the center for security technologiesjao/talks/csttalks/ndta.pdf · 2004-06-10 · dr. sharon nunes...

34
The Center for Security Technologies Ronald S. Indeck The Das Family Distinguished Professor CST Director

Upload: others

Post on 14-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

The Center for Security Technologies

Ronald S. IndeckThe Das Family Distinguished Professor

CST Director

Page 2: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Washington University and theCenter for Security Technologies

Washington UniversityUSNWR: highly ranked nationally, top 10 in endowment8 Schools: Medicine, Social Work ranked in the top 3SEAS: 6 departments including ESE and CSE

CSTInterdisciplinary Academic Research CenterFormed early 2002Built on existing strengthsin security research

Page 3: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

CST Mission

To advance through research in basic science, mathematics, and engineering those areas which can most directly improve security including:

physical aspects of security (intrusion detection, biological and chemical substance identification) information aspects of security (networking, information awareness, and information theory)law, economics, public policy

Page 4: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

CST Scope

An interdisciplinary center40 faculty from five schoolsMore than cybersecurityMore than counterterrorism

A variety of ‘attacks’ including natural disastersIntegrate research through testbeds

Synergy between technology and policyPrivacy/public policy as ‘design criteria’

Page 5: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Scientific and Technological Intellectual Thrusts

Sensors: IndeckAdvanced Electronic Systems: LockwoodInformation-Theoretic Signal and Image Processing: SnyderRecognition Theory and Systems: O’SullivanVision for Security: PlessDistributed and Mobile Systems: GillNetwork and Information Security: HegdeDetection, Isolation, and Accommodation of Faults: IsidoriPrivacy, Public Policy, and Economics: Kieff

Page 6: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Engineering Demonstration Testbeds

Systems IntegrationEnd-to-end Demonstrations

Biometrics/Physics-Based Recognition Systems: MorleySearching Massive Databases for Critical Information: ChamberlainNetworks of Video Cameras: PlessHigh Speed Network Security: LockwoodSecurity of the Food and Water Supply: Smith

Roles of Privacy, Economics, and Policy

Page 7: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Example: Document Authentication

Important documentsAirline tickets, passports, checks, currency, government issued IDs, product labels

Use magnetic signatures to authenticatePhysical phenomena, sensor, signal

How to authenticateAlgorithms, sampling, confidence

Implement the systemElectronics, data management

Page 8: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Exploit Fundamental Science

Using magnetic signatures for:Tamper-evidence for containersPhysical access/bank cardsSoftware protectionDetect manipulation of data. . .

Page 9: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Related Recognition Systems

What to authenticate?Consider biometric:FingerprintingVoice authentication. . .

Recognition systems share commonalitiesFramework, performance analysis

Page 10: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Another Example/Opportunity:Data Explosion

Humanoids have produced 12 Exabytes over the past ~30,000 years (12,000,000,000,000,000,000 Bytes)We will generate next 12 Exabytes in just over a year!US intelligence collects data equaling the printed collection of the US library every day!

Page 11: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Fast, inexpensive searches for changing databases200 times faster than conventional searchesScalable, using conventional drivesSearch need not be exactReduced bus demands

Wide applicabilityIntelligenceImagesGenomics

Intelligent Searching ofMassive Databases

DataSearch Systems, Inc.

Hard drive

Processor

Memory

I/O Bus

Reconfigurable hardware

Memory/processing

Memory Bus

Page 12: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Data Transmission

120 TBytes/sec internet peak rate120 PBytes/month Internet100 PBytes/month telephone

Page 13: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Network Watchman

Electronic postmendirect packets to destination via headers

Secure networkwatch headersview payloadcopy/redirect/stop packets

Page 14: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Digital Array Scanning Interferometer (DASI)

Applications to:Food supply

Transportation

Mail

Currency

. . .

Page 15: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Smart Borders – Smart Cameras

Page 16: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President
Page 17: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Mission Critical Areas

1. Intelligence and warning2. Border and transportation security3. Domestic counterterrorism4. Protecting critical infrastructure5. Defending against catastrophic threats6. Emergency preparedness and response

CST’s Strengths Support the National Security Agenda

Page 18: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Department ofHomeland Security

“The Department will have a clear, efficient organizational structure with four divisions:

1. Border and Transportation Security2. Emergency Preparedness and Response3. Chemical, Biological, Radiological, and Nuclear

Countermeasures4. Information Analysis and Infrastructure

Protection”CST addresses many Science and Technology

issues of the Homeland Security Act

Page 19: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

CST Funding/Collaborationsdeveloped and developing

NSF, DoEdARO, DARPA, ONRCIA, FBI, NSANIST – ATPBattelle, SRIBoeing, CSFB, Monsanto, SBC . . . AccessDenied, BECS, Brick, Cernium, Global Velocity, Hackett Security, Mass Sensors, Newberry Group, NVE . . .

Page 20: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

CST External Advisory Board

Mr. Earle Harbison (retired President and COO, Monsanto), ChairDr. Massoud Amin (Director of Infrastructure Security, EPRI)Dr. Allen Atkins (VP, Boeing)Dr. Tony Cantu (Chief Scientist, US Secret Service)Prof. Jerry Cox (Senior Professor, Washington University)Col. Tim Daniel (Director, Missouri Office of Homeland Security)Mr. Will Eatherton (Chief Architect, Cisco)Dr. Mark Kryder (CTO, Seagate Technologies)Mr. Jerry McElhatton (President GTO, MasterCard International)Dr. Craig Mundie (CTO, Microsoft)Dr. Sharon Nunes (Director, IBM)Dr. Joe Leonelli (Director, Battelle)Ms. Jan Newton (President TX, SBC)Gen. Tony Robertson, (Fmr. Com. in Chief, Air Mobility Command)Dr. Don Ross (Chairman, Ross and Baruzzini: Cernium)Hon. William Webster (retired Director, CIA and FBI)

Page 21: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

CST’s Unique Strengths

Broad Range of Research and ApplicationsSensors through signal processing to implementationsSecurity of food, water, access, network, bordersMore than cybersecurity

Synergy between Technology and PolicySystems Integration

Page 22: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Center for Security Technologies

Established critical mass in security technologiesMany complementary projectsWidespread applicationsFundamental scientific and engineering issuesGuiding standards and impact policyUniquely integrating economic and privacy issuesSynergy between WUSTL, region, and nation

Page 23: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Comprehensive Scientific and Comprehensive Scientific and Engineering ResourceEngineering Resource

Center for Security Technologies

www.cst.wustl.edu

Page 24: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President
Page 25: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

CST Membership Benefits

Access to Laboratories, Professors, and StudentsEarly Access to Intellectual Property and Technology DevelopmentAbility to Conduct/Direct Research On-SiteSynergistic Collaboration with Other Companies on Precompetitive ResearchAccess to Students for Employment

Co-op and Post-Graduate

Page 26: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

CST Membership Benefits

Rapid PrototypingAccess Unique, Large Experimental / Computational FacilitiesInput to Technical ReportsAnnual Progress ReportsBiannual Briefings

May and January

Page 27: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Technology Transfer

Wavelet-Based Compression for Fingerprint ID (AFIS)Magnetic Signature DevelopmentAutomatic Target RecognitionHigh Speed Network Content Matching

Page 28: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Ongoing/Developing Research

Intelligent Searching of Massive DatabasesSensor NetworksNetwork and Data SecuritySecure Code DevelopmentSecurity of the Food, Mail, and CurrencyVision for SecurityBiometric-Based AuthenticationPublic Policy

Page 29: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Sensor Networks

Networks of SensorsSensing, communication, control

Intelligently Combine Data from Multiple SensorsPotentially widely distributed

Communication Strategies and ProtocolsCompression, localization, wireless

Control of SensorsAsynchronous communicationSensor parameters

Page 30: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Networks of Distributed Sensors

Existing or Future Sensor NetworksNetworks of Sensors

Waterway: detect pollution, bioterrorism, chemical spillsBuilding: fire, temperature, other agentsCameras: dynamically reconfigureCommunicate problems, identify sourceReal-time response to evolving situations

BECS Engineering

Page 31: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

X-ray Scanning and Security Imaging

Conventional Transmission

Page 32: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Scanning at Borders/Airports

Low Energy Backscattered

Behavior Analysis

Page 33: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Network of Video Cameras

Missouri RapidScreenLicense Plate ID System

consider sniper case

Page 34: The Center for Security Technologiesjao/Talks/CSTTalks/NDTA.pdf · 2004-06-10 · Dr. Sharon Nunes (Director, IBM) Dr. Joe Leonelli (Director, Battelle) Ms. Jan Newton (President

Privacy, Public Policy, and Ethics

Societal Issues, Security-Privacy Perception and RealityEconomic Issues, Cost-Benefit Analysis Legal IssuesTechnological Solutions to Privacy IssuesFacilitate Discourse on Technology and Its Implications