{"588458":{"#nid":"588458","#data":{"type":"event","title":"Cybersecurity Lecture Series - Brandon Eames","body":[{"value":"\u003Ch3\u003E\u003Cstrong\u003EMeet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies. \u003C\/strong\u003E\u003C\/h3\u003E\r\n\r\n\u003Cp\u003EThe \u003Cstrong\u003ECybersecurity Lecture Series\u003C\/strong\u003E is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EHeld \u003Cstrong\u003Eweekly each Friday at Noon\u003C\/strong\u003E \u003Cstrong\u003Ethrough Apr. 21,\u003C\/strong\u003E lectures are open to all -- students, faculty, industry, government, or simply the curious. Graduate students may register for credit under seminar course CS-8001-INF.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003EComplimentary lunch provided for registered guests. Please bring your own beverage.\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/cyber-lecture\u0022 target=\u0022_blank\u0022\u003E\u003Cem\u003ESign up to receive future lecture announcements.\u003C\/em\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Ch4\u003E\u003Cstrong\u003EFeaturing Brandon Eames of Sandia National Labs on April 14, 2017\u003C\/strong\u003E\u003C\/h4\u003E\r\n\r\n\u003Ch3\u003E\u003Cstrong\u003E\u003Cem\u003E\u0026quot;On Trust Analysis for Microelectronics-Based Systems\u0026quot;\u003C\/em\u003E\u003C\/strong\u003E\u003C\/h3\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/iisp.gatech.edu\/register-cybersecurity-lecture-series-apr-14\u0022 target=\u0022_blank\u0022\u003E\u003Cstrong\u003E\u003Cem\u003ERSVP\u003C\/em\u003E\u003C\/strong\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EMicroelectronics-based systems pervade modern society, from small mobile devices, to vehicle automation, to large-scale data centers, to military systems.\u0026nbsp; We depend on these systems not only for logistics and communication, but increasingly for safety and security.\u0026nbsp; Unfortunately, the pervasiveness of software-based exploits of commercial enterprises exposes the broad question of whether microelectronics-based systems can be\u0026nbsp;\u003Cem\u003Etrusted\u003C\/em\u003E\u0026nbsp;to perform their intended function when called upon.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe trust issue is pervasive and has proven elusive to structured science and engineering approaches that aspire to deflect malicious alterations.\u0026nbsp; In the absence of a system science supporting trust, developers employ opinion-based risk assessments, red team analysis, and system access denial to increase confidence that systems will perform as intended.\u0026nbsp; Confidence is purchased via certification, waiver and opinion-based analysis rather than quantifiable, engineering-based approaches to evaluate and endow trust.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn this presentation, we discuss the problem of trust and trust analysis, motivated in the context of microelectronics based system development.\u0026nbsp; We discuss tools and techniques that have been developed for evaluating system security, and show their applicability for evaluating trustworthiness of microelectronics based systems. Specifically, we discuss RIMES (Risk Informed Management of Enterprise Security), a relative risk assessment based technique for evaluating security that has been recently applied to trust evaluation.\u0026nbsp; We present a game theoretic technique for evaluating the effectiveness of moving target defenses called PLADD (Probabilistic, Learning Attacker, Dynamic Defender), and discuss its applicability as a basis for trust evaluation.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EBrandon Eames\u003C\/strong\u003E is a principal member of the technical staff at Sandia National Laboratories.\u0026nbsp; At Sandia, Dr. Eames engages in pioneering research in the area of trust and trusted development for national security systems.\u0026nbsp; He has led evaluation and assessment efforts for microelectronics based systems and tools for developing those systems, as well as ongoing research thrusts to develop foundational techniques to both evaluate and design for trust.\u0026nbsp; He merges expertise with low-level embedded and mobile software development, constraints-driven design space exploration, and hardware architecture to address national security concerns.\u0026nbsp; Prior to joining Sandia, Dr. Eames was an Assistant Professor of Electrical and Computer Engineering at Utah State University.\u0026nbsp; He graduated with a Ph.D. in Electrical Engineering from Vanderbilt University in 2005.\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Brandon Eames of Sandia National Labs discusses the problem of trust and trust analysis when developing microelectronics-based systems."}],"uid":"27490","created_gmt":"2017-03-08 18:22:14","changed_gmt":"2017-04-13 21:12:27","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-04-14T13:00:00-04:00","event_time_end":"2017-04-14T14:00:00-04:00","event_time_end_last":"2017-04-14T14:00:00-04:00","gmt_time_start":"2017-04-14 17:00:00","gmt_time_end":"2017-04-14 18:00:00","gmt_time_end_last":"2017-04-14 18:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"hg_media":{"538461":{"id":"538461","type":"image","title":"Cybersecurity Lecture Series","body":null,"created":"1464703200","gmt_created":"2016-05-31 14:00:00","changed":"1475895326","gmt_changed":"2016-10-08 02:55:26","alt":"Cybersecurity Lecture Series","file":{"fid":"89506","name":"cls_email_header.jpg","image_path":"\/sites\/default\/files\/images\/cls_email_header.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/cls_email_header.jpg","mime":"image\/jpeg","size":461835,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/cls_email_header.jpg?itok=NPA_x_rn"}}},"media_ids":["538461"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"78751","name":"Undergraduate students"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ELindsey Panetta, \u003Ca href=\u0022mailto:lindsey.panetta@gtri.gatech.edu\u0022\u003Elindsey.panetta@gtri.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}