp;&nbsp;[[File:logo-Univ-Edinburgh.png|120px|link=https://www.ed.ac.uk/]]</center>
 
 
|}
 
|}
* ABSTRACT:<br />Artificial Intelligence and Machine Learning are promoted as solutions for cyber security which can adapt to changes in attacker behaviour, learning models from data to distinguish what is normal and what may consitute a threatDespite much research, there are still fundamental challenges in each stage of the process which prevent us having good benchmarks to understand the robustness of state-of-the-art models.  The challenges span: collecting and sharing data safely, ensuring a sufficient fidelity and diversity of data, and then understanding model performanceWe will consider these challenges in turn and present some recent research results which address each aspect.  Under the second challenge, we will introduce some work-in-progress on identifying "bad smells" for cyber security datasets used for training.<br />
+
* ABSTRACT:<br />An advanced metering infrastructure is an integrated system of smart meters, communications networks and data management systems that support the safe, efficient and reliable distribution of electricity while providing advanced functionality to energy customers. Unfortunately, sophisticated cyber attacks on advanced metering infrastructures are a clear and present dangerA chilling scenario involves a computer worm that traverses advanced metering infrastructures, shuts off power and permanently disables millions of smart meters.<br /><br />This presentation describes the results of security analyses of four large advanced metering infrastructures, one  with a point-to-multipoint topology and three with mesh topologies.  The research articulates the attack surfaces of the point-to-multipoint and mesh advanced metering infrastructures. Additionally, it identifies potential targets, and describes novel attacks on principal components in the four advanced metering infrastructures. Finally, the research clarifies the security impacts of attacks enabled by physical access, along with techniques for mitigating the attacksWhile the attacks, impacts and mitigation techniques pertain to the four advanced metering infrastructures in the case study, they are relevant to advanced metering infrastructures in general.
 +
 
 +
<br />15:00 Discussion<br />
  
'''BIO:''' &nbsp;  
+
'''BIO:''' &nbsp; Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, OklahomaAn active researcher with specialties in cyber security, cyber operations, critical infrastructure protection and digital forensics, Dr. Shenoi works on exciting “problems” ranging from helping solve homicides to penetrating telecommunications systems, oil and gas pipelines, wind farms and voting machines. He spearheads the University of Tulsa's elite Cyber Corps Program that trains “MacGyvers” for U.S. government agencies. For his innovative strategies integrating academics, research and service, Dr. Shenoi was named the 1998-1999 U.S. Professor of the Year by the Carnegie Foundation.
<br />David Aspinall is Professor of Software Safety and Security at the University of EdinburghHe is Director of the University's UK government recognised Academic Centre of Excellence in Cyber Security Research and was a Fellow of the Alan Turing Institute from 2015-2021.
 
His research interests range from foundations for formal methods in software security to more applied areas including anomaly detection in network security.
 
 
Robert Flood is a PhD student in the University of Edinburgh where he previously studied for an MSc in Computer Science. His PhD primarily focuses on synthetic data generation for training anomaly detection systems. He has also worked with cyber security data anonymisation and software  correctness with The Turing Institute and The University of Edinburgh.
 
  
 +
 
 +
<br /><br />
  
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
|-
 
|-
 
| [[File:AFSecurity-small.png|250px]]
 
| [[File:AFSecurity-small.png|250px]]
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/english/research/groups/sec/ Digital Security].
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
 
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Revision as of 08:18, 4 October 2023

Advanced Metering Infrastructures Security

TIME:  Thursday 19 October 2023, 14:00h
PLACE:  Kristen Nygaards Hall, 5th floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00 Invited talk

  • TITLE: Security Analyses of Four Large Advanced Metering Infrastructures  
  • SPEAKER: Prof. Sujeet Shenoi, University of Tulsa, USA
Photo-Sujeet-Shenoi.jpg
Logo-Tulsa.jpg
  • ABSTRACT:
    An advanced metering infrastructure is an integrated system of smart meters, communications networks and data management systems that support the safe, efficient and reliable distribution of electricity while providing advanced functionality to energy customers. Unfortunately, sophisticated cyber attacks on advanced metering infrastructures are a clear and present danger. A chilling scenario involves a computer worm that traverses advanced metering infrastructures, shuts off power and permanently disables millions of smart meters.

    This presentation describes the results of security analyses of four large advanced metering infrastructures, one with a point-to-multipoint topology and three with mesh topologies. The research articulates the attack surfaces of the point-to-multipoint and mesh advanced metering infrastructures. Additionally, it identifies potential targets, and describes novel attacks on principal components in the four advanced metering infrastructures. Finally, the research clarifies the security impacts of attacks enabled by physical access, along with techniques for mitigating the attacks. While the attacks, impacts and mitigation techniques pertain to the four advanced metering infrastructures in the case study, they are relevant to advanced metering infrastructures in general.


15:00 Discussion

BIO:   Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Oklahoma. An active researcher with specialties in cyber security, cyber operations, critical infrastructure protection and digital forensics, Dr. Shenoi works on exciting “problems” ranging from helping solve homicides to penetrating telecommunications systems, oil and gas pipelines, wind farms and voting machines. He spearheads the University of Tulsa's elite Cyber Corps Program that trains “MacGyvers” for U.S. government agencies. For his innovative strategies integrating academics, research and service, Dr. Shenoi was named the 1998-1999 U.S. Professor of the Year by the Carnegie Foundation.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png