Find us on
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Jeanne Shaheen |
![]() |
Lisa Monaco |
![]() |
John Stewart |
![]() |
M. Todd Henderson |
![]() |
Dr. Elizabeth Bowman |
![]() |
Dr. Fabio Pierazzi |
![]() |
V.S. Subrahmanian |
![]() |
Rand Beers ('64) |
![]() |
Wanna See Something REALLY Scary? |
![]() |
Salvatore J. Stolfo |
![]() |
STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System Professor Dan Wallach |
![]() |
Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact? Ben MillerChief Threat Officer, Dragos, Inc. Tuesday May 2, 2017 Kemeny 007, 4:30 PM |
![]() |
Factual Echo Chambers? Fact-checking and Fake News in Election 2016. Professor Brendan Nyhan |
![]() |
Professor Dickie George |
![]() |
A Nation Under Attack: Advanced Cyber-Attacks in Ukraine Ukrainian Cybersecurity Researchers |
ISTS Information Pamphlet
Co-sponsored by ISTS and the Computer Science Department
![]() |
Yoshi Kohno University of Washington |
Computer security is the art and science of building computer systems robust against the actions of adversaries. One subfield of computer security -- experimental security analysis research -- focuses on experimentally analyzing (aka "attacking", "hacking") real artifacts in order to learn from their weaknesses and failure modes and thereby develop strategies for improving the security of similar artifacts in the future. Although important, this subfield of computer security is often opaque to outsiders. What makes a good experimental security analysis project? How does one pick which artifacts to study? What should one do after obtaining (possibly serious) results?
The primary goal of this talk is to answer these questions and present examples of how to plan, conduct, and follow-through with experimental security analysis research projects. This talk will leverage three case studies. First, we will discuss the experimental security analysis of a modern, short-range wireless implantable cardiac defibrillator. Second, we will discuss the experimental security analysis of modern, household, wireless robots. And third, we will discuss the experimental security analysis of a pervasively computerized modern automobile.
Tadayoshi Kohno is an Assistant Professor in the University of Washington's Department of Computer Science and Engineering, where his research focuses on helping protect the security, privacy, and safety of users of current and future generation technologies. Kohno is the recipient of an Alfred P. Sloan Research Fellowship, a U.S. National Science Foundation CAREER Award, and a Technology Review TR-35 Young Innovator Award. Kohno received his Ph.D. from the University of California at San Diego.