Jelena Mirkovic (USC Information Sciences Institute)

Cybersecurity and privacy research is of critical importance to keep our nation and our infrastructure safe, and to protect intellectual progress broadly across scientific disciplines of national importance. Reproducible experimentation in common, easy-to-use environments, with public datasets, is essential for accelerated progress in cybersecurity and privacy research. For too long our adversaries have exploited our cyber infrastructure largely undeterred, while our research has remained opportunistic. It is performed piecemeal, using tools, datasets, and equipment available to a given research lab, often in isolation from other related work and often on much simplified versions of larger, interdependent systems. In this talk I will report on our recently held Cybersecurity experimentation workshop (Dec 14, 2022), and findings from the community discussions around needs for future cybersecurity experimentation.

Speaker's biography

Jelena Mirkovic is Research Team Leader at USC Information Sciences Institute and research associate professor of Computer Science at USC. During her professional career she published more than 100 conference and journal papers, and the first book on the denial-of-service attacks. She also pioneered use of testbeds in cybersecurity education. Her research interests span networking, security and education. Her current research is focused on denial-of-service attacks, phishing, user authentication, user privacy and cybersecurity education.

View More Papers

Fusion: Efficient and Secure Inference Resilient to Malicious Servers

Caiqin Dong (Jinan University), Jian Weng (Jinan University), Jia-Nan Liu (Jinan University), Yue Zhang (Jinan University), Yao Tong (Guangzhou Fongwell Data Limited Company), Anjia Yang (Jinan University), Yudan Cheng (Jinan University), Shun Hu (Jinan University)

Read More

OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable encryption

Zhiqiang Wu (Changsha University of Science and Technology), Rui Li (Dongguan University of Technology)

Read More

A Security Study about Electron Applications and a Programming...

Zihao Jin (Microsoft Research and Tsinghua University), Shuo Chen (Microsoft Research), Yang Chen (Microsoft Research), Haixin Duan (Tsinghua University and Quancheng Laboratory), Jianjun Chen (Tsinghua University and Zhongguancun Laboratory), Jianping Wu (Tsinghua University)

Read More

Sometimes, You Aren’t What You Do: Mimicry Attacks against...

Akul Goyal (University of Illinois at Urbana-Champaign), Xueyuan Han (Wake Forest University), Gang Wang (University of Illinois at Urbana-Champaign), Adam Bates (University of Illinois at Urbana-Champaign)

Read More