Actions

Circumventing Turing's Achilles Heel - Agenda: Difference between revisions

From Santa Fe Institute Events Wiki

No edit summary
No edit summary
 
(11 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{Circumventing Turing's Achilles Heel}}
{{Circumventing Turing's Achilles Heel}}


CIRCUMVENTING TURING’S ACHILLES HEEL<br>
 
 
'''CIRCUMVENTING TURING’S ACHILLES HEEL'''<br>
Working Group<br>
Working Group<br>
November 14, 2016 - November 15, 2016<br>
November 14, 2016 - November 15, 2016<br>
9:00 AM <br>
9:00 AM <br>
Collins Conference Room
Collins Conference Room <br>
 
 
'''Sunday November 13'''<br>
6:30 PM 8:30 PM Welcome Reception, Hotel Santa Fe <br>


'''Monday November 14''' <br>


'''Abstract'''.  Much of the extraordinary success of the computer industry over the last half-century is because the vast majority of computing machines we’ve built are *general purpose computers*. Subject to the limitations of finite memory, time, and processor speed, general-purpose computers are (near) Turing complete; that is, capable of computing anything that is computable. But it’s exactly that same strategy that makes our computer and network systems so vulnerable to attack: If an outsider can gain control of your general-purpose system, then s/he can in principle use it for whatever purposes s/he is clever enough to trick your system into executing, precisely because the system is (near) Turing complete.
Following an overview of the state of cybersecurity threats and opportunities by Gregory Shannon of OSTP, each participant will present a 15-min introduction of themselves and their perspectives on novel hardware/software architectures that could improve the security of major classes of systems and applications.  15 minutes is allocated for Q&A following each introduction.<br>
7:30 AM 8:30 AM Breakfast<br>
8:30 AM 9:30 AM Gregory Shannon, Assistant Director, Cybersecurity Strategy, Office of Science and Technology Policy<br>
9:30 AM 10:00 AM Donna F. Dodson, Associate Director and Chief Cyber Security Advisor; Director, National Cybersecurity Center of Excellence, NIST<br>
10:00 AM 10:30 AM Break<br>
10:30 AM 11:00 AM Vinh Nguyen, National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence <br>
11:00 AM 11:30 AM Brandon Baker, Senior Software Engineer, Google<br>
11:30 AM 12:00 PM Jonathan McCune, Software Engineer, Google<br>
12:00 PM 12:30 PM Felix Schuster, Principal Researcher, Microsoft Cambridge<br>
12:30 PM 1:30 PM Lunch<br>
1:30 PM 2:00 PM Sven Schrecker, Chief Architect, Intel IoT Security<br>
2:00 PM 2:30 PM Dave Ackley, Associate Professor of Computer Science, University of New Mexico<br>
2:30 PM 3:00 PM Mike Riddle, Founder Autocad, Center for Understanding Change<br>
3:00 PM 3:30 PM Break<br>
3:30 PM 4:00 PM David Wolpert, Professor, Santa Fe Institute<br>
4:00 PM 4:30 PM Chris Wood, Organizer, External Professor and Former Vice President, Santa Fe Institute <br>
4:30 PM 5:30 PM Closing discussion and identification of key issues and discussion leaders for Tuesday's discussions <br>


This Working Group will explore strategies for retaining the hardware and software advantages of general purpose computers, while denying those same general purpose capabilities to outside attackers. The focus will be on systems and applications that, by definition, require routine access from the open internet (e.g., webservers, online banking and other financial systems, etc.).
'''Tuesday November 15'''<br>
7:30 AM 8:30 AM Breakfast <br>
8:30 AM 10:00 AM Discussion <br>
10:00 AM 10:30 AM Break<br>
10:30 AM 12:00 PM Discussion<br>
12:00 PM 1:00 PM Lunch<br>
1:00 PM 2:30 PM Discussion<br>
2:30 PM 3:00 PM Break<br>
3:00 PM 5:00 PM Discussion <br>

Latest revision as of 22:01, 10 November 2016

Working Group Navigation


CIRCUMVENTING TURING’S ACHILLES HEEL
Working Group
November 14, 2016 - November 15, 2016
9:00 AM
Collins Conference Room


Sunday November 13
6:30 PM 8:30 PM Welcome Reception, Hotel Santa Fe

Monday November 14

Following an overview of the state of cybersecurity threats and opportunities by Gregory Shannon of OSTP, each participant will present a 15-min introduction of themselves and their perspectives on novel hardware/software architectures that could improve the security of major classes of systems and applications. 15 minutes is allocated for Q&A following each introduction.

7:30 AM 8:30 AM Breakfast
8:30 AM 9:30 AM Gregory Shannon, Assistant Director, Cybersecurity Strategy, Office of Science and Technology Policy
9:30 AM 10:00 AM Donna F. Dodson, Associate Director and Chief Cyber Security Advisor; Director, National Cybersecurity Center of Excellence, NIST
10:00 AM 10:30 AM Break
10:30 AM 11:00 AM Vinh Nguyen, National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence
11:00 AM 11:30 AM Brandon Baker, Senior Software Engineer, Google
11:30 AM 12:00 PM Jonathan McCune, Software Engineer, Google
12:00 PM 12:30 PM Felix Schuster, Principal Researcher, Microsoft Cambridge
12:30 PM 1:30 PM Lunch
1:30 PM 2:00 PM Sven Schrecker, Chief Architect, Intel IoT Security
2:00 PM 2:30 PM Dave Ackley, Associate Professor of Computer Science, University of New Mexico
2:30 PM 3:00 PM Mike Riddle, Founder Autocad, Center for Understanding Change
3:00 PM 3:30 PM Break
3:30 PM 4:00 PM David Wolpert, Professor, Santa Fe Institute
4:00 PM 4:30 PM Chris Wood, Organizer, External Professor and Former Vice President, Santa Fe Institute
4:30 PM 5:30 PM Closing discussion and identification of key issues and discussion leaders for Tuesday's discussions

Tuesday November 15
7:30 AM 8:30 AM Breakfast
8:30 AM 10:00 AM Discussion
10:00 AM 10:30 AM Break
10:30 AM 12:00 PM Discussion
12:00 PM 1:00 PM Lunch
1:00 PM 2:30 PM Discussion
2:30 PM 3:00 PM Break
3:00 PM 5:00 PM Discussion