Jelena Mirkovic (USC Information Sciences Institute)

Cybersecurity and privacy research is of critical importance to keep our nation and our infrastructure safe, and to protect intellectual progress broadly across scientific disciplines of national importance. Reproducible experimentation in common, easy-to-use environments, with public datasets, is essential for accelerated progress in cybersecurity and privacy research. For too long our adversaries have exploited our cyber infrastructure largely undeterred, while our research has remained opportunistic. It is performed piecemeal, using tools, datasets, and equipment available to a given research lab, often in isolation from other related work and often on much simplified versions of larger, interdependent systems. In this talk I will report on our recently held Cybersecurity experimentation workshop (Dec 14, 2022), and findings from the community discussions around needs for future cybersecurity experimentation.

Speaker's biography

Jelena Mirkovic is Research Team Leader at USC Information Sciences Institute and research associate professor of Computer Science at USC. During her professional career she published more than 100 conference and journal papers, and the first book on the denial-of-service attacks. She also pioneered use of testbeds in cybersecurity education. Her research interests span networking, security and education. Her current research is focused on denial-of-service attacks, phishing, user authentication, user privacy and cybersecurity education.

View More Papers

Lightning Community Shout-Outs to:

(1) Jonathan Petit, Secure ML Performance Benchmark (Qualcomm) (2) David Balenson, The Road to Future Automotive Research Datasets: PIVOT Project and Community Workshop (USC Information Sciences Institute) (3) Jeremy Daily, CyberX Challenge Events (Colorado State University) (4) Mert D. Pesé, DETROIT: Data Collection, Translation and Sharing for Rapid Vehicular App Development (Clemson University) (5) Ning…

Read More

Towards Automatic and Precise Heap Layout Manipulation for General-Purpose...

Runhao Li (National University of Defense Technology), Bin Zhang (National University of Defense Technology), Jiongyi Chen (National University of Defense Technology), Wenfeng Lin (National University of Defense Technology), Chao Feng (National University of Defense Technology), Chaojing Tang (National University of Defense Technology)

Read More

Experimental Evaluation of a Binary-level Symbolic Analyzer for Spectre:...

Lesly-Ann Daniel (CEA List), Sébastien Bardin (CEA List, Université Paris-Saclay), Tamara Rezk (INRIA)

Read More