Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
Line 1: Line 1:
 
== Smart-Meter Security ==
 
== Smart-Meter Security ==
  
'''DATE:'''  Monday 23 October 2017
+
'''DATE:'''  Monday 13 November 2017
  
 
'''LOCATION:'''  Kristen Nygaards sal (room 5370), Ole Johan Dahl's House.
 
'''LOCATION:'''  Kristen Nygaards sal (room 5370), Ole Johan Dahl's House.
Line 7: Line 7:
 
'''AGENDA:'''
 
'''AGENDA:'''
  
15:30h Welcome at IFI
+
14:00h Welcome at IFI
  
15:45h Talk: ''Security analysis of a large (1 million+) smart meter infrastructure''
+
14:15h Talk: ''Web of trust: main features of a computational notion of trust''
  
16:45h Discussion
+
15:00h Discussion
  
  
'''SPEAKER:''' Sujeet Shenoi (University of Tulsa)
+
'''SPEAKER:''' Mirko Tagliaferri ( University of Urbino, Italy)
  
 
'''ABSTRACT:'''
 
'''ABSTRACT:'''
An advanced metering infrastructure is an integrated system of smart meters, communications networks and data management systems designed to support the safe, efficient and reliable distribution of electricity while providing advanced functionality to energy customers. Unfortunately, sophisticated cyber attacks on advanced metering infrastructures are a clear and present danger. The most devastating scenario involves a computer worm that traverses advanced metering infrastructures and permanently disables millions of smart meters.  This presentation describes a security analysis of an advanced metering infrastructure comprising more than one million smart meters, 100+ data collectors and two meter data management systems. Specifically, it provides detailed evaluations of the attack surface, targets -- especially the critical data collectors -- and their functionality, and possible attacks and their impacts. The systematic identification of each target and its functionality, and possible attacks and their direct impacts, are essential to understanding the security landscape as well as specifying and prioritizing mitigation efforts as part of a robust risk management program.  Although this work is based on an analysis of one large advanced metering infrastructure, strong attempts have been undertaken to extract and articulate the commonalities when describing the attack surface, targets, possible attacks and their impacts.  Thus, the results can be used as a foundation upon which the unique aspects of an advanced metering infrastructure can be added to create a robust risk management program geared for the specific deployment.
+
Since Marsh (1994) seminal work, many papers have been published on formal notions of trust. Each formalism often focuses on specific features of trust (e.g. the way trust is transmitted between agents) to obtain formal notions that can be applied in a computational framework. What is lacking, however, is a cohesive and comprehensive study of the notion of computational trust, one that singles out all the main features a computational notion of trust ought to possess. In this talk I will give a broad review of the current literature on computational trust, highlighting common features that the different notions of trust possess in those different formalism. The aim of the talk is to identify and make explicit all the features that are believed to be fundamental for a computational notion of trust. This should provide a starting base for a cohesive future research on trust in computational frameworks.
 
 
  
 
'''SPEAKER BIO:'''
 
'''SPEAKER BIO:'''
Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma; and a member of the technical staff at Johns Hopkins University Applied Physics Laboratory, Laurel, Maryland.  An active researcher with specialties in cyber security, cyber operations, critical infrastructure protection and digital forensics, Dr. Shenoi works on exciting “problems” ranging from helping solve homicides to penetrating telecommunications systems, oil and gas pipelines, wind farms and voting machines.  Dr. Shenoi is the Editor-in-Chief of the International Journal of Critical Infrastructure Protection (Elsevier); and Editor of the Advances in Digital Forensics and Critical Infrastructure Protection (Springer) series, now in their thirteenth and eleventh volumes, respectively.  He spearheads the University of Tulsa's elite Cyber Corps Program that trains “MacGyvers” for U.S. government agencies, and is the Director of the Cyber Security Education Consortium, a National Science Foundation ATE Center that is building a high-tech workforce in the Southwestern United States. For his innovative strategies integrating academics, research and service, Dr. Shenoi was named the 1998-1999 U.S. Professor of the Year by the Carnegie Foundation.
+
T.B.A
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"

Revision as of 21:24, 3 November 2017

Smart-Meter Security

DATE:  Monday 13 November 2017

LOCATION:  Kristen Nygaards sal (room 5370), Ole Johan Dahl's House.

AGENDA:

14:00h Welcome at IFI

14:15h Talk: Web of trust: main features of a computational notion of trust

15:00h Discussion


SPEAKER: Mirko Tagliaferri ( University of Urbino, Italy)

ABSTRACT: Since Marsh (1994) seminal work, many papers have been published on formal notions of trust. Each formalism often focuses on specific features of trust (e.g. the way trust is transmitted between agents) to obtain formal notions that can be applied in a computational framework. What is lacking, however, is a cohesive and comprehensive study of the notion of computational trust, one that singles out all the main features a computational notion of trust ought to possess. In this talk I will give a broad review of the current literature on computational trust, highlighting common features that the different notions of trust possess in those different formalism. The aim of the talk is to identify and make explicit all the features that are believed to be fundamental for a computational notion of trust. This should provide a starting base for a cohesive future research on trust in computational frameworks.

SPEAKER BIO: T.B.A

AFSecurity is organised by the University of Oslo SecurityLab Logo-UiO-SecurityLab-colour.jpg