CODASPY 2017 Keynotes


Research Issues and Approaches for Connected and Automated Vehicles

Abstract:

Driverless and/or environment-friendly cars have recently received a great deal of attention from media and almost all industry and government sectors due mainly to their great potential impacts on safety, economy, and environments. In particular, enabling vehicles to communicate with one another via wireless devices holds the potential to automate vehicles while dramatically improving safety, reducing congestion, and conserving energy. To move toward realization of this potential, we have been conducting research into various issues, including:

  • Automation of vehicle sensing and control;
  • Vehicle safety and passenger comfort;
  • Securing information communication and computation;
  • Developing environment-friendly solutions. 

In this talk, I will discuss various issues and approaches related to security of connected and automated vehicles. 

Bio:

KANG G. SHIN is the Kevin & Nancy O'Connor Professor of Computer Science  in the Department of Electrical Engineering and Computer Science, The University of Michigan, Ann Arbor. His current research focuses on QoS-sensitive computing  and networking as well as on embedded real-time and cyber-physical systems.

He has supervised the completion of 78 PhDs, and authored/coauthored more than 850 technical articles, one a textbook and more than 30 patents or invention disclosures, and received numerous best paper awards, including the Best Paper Awards from the 2011 ACM International Conference on Mobile Computing and Networking (MobiCom’11), the 2011 IEEE International Conference on Autonomic Computing, the 2010 and 2000 USENIX Annual Technical Conferences, as well as the 2003 IEEE Communications Society William R. Bennett Prize Paper Award and the 1987 Outstanding IEEE Transactions of Automatic Control Paper Award. He has also received several institutional awards, including the Research Excellence Award in 1989, Outstanding Achievement Award in 1999, Distinguished Faculty Achievement Award in 2001, and Stephen Attwood Award in 2004 from The University of Michigan (the highest honor bestowed to Michigan Engineering faculty); a Distinguished Alumni Award of the College of Engineering, Seoul National University in 2002; 2003 IEEE RTC Technical Achievement Award; and 2006 Ho-Am Prize in Engineering (the highest honor bestowed to Korean-origin engineers). 

He has chaired several major conferences, including 2009 ACM MobiCom, 2008 IEEE SECON, 2005 ACM/USENIX MobiSys, 2000 IEEE RTAS,  and 1987 IEEE RTSS. He is the fellow of both IEEE and ACM, and served on editorial boards, including IEEE TPDS and ACM Transactions on Embedded Systems. He has also served or is serving on numerous government committees, such as the US NSF Cyber-Physical Systems Executive Committee and  the Korean Government R&D Strategy Advisory Committee. He has also co-founded a couple of startups.


The Human Capital Model for Security Research: Adventures in Tech Transition

Abstract:

As a security researcher, have you ever wondered how much of security research that is done and presented at research conferences is ever used by practitioners or is incorporated into products? Four years ago we formed a team with diverse backgrounds and embarked on a systematic study on the question of which technological solutions would security practitioners actually use if we built them.To carry this out program, we embedded our students who worked inside several Security Operation Centers (SOCs) both in universities and corporations, to learn how security solutions get used in reality. Previous efforts at improving the efficiency of SOCs have emphasized building tools for analysts or understanding the human and organizational factors involved, but they have not significantly changed the status quo – solutions are built or bought but seldom used. This was because these efforts did not view these solutions from multiple contextual perspectives of the local participants, the analysts and their managers. After some initial failures, we realized that this kind of study is beyond the reach of conventional Computer Science approaches, so we worked with a Professor in Socio-cultural Anthropology to get a fresh look at the problem and get a new set of tools to use in our research. In our 4-year project we have used Anthropological fieldwork methods to study SOCs and in the process uncovered inherent contradictions between the multiple objectives a SOC has to meet as an organization and the conflicts between the goals of the human participants. This discovery was guided by Activity Theory, a theory proposed by the famous social scientist Y. Engestrom, which provides a framework for analyzing such kinds of fieldwork data. We discovered that successful SOC innovations must continually resolve the extant conflicts to be effective in improving operational efficiency. Our analysis provides evidence of the importance of conflict resolution as a prerequisite for operations improvement, both process and technological. It also enabled us to understand the fundamental challenge in security research, namely, why some innovations work well in SOCs while others fail. It also helped us devise a potentially successful and repeatable mechanism for introducing new technologies to future SOCs.

In this talk, we will detail the important insights we gained in the course of this project so that the security research community may benefit from them and even incorporate these new tools. We will also present examples of the challenges faced by commercial manufacturers in designing security into their products and our ongoing work on using these insights to address these challenges in innovative ways that seem to fare better than previous attempts.

This is based partially on joint work with Professors Xinming Ou (Southern Florida University Computer Science Department), Michael Wesch (Kansas State University Department of Anthropology), and John McHugh (Dalhousie University and RedJack, Inc, Retired) as well as their graduate students, Sathya Chandran Sundaramurthy and Alexandru Bardas.

Bio:

S. RAJ RAJAGOPALAN is a Senior Principal Research Scientist at Honeywell Labs where he leads the Product cyber security research effort aimed at designed-in security for Honeywell’s vast control system product portfolio. His research interests include all aspects of Computer Security, including Software Engineering techniques for training software development teams in security practices, especially in the context of product manufacture. In collaboration with Computer Science Prof. Simon Ou (University of South Florida) and Anthropology Professor Mike Wesch of Kansas State University, he has been involved in a five-year study of several Security Operations Centers across universities and corporations on why it is so hard to make security tools that actually get used. He also leads an initiative to enable more academic research to the areas of cyber security and personal privacy for modern buildings management systems. Dr. Rajagopalan has a PhD in Computer Science from Boston University, and a B.Tech. in Computer Science and Engineering from the Indian Institute of Technology at Mumbai.  His non-academic interests include music, water-conservation techniques, and backyard gardening.