Jelena Mirkovic (USC Information Sciences Institute)

Cybersecurity and privacy research is of critical importance to keep our nation and our infrastructure safe, and to protect intellectual progress broadly across scientific disciplines of national importance. Reproducible experimentation in common, easy-to-use environments, with public datasets, is essential for accelerated progress in cybersecurity and privacy research. For too long our adversaries have exploited our cyber infrastructure largely undeterred, while our research has remained opportunistic. It is performed piecemeal, using tools, datasets, and equipment available to a given research lab, often in isolation from other related work and often on much simplified versions of larger, interdependent systems. In this talk I will report on our recently held Cybersecurity experimentation workshop (Dec 14, 2022), and findings from the community discussions around needs for future cybersecurity experimentation.

Speaker's biography

Jelena Mirkovic is Research Team Leader at USC Information Sciences Institute and research associate professor of Computer Science at USC. During her professional career she published more than 100 conference and journal papers, and the first book on the denial-of-service attacks. She also pioneered use of testbeds in cybersecurity education. Her research interests span networking, security and education. Her current research is focused on denial-of-service attacks, phishing, user authentication, user privacy and cybersecurity education.

View More Papers

Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey...

Mohit Kumar Jangid (The Ohio State University), Yue Zhang (Computer Science & Engineering, Ohio State University), Zhiqiang Lin (The Ohio State University)

Read More

DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement...

Seongil Wi (KAIST), Trung Tin Nguyen (CISPA Helmholtz Center for Information Security, Saarland University), Jihwan Kim (KAIST), Ben Stock (CISPA Helmholtz Center for Information Security), Sooel Son (KAIST)

Read More

Breaking and Fixing Virtual Channels: Domino Attack and Donner

Lukas Aumayr (TU Wien), Pedro Moreno-Sanchez (IMDEA Software Institute), Aniket Kate (Purdue University / Supra), Matteo Maffei (Christian Doppler Laboratory Blockchain Technologies for the Internet of Things / TU Wien)

Read More

VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests

Scott Jordan (University of California, Irvine), Yoshimichi Nakatsuka (University of California, Irvine), Ercan Ozturk (University of California, Irvine), Andrew Paverd (Microsoft Research), Gene Tsudik (University of California, Irvine)

Read More