the center for security technologiesjao/talks/csttalks/ndta.pdf · 2004-06-10 · dr. sharon nunes...

Post on 14-Aug-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

The Center for Security Technologies

Ronald S. IndeckThe Das Family Distinguished Professor

CST Director

Washington University and theCenter for Security Technologies

Washington UniversityUSNWR: highly ranked nationally, top 10 in endowment8 Schools: Medicine, Social Work ranked in the top 3SEAS: 6 departments including ESE and CSE

CSTInterdisciplinary Academic Research CenterFormed early 2002Built on existing strengthsin security research

CST Mission

To advance through research in basic science, mathematics, and engineering those areas which can most directly improve security including:

physical aspects of security (intrusion detection, biological and chemical substance identification) information aspects of security (networking, information awareness, and information theory)law, economics, public policy

CST Scope

An interdisciplinary center40 faculty from five schoolsMore than cybersecurityMore than counterterrorism

A variety of ‘attacks’ including natural disastersIntegrate research through testbeds

Synergy between technology and policyPrivacy/public policy as ‘design criteria’

Scientific and Technological Intellectual Thrusts

Sensors: IndeckAdvanced Electronic Systems: LockwoodInformation-Theoretic Signal and Image Processing: SnyderRecognition Theory and Systems: O’SullivanVision for Security: PlessDistributed and Mobile Systems: GillNetwork and Information Security: HegdeDetection, Isolation, and Accommodation of Faults: IsidoriPrivacy, Public Policy, and Economics: Kieff

Engineering Demonstration Testbeds

Systems IntegrationEnd-to-end Demonstrations

Biometrics/Physics-Based Recognition Systems: MorleySearching Massive Databases for Critical Information: ChamberlainNetworks of Video Cameras: PlessHigh Speed Network Security: LockwoodSecurity of the Food and Water Supply: Smith

Roles of Privacy, Economics, and Policy

Example: Document Authentication

Important documentsAirline tickets, passports, checks, currency, government issued IDs, product labels

Use magnetic signatures to authenticatePhysical phenomena, sensor, signal

How to authenticateAlgorithms, sampling, confidence

Implement the systemElectronics, data management

Exploit Fundamental Science

Using magnetic signatures for:Tamper-evidence for containersPhysical access/bank cardsSoftware protectionDetect manipulation of data. . .

Related Recognition Systems

What to authenticate?Consider biometric:FingerprintingVoice authentication. . .

Recognition systems share commonalitiesFramework, performance analysis

Another Example/Opportunity:Data Explosion

Humanoids have produced 12 Exabytes over the past ~30,000 years (12,000,000,000,000,000,000 Bytes)We will generate next 12 Exabytes in just over a year!US intelligence collects data equaling the printed collection of the US library every day!

Fast, inexpensive searches for changing databases200 times faster than conventional searchesScalable, using conventional drivesSearch need not be exactReduced bus demands

Wide applicabilityIntelligenceImagesGenomics

Intelligent Searching ofMassive Databases

DataSearch Systems, Inc.

Hard drive

Processor

Memory

I/O Bus

Reconfigurable hardware

Memory/processing

Memory Bus

Data Transmission

120 TBytes/sec internet peak rate120 PBytes/month Internet100 PBytes/month telephone

Network Watchman

Electronic postmendirect packets to destination via headers

Secure networkwatch headersview payloadcopy/redirect/stop packets

Digital Array Scanning Interferometer (DASI)

Applications to:Food supply

Transportation

Mail

Currency

. . .

Smart Borders – Smart Cameras

Mission Critical Areas

1. Intelligence and warning2. Border and transportation security3. Domestic counterterrorism4. Protecting critical infrastructure5. Defending against catastrophic threats6. Emergency preparedness and response

CST’s Strengths Support the National Security Agenda

Department ofHomeland Security

“The Department will have a clear, efficient organizational structure with four divisions:

1. Border and Transportation Security2. Emergency Preparedness and Response3. Chemical, Biological, Radiological, and Nuclear

Countermeasures4. Information Analysis and Infrastructure

Protection”CST addresses many Science and Technology

issues of the Homeland Security Act

CST Funding/Collaborationsdeveloped and developing

NSF, DoEdARO, DARPA, ONRCIA, FBI, NSANIST – ATPBattelle, SRIBoeing, CSFB, Monsanto, SBC . . . AccessDenied, BECS, Brick, Cernium, Global Velocity, Hackett Security, Mass Sensors, Newberry Group, NVE . . .

CST External Advisory Board

Mr. Earle Harbison (retired President and COO, Monsanto), ChairDr. Massoud Amin (Director of Infrastructure Security, EPRI)Dr. Allen Atkins (VP, Boeing)Dr. Tony Cantu (Chief Scientist, US Secret Service)Prof. Jerry Cox (Senior Professor, Washington University)Col. Tim Daniel (Director, Missouri Office of Homeland Security)Mr. Will Eatherton (Chief Architect, Cisco)Dr. Mark Kryder (CTO, Seagate Technologies)Mr. Jerry McElhatton (President GTO, MasterCard International)Dr. Craig Mundie (CTO, Microsoft)Dr. Sharon Nunes (Director, IBM)Dr. Joe Leonelli (Director, Battelle)Ms. Jan Newton (President TX, SBC)Gen. Tony Robertson, (Fmr. Com. in Chief, Air Mobility Command)Dr. Don Ross (Chairman, Ross and Baruzzini: Cernium)Hon. William Webster (retired Director, CIA and FBI)

CST’s Unique Strengths

Broad Range of Research and ApplicationsSensors through signal processing to implementationsSecurity of food, water, access, network, bordersMore than cybersecurity

Synergy between Technology and PolicySystems Integration

Center for Security Technologies

Established critical mass in security technologiesMany complementary projectsWidespread applicationsFundamental scientific and engineering issuesGuiding standards and impact policyUniquely integrating economic and privacy issuesSynergy between WUSTL, region, and nation

Comprehensive Scientific and Comprehensive Scientific and Engineering ResourceEngineering Resource

Center for Security Technologies

www.cst.wustl.edu

CST Membership Benefits

Access to Laboratories, Professors, and StudentsEarly Access to Intellectual Property and Technology DevelopmentAbility to Conduct/Direct Research On-SiteSynergistic Collaboration with Other Companies on Precompetitive ResearchAccess to Students for Employment

Co-op and Post-Graduate

CST Membership Benefits

Rapid PrototypingAccess Unique, Large Experimental / Computational FacilitiesInput to Technical ReportsAnnual Progress ReportsBiannual Briefings

May and January

Technology Transfer

Wavelet-Based Compression for Fingerprint ID (AFIS)Magnetic Signature DevelopmentAutomatic Target RecognitionHigh Speed Network Content Matching

Ongoing/Developing Research

Intelligent Searching of Massive DatabasesSensor NetworksNetwork and Data SecuritySecure Code DevelopmentSecurity of the Food, Mail, and CurrencyVision for SecurityBiometric-Based AuthenticationPublic Policy

Sensor Networks

Networks of SensorsSensing, communication, control

Intelligently Combine Data from Multiple SensorsPotentially widely distributed

Communication Strategies and ProtocolsCompression, localization, wireless

Control of SensorsAsynchronous communicationSensor parameters

Networks of Distributed Sensors

Existing or Future Sensor NetworksNetworks of Sensors

Waterway: detect pollution, bioterrorism, chemical spillsBuilding: fire, temperature, other agentsCameras: dynamically reconfigureCommunicate problems, identify sourceReal-time response to evolving situations

BECS Engineering

X-ray Scanning and Security Imaging

Conventional Transmission

Scanning at Borders/Airports

Low Energy Backscattered

Behavior Analysis

Network of Video Cameras

Missouri RapidScreenLicense Plate ID System

consider sniper case

Privacy, Public Policy, and Ethics

Societal Issues, Security-Privacy Perception and RealityEconomic Issues, Cost-Benefit Analysis Legal IssuesTechnological Solutions to Privacy IssuesFacilitate Discourse on Technology and Its Implications

top related