Cyber Physical Systems Virtual Organization Holds National Symposium on Moving Target Research 11 June 2012

On 11 June 2012 the Cyber Physical Systems Virtual Organization will be holding a symposium on Moving Target Research. In this context, think of Moving Target as meaning the creation of a dynamic attack surface to adversaries done in a way that dramatically increases the work factor required to successfully attack a system.

This cybersecurity research is part of a collaborative government, academia, industry consortia operating under a National Science Foundation banner. Here is more from the call for papers on their website:

In December 2011, the White House, in cooperation with Networking and Information Technology Research and Development (NITRD) Program released the report Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program. One of the research thrusts outlined in this plan was Moving Target (MT), research and development that results in the presentation of a dynamic attack surface to an adversary, increasing the work factor necessary to successfully attack and exploit a cyber target. Throughout the federal government, research related to MT has been funded since 2009, but there is no single venue where this work is presented and published. The Symposium on Moving Target Research intends to bring together and publish the work of the MT community to provide a basis for building on the current state of the art.

The central question of the symposium will be “is there scientific evidence to show that moving target techniques are a substantial improvement in the defense of cyber systems (a game changer),” including how to develop better measures of effectiveness and performance specific to moving target techniques.

This Symposium will take place at the Historic Inns of Annapolis, Annapolis, MD on June 11, 2012. A limited block of rooms will be available at the Historic Inns of Annapolis at the US Government rate for June 10-13, 2012.

MT topics of interest include, but are not restricted to:

  • Dynamic network services
  • Game theoretic approaches
  • Virtual machines
  • Cloud computing
  • Dynamic execution
  • Automated response actions
  • Situational awareness
  • MT transparency
  • Work factor metrics
  • Risk analysis
  • End-to-end security
  • Resiliency
  • Intrusion Tolerance
  • Measures of effectiveness

The program committee has many well known and highly regarded professionals, which means to me this will be a symposium worth attending. From the website:

Program Committee:
Matt Bishop, UC Davis
Deb Frincke, NSA
Matt Gaston, CMU
Sushil Jajodia, GMU
Tom Longstaff, NSA
Ed Rhyne, DHS
Bill Scherlis, CMU
Cliff Wang, ARO
Jeannette Wing, CMU

Stay tuned to their website at: for more info. We will provide updates here as well.

Original post

Leave a Comment

Leave a comment

Leave a Reply