Computing Community Consortium Blog

The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.


Posts Tagged ‘Cybersecurity

 

Call for Applications – CCC Leadership in Embedded Security Workshop

May 21st, 2018 / in Announcements / by Khari Douglas

The Cybersecurity Taskforce of the Computing Community Consortium (CCC) will host a leadership workshop to envision the future of embedded security research on August 13th in Baltimore, Maryland. Embedded systems such as pacemakers, autonomous vehicles, and the Internet of Things often have real-time constraints and electromechanical components that lead to different vulnerabilities and solutions from traditional computing systems. Embedded security is the study of physical properties, computational properties, and human factors that protect embedded systems from attack. The workshop, co-chaired by Wayne Burleson (UMass Amherst), Kevin Fu (CCC Cybersecurity Taskforce Chair, University of Michigan), and Farinaz Koushanfar (UC San Diego), will be co-located with the 27th USENIX Security Symposium. It will begin with a reception on the evening of […]

Call for Applications – CCC Leadership in Embedded Security Workshop

May 1st, 2018 / in Announcements / by Khari Douglas

The Cybersecurity Taskforce of the Computing Community Consortium (CCC) will host a leadership workshop to envision the future of embedded security research on August 13th in Baltimore, Maryland. Embedded systems such as pacemakers, autonomous vehicles, and the Internet of Things often have real-time constraints and electromechanical components that lead to different vulnerabilities and solutions from traditional computing systems. Embedded security is the study of physical properties, computational properties, and human factors that protect embedded systems from attack. The workshop, co-chaired by Wayne Burleson (UMass Amherst), Kevin Fu (CCC Cybersecurity Taskforce Chair, University of Michigan), and Farinaz Koushanfar (UC San Diego), will be co-located with the 27th USENIX Security Symposium. It will begin with a reception on the evening of […]

CCC Computing Research: Addressing National Priorities and Societal Needs Symposium

October 12th, 2017 / in Announcements / by Khari Douglas

On October 23-24, 2017, the Computing Community Consortium (CCC) will hold the Computing Research: Addressing National Priorities and Societal Needs Symposium in order to address the current and future contribution of computing and its role in addressing societal needs. The two days are organized around four main themes: Intelligent Infrastructure for our Cities and Communities: Intelligent infrastructure is already transforming our nation’s cities and communities, but the technological revolution is just now beginning. This session will highlight some of the major advances taking place now, while at the same time emphasizing the substantial body of research, much of it crossing disciplinary boundaries, that still needs to be done. Security and Privacy for Democracy:Computing research […]

Data Breaches: Time to Implement a Forward-looking Research Agenda

October 3rd, 2017 / in policy, Research News / by Khari Douglas

The following is a guest blog post from CCC Council Member and Cybersecurity Task Force Member Nadya Bliss from Arizona State University. “Massive breach of databases containing personal information. Millions of records exposed.” This seems to be an almost daily headline these days. One of the most serious events in recent memory is the breach of the Equifax databases, potentially compromising 143 million records with personal information such as name, social security number, and credit history. While the Equifax breach garnered much attention, it is just the latest in a string of serious breaches. These events have highlighted the need for a forward-looking research agenda in support of regulatory frameworks and discourse […]

Computing Community Consortium Symposium

October 2nd, 2017 / in Announcements / by Khari Douglas

Since its inception, the Computing Community Consortium (CCC) has hosted dozens of visioning workshops to envision, discuss, and catalyze the future of computing and its role in addressing societal needs. The Computing Research: Addressing National Priorities and Societal Needs Symposium will draw these topics into a program designed to illuminate current and future trends in computing and the potential for computing to address national challenges. The two days are organized around four main themes: Intelligent Infrastructure for our Cities and Communities: Intelligent infrastructure is already transforming our nation’s cities and communities, but the technological revolution is just now beginning. This session will highlight some of the major advances taking place now, while at […]

CCC and MForesight Launch Event for Cybersecurity for Manufacturers Report

September 5th, 2017 / in Announcements, conference reports, policy, research horizons, Research News / by Helen Wright

The organizers from the MForesight and Computing Community Consortium (CCC) workshop on Cyber Security for Manufacturers will be releasing their workshop report at a Launch Event hosted by the House Manufacturing Caucus on September 22 from 2:00-3:30PM ET in the Rayburn House Office Building, in Washington, DC. The scale and variety of cyber-threats to manufacturers have grown considerably in recent years, and they now range from rare and sophisticated Stuxnet-style attacks to the relatively frequent ransomware risks. In addition to malware attacks on industrial firms, cyber-attacks on manufacturers can include efforts to corrupt data, steal intellectual property (IP), sabotage equipment, and disable networks. The purposes and effects of attacks vary widely — but all such incidents […]