1. Salim Hariri, Professor at the University of Arizona, U.S.A

Salim Hariri

Keynote Speech Title:
“Autonomic Cyber Security: The Next Generation of Self-Protection Services”
The increased dependence on cyber systems in business, finance, government and education make them prime targets for cyberattacks due to the profound and catastrophic damage these attacks might inflict on our economy and all aspects of our life. It is widely
recognized that cyber resources and services can be penetrated and exploited. Furthermore, it is widely accepted that the cyber resilient techniques are the most promising solutions to mitigate cyber attacks and change the game to advantage the defender over the attacker. In this presentation, I will present an approach based on biological systems to develop autonomic cybersecurity technologies that will significantly change how we manage, secure and protect cyber resources and services. Our approach is based on autonomic computing (self-manage systems with little or no involvement from users or system administrators), data mining, and anomaly behavior analysis techniques. The main building component to implement Autonomic Cyber Security (ACS) are:
1) Appflow to accurately detect current operational state of any cyber system and predict its behavior in the near future;
2) Anomaly Behavior Analysis (ABA) methodology that can detect with high accuracy and almost no false alarms any anomalous behavior triggered by cyberattacks, faults(hardware or software) and accidents (malicious or natural); and
3) Self-Management Engine to deliver automated and semi-automated actions so we can proactively stop ormitigate the impacts of cyberattacks. I will show through several examples how to apply ACS to secure and protect a wide range of cyber systems and applications.

Salim Hariri is a Professor in the Department of Electrical and Computer Engineering at The University of Arizona. He received his Ph.D. in computer engineering from University of Southern California in 1986, and an MSc from The Ohio State University in 1982.
He is the UA site director of NSF Center for Cloud and Autonomic Computing and he is the Editor-In-Chief for the CLUSTER COMPUTING JOURNAL (Springer, http://clus.edmgr.com) that presents research techniques and results in the area of high speed networks, parallel and distributed computing, software tools, and network-centric applications. He is the Founder of the IEEE/ACM International Symposium on High Performance Distributed Computing (HPDC) and the co-founder of the IEEE/ACM International Conference on Autonomic Computing and ACM Cloud and Autonomic Computing Conference. He is co-author/editor of four books on Autonomic computing, parallel and distributed computing: Autonomic Computing,: Concepts, Infrastructure, and Applications (CRC Press, 2007), Tools and Environments for Parallel and Distributed Computing (Wiley, 2004), Virtual Computing: Concept, Design and Evaluation (Kluwer, 2001),
and Active Middleware Services (Kluwer, 2000). Dr. Hariri developed innovative cybersecurity behavior analysis tools, resilient cloud services, and autonomic software tools.

2. Martin Vejmelka, VP Threat Labs at Avast Software, Prague, Czech Republic
firefox
Keynote Speech Title:
“Understanding Program Behavior”

Malware is a steadily increasing presence in our online lives. Reasons for writing malware have shifted from idle curiosity decades ago to the profitable business involving blackmail, identity and intellectual property theft that we see today. To stop malware, one
must understand program behavior, but what exactly is program behavior? We will discuss levels at which we can define and examine the behavior of programs and show examples of tools and methods that can be used to accomplish this task. We will begin at the instruction level, where behavior of interest may be found in specific instruction sequences, through the level of interaction with the operating system and finish at the Internet level, where the spreading of the program represents its behavior. The talk will also discuss technologies and systems used to gather, track and understand malware behavior in the Avast user base.
Avast has a huge collection of almost three-quarter billion file samples and has over 230 million active users. This scale provides the Avast Threat Labs an excellent environment for research and applications in program behavior analysis, machine learning and big-data analytics.

Martin Vejmelka received MSc in Technical Cybernetics and PhD from the CTU in Biocybernetics and Artificial Intelligence. He visited at the University of Colorado as Associate Professor in the Department of Mathematics for two years and participated on a NASA project to develop a real-time capability to forecast the spread of wildfires. After ten years in research, he moved on to Avast where he now heads its Threat Labs which focuses on solving the challenge of protecting users from malware.

3. Kien A. Hua, Pegasus Professor and Director of the Data Systems Laboratory at University of Central Florida, U.S.A (Fellow of IEEE)

Kien A. Hua

Surging Demand for Internet Bandwidth: Challenges and Opportunities

Kien A. Hua

Department of Computer Science

University of Central Florida

Multimedia computing and communications are core technologies for many important applications, including the Internet of Things (IoT), cyber-physical systems, intelligent transportation systems, computer-aided medical image diagnosis, social media, and entertainment, to name a few. In particular, multimedia applications are known to be data intensive; as such, efficient data transport and delivery mechanisms to move multimedia content through networks such as the Internet are active areas of research. In this talk some pioneering works that provided early solutions for video-on-demand applications that inspired subsequent research are presented, followed with discussion about new challenges and emerging solutions. In particular, a new concept in network communications – traffic deduplication – is introduced. It addresses increasing stress on the Internet due to the surge of video streaming traffic.   Emerging IoT applications, projected to exceed over 28 billion connected devices such as cameras and sensors, by the year 2020 pose another great challenge. While cloud computing has successfully supported many big data applications at data centers, it is ineffective for IoT applications that deal with entirely different kinds of big data. To overcome this new challenge, edge computing is emerging as an effective solution, in which small computing facilities, such as small data centers, are placed at the edge of the Internet in close proximity to the Internet of Things. This Internet computation paradigm runs counter to the theme of consolidation and massive data centers that has dominated the discourse on cloud computing.   ThingStore, presented in this talk, is an IoT applications development and deployment platform based on the edge computing strategy. While an IoT environment fusing human and machine intelligence opens a host of new opportunities, the human teams may be overwhelmed trying to keep up with the real-time information. This calls for more effective communication and collaboration management tools in order for the human teams to deal with information overload in real-time decision making. Tabletop, a multimedia conferencing system presented in this talk, is one such environment to support teamwork in an IoT environment.

 

Prof. Kien A. Hua is a Pegasus Professor and Director of the Data Systems Lab at the University of Central Florida, U.S.A. He was the Associate Dean for Research of the College of Engineering and Computer Science at UCF. Prior to joining the university, he was a Lead Architect at IBM Mid-Hudson Laboratory, where he led a team of senior engineers to develop a highly parallel computer system, the precursor to the highly successful commercial parallel computer known as SP2. Currently, Prof. Hua is also serving as a domain expert on spaceport technology at NASA.

Prof. Hua received his B.S. in Computer Science, and M.S. and Ph.D. in Electrical Engineering, all from the University of Illinois at Urbana-Champaign, USA. His diverse expertise includes network and wireless communications, Internet of Things, data analytics, image/video computing, medical imaging, mobile computing, sensor networks, spaceport technology, and intelligent transportation systems. He has published widely with 12 papers recognized as best/top papers at conferences and a journal. Many of his research have had significant impact. His seminal paper on Chaining technique began the peer-to-peer data sharing and video streaming revolution. His Skyscraper Broadcasting, Patching, and Zigzag techniques have each been heavily cited in the literature, and have inspired many commercial systems in use today.

Prof. Hua has served as a Conference Chair, and Associate Chair, and a Technical Program Committee Member of numerous international conferences, and on the editorial boards of several professional journals. Prof. Hua is a Fellow of IEEE.