

BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//HiPEDS – EPSRC Centre for Doctoral Training - ECPv6.15.11//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:HiPEDS – EPSRC Centre for Doctoral Training
X-ORIGINAL-URL:https://wp.doc.ic.ac.uk/hipeds
X-WR-CALDESC:Events for HiPEDS – EPSRC Centre for Doctoral Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20150101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20160125T170000
DTEND;TZID=UTC:20160125T180000
DTSTAMP:20260414T231431
CREATED:20170102T200634Z
LAST-MODIFIED:20170102T200850Z
UID:1514-1453741200-1453744800@wp.doc.ic.ac.uk
SUMMARY:Monitoring the security health of a cloud server or smartphone
DESCRIPTION:Speaker: Professor Ruby B. Lee \nAbstract: Cloud computing provides computing resources to cloud customers on demand.  It should also be able to provide different types and levels of security on demand\, at different costs to the customers. But how does the customer know that he is getting the security services he paid for?  Towards this end\, a cloud provider needs to be able to monitor a server’s security health and see if this matches the security properties the customer requested.  We defined CloudMonatt\, an architecture that does this monitoring and attestation of security health.  We discuss what security mechanisms are needed in each compute server and in the property-attestation server\, how some security health properties can be inferred\, and how scalable secure monitoring and property attestation can be achieved.  What measurements can be easily collected from which security health properties can be inferred? Can existing performance monitoring or optimization features be used? Beyond the architectural framework\, we would like to invite exploration of how machine learning can be used effectively to help determine various aspects of security health. Can these techniques also be used to detect security health in smartphones? \nSpeaker’s Bio: Ruby B. Lee is the Forrest G. Hamrick Professor in the Electrical Engineering department at Princeton University. Her research in security-aware computer architecture includes secure processors enabling fine-grained secure enclaves\, secure caches resilient to side-channel attacks\, software-hardware architectures for self-protecting data\, cloud computing security\, smart phone security and security verification. Prior to Princeton\, Lee served as chief architect at Hewlett-Packard\, contributing to numerous technical innovations in processor architecture\, multimedia architecture and security architecture. She was a founding architect of HP’s PA-RISC architecture and instrumental in the initial design of several generations of PA-RISC processors for HP’s business and technical computers.  She helped catalyze the widespread adoption of multimedia in commodity computers by pioneering subword-parallelism (SIMD) for multimedia acceleration in microprocessors\, now supported in all major Instruction Set Architectures.  She led the introduction of the first multimedia user interface in low-end products. She also co-led the 64-bit Intel-HP multimedia architecture team\, and helped introduce SIMD and novel permutation instructions into Intel processors. Lee is an ACM Fellow and an IEEE Fellow\, and holds over 120 U.S. and international patents. She received her undergraduate degree from Cornell in the college scholar program and her Ph.D. from Stanford University. Lee is a visiting professor at Imperial College.
URL:https://wp.doc.ic.ac.uk/hipeds/event/monitoring-the-security-health-of-a-cloud-server-or-smartphone/
LOCATION:Huxley 145\, Imperial College London\, SW7 2AZ\, United Kingdom
END:VEVENT
END:VCALENDAR