CSE Speaker Series – Urvashi Rau

On Friday, April 20 at 11:00 am in Cramer 221, Dr. Urvashi Rau of NRAO will give a talk on “Computing and Algorithms in Radio Interferometry”.

Abstract :   The National Radio Astronomy Observatory (NRAO) operates two imaging radio interferometers, the Very Large Array (VLA) in New Mexico and the Atacama Large Millimeter Array (ALMA) in Chile. Our teams do algorithm research as well as software design/development for observation preparation, data analysis tools, automated end-to-end data processing frameworks and archive management.  We are currently working towards complete automation of our existing algorithms and data processing chains, planning for a compute-heavy upgrade to ALMA in the next few years and working on the conceptual design of a new telescope in and around New Mexico that (if funded) would be about two orders of magnitude larger than the VLA.  In this talk I would like to introduce what we do, how each step of our data analysis and image reconstruction process connects to specific topics in computer science, and what our current and future algorithmic and computing challenges are.  Some of these topics may be appropriate for future collaborative R&D work between the NRAO and NMT.

Posted on .

CSE Faculty Candidate Suman Bhunia

On Wednesday, April 18 at 2:00 pm in Cramer 101, Suman Bhunia will give a presentation on “Survivability Against Intelligent Adversary in Next-Generation Wireless Networks”.


Abstract: The demand for wireless data rate is rising exponentially due to the advancement in mobile applications during last decade. As a result, the wireless industry is experiencing a fast paradigm shift from the static spectrum allocation to opportunistic dynamic spectrum access based cognitive radio (CR) networks (CRN). A CRN being next generation wireless networks inherits all the challenges of wireless and introduces some critical vulnerabilities due to the dynamic spectrum sensing coupled with the presence of malicious agents. A CRN makes autonomous, rational and intelligent decision for sensing, learning, and adaptation with the environment. In this battle for coexistence, the broadcasting and open nature of wireless transmission leave it open to jamming based Denial of Service (DoS) attacks. Inspired by the concept of honeypot in network security, we built CR-Honeynet, a framework that exploits the intelligence of an attacker and lures it to a decoy, while other legitimate communications bypass attacks. As a next step, the battle between defender and attacker is then modeled from a game-theoretic point of view, wherein both parties are intelligent and learn about heterogeneous channel utilities from history. The research is extended to attackers with the capability of moving in all three directions where smart and adaptive antenna is useful to avoid attacks spatially. A tracking based framework is proposed to minimize the risk of attacks while also minimizing link failure. Finally, a state-of-the-art testbed with off-the-shelf software defined radios, is developed to evaluate the performance of the proposed framework. This talk concludes with a brief discussion of future research areas in wireless security.

Posted on .

CSE Faculty Candidate – Constantinos Kolias

On Friday, April 6 at 11:00 am in Cramer 120, Constantinos Kolias will give a presentation on “Leveraging Electromagnetic Emissions to Detect Malicious Behavior in IoT”.

The Internet-of-Things (IoT) follows an exponential adoption rate and it is destined to revolutionize sectors such as health-care and manufacturing. The main building component of the IoT ecosystem is a set of miniature devices with communicating, sensing and actuating capabilities but very little processing power and memory size. The proliferation of IoT devices in combination with their capabilities-restricted nature has attracted the interest of evildoers. While novel, light-weight security protocols and standards targeting IoT are yet to be developed, the application of external protection mechanisms such as anti-malware or intrusion detection systems seems appealing but is practically impossible. In this talk we will describe a new protection paradigm that completely decouples the security monitoring process from the normal functionality of the protected systems. The core of our approach is to rely on the involuntary analog emissions across a variety of modalities, including power consumption, electromagnetic, and acoustic emissions to detect irregularities in the behavior of these devises. So far, for the majority of our experiments we took advantage electromagnetic emissions of the CPU to draw a baseline of the protected system’s normal operation and flag any deviation from it as an anomalous condition. The achieved results are near optimal when operating in a controlled laboratory environment. Yet, the application of this method in real-life environments is challenging due to the presence of noise. Towards this end we applied a popular a machine learning technique known as transfer learning to enhance our models with clean signals thus greatly improving our predictive accuracy.

Posted on .

CSE Faculty Candidate – Deepak Tosh

On Thursday, March 29 at 2:00, CSE Faculty Candidate Deepak Tosh will give a talk in MSEC 105. His talk will be on “Towards Enabling a Blockchain-based Cybersecurity Information Exchange Platform”.


Abstract: Rising rate of cyber criminal activities has caught the attention of everyone including industry, academia, federal institutions, and military agencies. The initiative to protect critical resources against advanced cyber attacks requires security investments and a collaborative effort from every organization. Therefore, a CYBersecurity information EXchange (CYBEX) framework is required to facilitate sharing of cyber-threat intelligence (CTI) among the participants (firms) to abate the impacts of cyber attacks. Since many firms hesitate to participate in the sharing framework, a non-cooperative CYBEX participation game is formulated to guide the firms (players) to strategically analyze if they are interested to participate in CYBEX or not. Through evolutionary analysis, it is found that the participation in CYBEX can be guided by wisely varying the participation cost. Although, incentives could help enhancing participation, integrity of the exchanged threat information and possibility of malicious insiders pose additional risks in implementing CYBEX. To alleviate these risks, the Blockchain can potentially come handy in enabling a trust layer for the CYBEX, which is being investigated and prototyped at present. The speaker will also discuss the focal points of his fundamental and applied Blockchain research across multiple application domains.

Posted on .

CSE Speaker Series – Antonio Gonzales

Antonio Gonzales from Sandia National Labs will be here on Friday, February 9 to discuss the coding challenge that will take place on Saturday, February 10 in Cramer 213 from 11:00-4:00.

He will also answer questions about internship opportunities at Sandia.