Big data and increasingly capable computational systems are force-multipliers for several current, radical levelling, and emerging bioscientific and biotechnological approaches that are viable and of value in national security, intelligence, and defense operations. As well, big data methods and tools are being ever more widely utilized in civilian (public and commercial) enterprises that range from medicine to entertainment. The ubiquity of vast, multi-dimensional, -scalar, and -populational data, and the systems that store, process, and communicate these data are vulnerable to infiltration, manipulation, and disruption, and in these ways can be exploited to incur non-kinetic but nonetheless destructive effects in and across social, economic, political, and military domains.
CSIAC offers free webinars on a regular basis with experts in the technical subject areas of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management/Information Sharing.
This webinar provides an overview of Adversarial Machine Learning (AML), its relationship to Generative (Deep) Learning, and ways to view AML as a potential enabler for deploying more comprehensive system-level Machine Learning capabilities. The basic ideas driving AML and the system-level architecture needs of an effective integrated ML capability are compared to find areas of commonality and future utility beyond single-shot, algorithm-by-algorithm approaches to AML and remediation techniques.
Cyberphysical security challenges intersecting the Internet and the electricity grid – and therefore, all critical infrastructures – require multi-stakeholder public-private partnerships across the nation to protect against known clear and present dangers. Cyberphysical infrastructure testbeds must engage industry and the research community, address legacy complex system vulnerabilities, and integrate and test smart grid and mobility novel and known best practices.
Rust is a modern programming language that supports safe system programming with: compiler verified freedom from undefined behavior, support for building race-free multithreaded code, and ability to create abstractions needed for building large maintainable code bases. This presentation begins with a brief summary of Rust’s features and the needs that motivate them. It then focuses…
Hiring has always been a challenge, but the unique workload of software avionics, hardware integration, and cyber resiliency produce a unique situation that the U.S Air Force (USAF) has struggled with for years. In response to that growing need, the 76th Software Engineering Group (76 SWEG) responded with an approach to deliberately train a new hire to be cognizant of the vast USAF culture, dive deep into the technical facets of avionics and mission software development, and create the mentality to produce cyber-resilient products.
The SERA Method defines a systematic approach for evaluating cybersecurity risk in highly complex networked environments. This method uses a scenario-based approach to analyze how an attacker could leverage available attack vectors and technology vulnerabilities to compromise confidentiality, integrity, and availability of mission-critical data and impact operational mission success. SERA can be applied at any point in the lifecycle to construct cyber-risk scenarios that show how the technology within a system and its context including supply chains and trusted connections in a system-of-systems provides opportunities for attackers to disrupt mission execution. Analysis of the scenarios will determine what risks are critical and which controls are important to reduce mission impact.
This webinar discusses the National Renewable Energy Laboratory's ongoing work to ensure energy security and resilience in today's interconnected and interdependent world. Today, widely available software applications and internet-enabled devices have been integrated into most industrial control systems, delivering many benefits, but also increasing system vulnerability, thereby putting sectors of critical infrastructure at risk. NREL is working to incorporate intrinsic security in evolving technologies and is proposing evolutionary approaches to making energy and communications systems resilient to a disruption, no matter the cause, and having the ability to identify, detect, respond, and recover in large part on their own. Through NREL's Virtual Cyber Research Platform, researchers can evaluate the responses of interdependent and interconnected components in a multilayer emulated grid environment to better understand how to improve the security, resilience, and blackstart recovery of today's critical infrastructure. This capability allows researchers to safely launch attacks in a virtual world on both emulated and actual physical devices and evaluate how they would respond to an attack in the real world.
Artificial intelligence (AI) has become the linchpin in a growing number of products, services, and research programs which are aimed at automating and enhancing the human decision-making process. However, there are still several application domains (satellites, wearables, wireless, etc.) that cannot afford the size, weight, and power (SWaP) overheads associated with executing state-of-the-art AI algorithms. This webinar discusses previous and ongoing research to bridge the gap and enable AI in the most SWaP-constrained environments.
Machine Learning (ML) appears to be the ubiquitous go-to solution for a great many modern problems across many domains. But what is really under the hood of a typical ML solution? And, why are so many problems suddenly becoming good ML candidates? This webinar explores non-mathematically the foundational aspects of ML and how they add…
The blockchain technology is a game changer to enhance the security of our supply chain, and smart manufacturing. The technology enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered, and when combined with digital signatures, verifies the identity of the participants with…