Application of Game Theory to High Assurance Cloud Computing

Friday, September 2, 2016 - 02:20 pm
Swearingen 2A14
COLLOQUIUM Department of Computer Science and Engineering University of South Carolina Charles A. Kamhoua Date: September 02, 2016 Time: 1420-1510 (2:20-3:10pm) Place: Swearingen 2A14 Abstract The growth of cloud computing has spurred many entities, both small and large, to use cloud services for cost savings. Public cloud computing has allowed for quick, dynamic scalability without many overhead or long-term commitments. However, concern over cyber security is the main reason many large organizations with sensitive information such as the Department of Defense have been reluctant to join a public cloud. This is due to three challenging problems. First, the current cloud infrastructures lack provable trustworthiness. Integrating Trusted Computing (TC) technologies with cloud infrastructure shows a promising method for verifying the cloud’s behaviors, which may in turn facilitate provable trustworthiness. Second, public clouds have the inherent and unknown danger stemming from a shared platform - namely, the hypervisor. An attacker that subverts a virtual machine (VM) and then goes on to compromise the hypervisor can readily compromise all virtual machines on that hypervisor. We propose a security-aware virtual machine placement scheme in the cloud. Third, a sophisticated attack in a cloud has to be understood as a sequence of events that calls for the detection/response model to encompass observations from varying dimensions. We discuss a method to automatically determine the best response, given the observations on the system states from a set of monitors. Game theory provides a rich mathematical tool to analyze conflict within strategic interactions and thereby gain a deeper understanding of cloud security issues. Theoretical constructs or mathematical abstractions provide a rigorous scientific basis for cyber security because they allow for reasoning quantitatively about cyber-attacks. This talk will address the three cloud security challenging problems identified above and report on our latest findings from this body of work. Charles A. Kamhoua received the BS in electronic from the University of Douala (ENSET), Cameroon, in 1999, and the MS in telecommunication and networking and the PhD in electrical engineering from Florida International University (FIU), in 2008 and 2011, respectively. In 2011, he joined the Cyber Assurance Branch of the U.S. Air Force Research Laboratory (AFRL), Rome, New York, as a National Academies Postdoctoral Fellow and became a Research Electronics Engineer in 2012. Prior to joining AFRL, he was an educator for more than 10 years. His current research interests include the application of game theory to cyber security, survivability, cloud computing, hardware Trojan, online social network, wireless communication and cyber threat information sharing. He has more than 60 technical publications in prestigious journals and International conferences along with a Best Paper Award at the 2013 IEEE FOSINTSI. He has mentored more than 40 young scholars at AFRL counting Summer Faculty Fellow, postdoc, and students. He has been invited to more than 30 keynote and distinguished speeches in the USA and abroad. He has been recognized for his scholarship and leadership with numerous prestigious awards including 30 Air Force Notable Achievement Awards, the 2016 FIU Charles E. Perry Young Alumni Visionary Award, the 2015 AFOSR Windows on the World Visiting Research Fellowship at Oxford University, UK, an AFOSR Basic Research Award, the 2015 Black Engineer of the Year Award (BEYA), the 2015 NSBE Golden Torch Award—Pioneer of the Year, selection to the 2015 Heidelberg Laureate Forum, and the 2011 NSF PIRE Award at the Fluminense Federal University, Brazil. He is currently an advisor for the National Research Council, a member of ACM, the FIU alumni association, NSBE and a senior member of IEEE.

A Proposed Numerical Data Standard Supporting Automated Network Cluster Analytics

Friday, August 19, 2016 - 02:20 pm
SWGN 2A14
I would like to invite you to Dr. Joseph Johnson’s talk as part of CSCE 791 - Seminar on Advances in Computing. The seminar is open to anyone who is interested, not just students enrolled in the CSCE 791 class. Speaker: Joseph E. Johnson, PhD Affiliation: Physics, USC Location: SWGN 2A14 Time: 2:20 - 3:10 PM Abstract: A standard is proposed for all numeric data that tightly integrates (1) each numerical value with (2) its units, (3) accuracy (uncertainty) level, and (4) defining metadata into a new object called a MetaNumber (MN) with full mathematical processing of dimensional and error analysis along with full management of associated defining metadata tags. This lays a foundation for fully automated processing by intelligent agents. This MN standard has been designed, programed, and is now operational on a server in a Python environment as a multiuser cloud application using any internet linked device. Both transactional computations and API calls are supported. All numeric data is easily readable by both humans and computers and every data value has a unique name which can serve as its variable name in computation. Two examples are then explored of how such a data standard can support new AI directions and Big Data applications with: (1) automated cluster analysis of the associated derived networks using our theorems based upon Markov type Lie algebras and groups and (2) with additional cluster analysis, the tracking of computational processes identifying the underlying mathematical structures, core constants, component data, and user models. The MN design creates a network of all linked clusters of numerical information and computational processes providing a new vision of our “numerical universe”. The system has extensive applications to business, scientific, and industrial processing with fully automated data exchange. Bio: Dr. Johnson is a Distinguished Professor Emeritus in the Department of Physics at University of South Carolina. Dr. Johnson's primary research interest is theoretical physics and information theory with specialization in the foundations of relativistic quantum theory utilizing Lie Algebras where his initial work developed a new formulation of relativistic position operators thus generalizing the Poincare group. Later he found a new method of decomposing the Lie group and algebra for the most general linear transformation group in n dimensions into a scaling algebra and an n(n-1)-dimensional Markov type Lie algebra. This latter algebra, when restricted using a particular Lie basis, generates all possible continuous Markov transformations. This is instrumental in the study of entropy, information theory, and diffusion. One of his most important discoveries was that the Markov algebra is exactly isomorphic to all possible networks. This now allows the power of Lie groups and algebras to link to the theory of Markov transformations, and likewise to the full theory of networks and their classifications. He has developed an expansion of an arbitrary network as a series of Renyi’ entropy metrics with decreasing term importance and full network information similar to a Fourier expansion. His USC R&D team (the Advanced Solutions Group – www.asg.sc.edu ) developed advanced software systems for which he was the sole PI for over 120 grants for $14M between 1992 to 2012 to USC. His funding by DARPA, with $2.4M in 2004-2007, funded investigations in Markov entropy metrics and clustering for analyzing networks. Currently his work concentrates on (1) the proposed numerical metadata system www.metanumber.com, (2) the QRECT classroom system that uses advanced expert algorithms for self-correcting systems to determine optimal responses, (3) the mathematical foundations of networks and cluster analysis, and (4) a proposed methodology for the integration of general relativity with quantum theory (May 5, 2016 Colloquium in Physics). He just presented a paper titled: “Clustering and Network Analysis as a Data Analytic Tool” at the American Physical Society national annual meeting in Salt Lake City Utah. He currently is the PI for three active grants: Aspire 1, Aspire II, and SC Floods.

A Hierarchical Framework for Phylogenetic and Ancestral Genome Reconstruction on Whole Genome Data

Thursday, June 23, 2016 - 03:00 pm
Swearingen 3A75
DISSERTATION DEFENSE Department of computer science and Engineering University of South Carolina Author : Lingxi Zhou Advisor: Jijun Tang Date: Thursday, June 23rd Time: 3:00pm Place : Swearingen 3A75 Abstract Gene order can be changed by events such as rearrangements, duplications, and losses, which can change both the order and content of the genome. These genetic changes account for all of genome evolution. Recently, the accumulation of genomic sequences provides researchers with the chance to handle long-standing problems about the phylogenies, or evolutionary histories, of sets of species, and ancestral genomic content and orders. Over the past few years such problems have had a large number of algorithms proposed in the attempt to resolve them, with each algorithm following a different standard. The work presented in this dissertation focuses on algorithms and models for whole-genome evolution and their applications in phylogeny and ancestral inferencing from gene order. We developed a pipeline involving maximum likelihood, weighted maximum matching, and variable length binary encoding for estimation of ancestral gene content to reconstruct ancestral genomes under the various evolutionary models, including genome rearrangements, additions, losses, and duplications, with high accuracy and low time consumption. Phylogenetic analyses of whole-genome data have been limited to small collections of genomes and low-resolution data, or data without massive duplications. We designed a probabilistic approach to phylogeny analysis (VLWD) based on variable length binary encoding, using the probabilistic model, to reconstruct phylogenies from whole genome data, scaling up in accuracy and make it capable of reconstructing phylogeny from whole genome data, like triploids and tetraploids. Maximum likelihood based approaches have been applied to ancestral reconstruction but remain primitive for whole-genome data. We developed a hierarchical framework for ancestral reconstruction, using variable length binary encoding in content estimation, then adjacencies fixing and missing adjacencies predicting in adjacencies collection and finally, weighted maximum matching in gene order assembly. Therefore it extensively improves the performance of ancestral gene order reconstruction. We designed a series of experiments to validate these methods and compared the results with the most recent and comparable methods. According to the results, they are proven to be fast and accurate. Thanks, Sri.

Two-Hit Filter Synthesis for Genomic Database Search

Wednesday, June 1, 2016 - 10:00 am
Swearingen 3A75
DISSERTATION DEFENSE Author: Jordan Bradshaw Advisor: Jason D. Bakos Date: Wednesday, June 1st Time: 10:00am Place: Swearingen 3A75 Abstract Genomic databases are exhibiting a growth rate that is outpacing Moore's Law, which has made database search algorithms a popular application for use on emerging processor technologies. NCBI BLAST is the standard tool for performing searches against these databases, which operates by transforming each database query into a filter that is subsequently applied to the database. This requires a database scan for every query, fundamentally limiting its performance by I/O bandwidth. In this dissertation we present a functionally-equivalent variation on the NCBI BLAST algorithm that maps more suitably to an FPGA implementation. This variation of the algorithm attempts to reduce the I/O requirement by leveraging FPGA-specific capabilities, such as high pattern matching throughput and explicit on-chip memory structure and allocation. Our algorithm transforms the database—not the query—into a filter that is stored as a hierarchical arrangement of three tables, the first two of which are stored on-chip and the third off-chip. Our results show that it is possible to achieve speedups of up to 8x based on the relative reduction in I/O of our approach versus that of NCBI BLAST, with a minimal impact on sensitivity. More importantly, the performance relative to NCBI BLAST improves with larger databases and query workload sizes.

Senior Capstone Project Demo Day

Tuesday, May 3, 2016 - 08:30 am
Amoco Hall, Swearingen Building.
All are invited to come see our Senior students demo the apps they have built over the last year for our Capstone Class. 20 teams will be demonstrating their apps, which include web applications, mobile applications, and desktop applications. Presentation schedule:
TimeGroupDescriptionClient
8:30pSwizzyA 3D Game for Tablets, using Unity.Power BNC Energy
8:40dietAn Android for tracking diet.The Cancer Prevention and Control Program, USC
8:50hygieiaA webapp for display and analysis of hydration data.Hygieia Hydration
9:00omahaHacking a voting machine.Dr. Duncan Buell, CSE Department
9:10imentorA webapp for student-teacher video conferencing.VC3 and the Richland 2 School District
9:20FitnessEvolutionAn Android app for fitness tracking.Self startup
9:30ZVerseA webapp for 3D model editing.ZVerse Inc.
9:40RobotCAAn Android app for controlling robots.Dr. Ioannis Rekleitis, CSE Department
9:50DJJA webapp for providing information.Institute for Families in Society University of South Carolina
10:00pmbaA webapp for tracking incoming student application process.Professional MBA Program, USC
10:10wandrlustA webapp for travellers.Self startup
10:20routegenA webapp for building router configuration files.Cisco Systems
10:30orthoA webapp for patient tracking.Midlands Orthopedics
10:40HelpMongerAn Android Ionic app for finding help.Helpmonger.com
10:50contextualAn educational platform (webapp) based on the mode neutral learning pedagogy.Self startup
11:00sscrmA webapp for tracking students.USC Student Success Center
11:105chordsAn Android app for learning music.South Carolina Philharmonic
11:20FitLivinAn Android app for fitness tracking.Self startup
11:30dconA desktop app for data analysis.Chemical Engineering Dept., USC
If you can't make it, you can always watch the demos online.

CSE Awards Day Ceremony

Friday, April 22, 2016 - 03:15 pm
Amoco Hall
It will be a celebratory event recognizing the accomplishments of our department's undergraduate and graduate students, staff, and faculty. Be part of the celebration and enjoy some frozen treats. Hope to see you all there.

New Trends of Mobile Health (mHealth) and Secure Integration with Electronic Health Records (EHR)

Friday, April 22, 2016 - 02:50 pm
2A27 Swearingen Engineering Center
Chin-Tser Huang, University of South Carolina Abstract: Mobile Health (mHealth), which refers to the use of mobile technologies to improve the quality of health care, has attracted increasing attention thanks to the continuous growth of mobile devices and smartphones. It is desirable to integrate mHealth with Electronic Health Record (EHR), the preferred new method to store patients’ health records. However, several security properties need to be satisfied to make the integration practical, such as data privacy, fine-grained access control and scalable access between different clouds. In this talk, we first introduce latest trends of mHealth technologies and applications, and present a secure and scalable framework for EHR data sharing, which combines Identity-based Encryption and Attribute-based Encryption together to enforce a fine-grained access control scheme on EHR and to enable scalable access between multiple clouds. Bio: Dr. Chin-Tser Huang is an Associate Professor in the Department of Computer Science and Engineering at University of South Carolina at Columbia. He received the B.S. degree in Computer Science and Information Engineering from National Taiwan University, Taipei, Taiwan, in 1993, and the M.S. and Ph.D. degrees in Computer Sciences from the University of Texas at Austin in 1998 and 2003, respectively. His research interests include network security, network protocol design and verification, and distributed systems. He is the director of the Secure Protocol Implementation and Development (SPID) Laboratory at the University of South Carolina. He is the author (along with Mohamed Gouda) of the book ‘‘Hop Integrity in the Internet,’’ published by Springer in 2005. His research has been funded by DARPA, AFOSR, AFRL, and NSF. He received the US Air Force Summer Faculty Fellowship Award from 2008 to 2010, and also worked as a Visiting Faculty Researcher with Air Force Research Lab in the summers of 2011 to 2015. He served as the President of The Chinese-American Academic and Professional Association in Southeastern United States (CAPASUS) in 2014-2015. This seminar is open to anyone who is interested, not just students enrolled in the CSCE 791 class. Please consider attending.

Backer and Hacker Mobile App Creation Demo Day

Thursday, April 21, 2016 - 06:00 pm
Amoco Hall in the Swearingen Engineering Center - 315 Main Street, Columbia, SC 29208
The culmination of The Entrepreneurship Club, The College of Engineering and Computing, & The Darla Moore School of Business at The University of South Carolina CSCE 590 app creation project taught by Dr. Jianjun Hu and MGMT 473 Emerging Ventures taught by Juliana Iarossi. The event will include demos of all projects as well as a competition judged by local startup leaders. Written about in a Carolina Money article, this project commenced with a pitch night that included more than 25 pitches. The Computer Science students selected their favorite ideas and began working collaboratively with the entrepreneur to create a minimum viable product. This event will be the official showcase of what our brilliant students have worked on throughout the semester. All are welcome free of charge. Sponsorship options are available and highly encouraged for startups and entrepreneurial. More info.