Prof. John Cook – Herkimer College
Title: Exploring Embedded System Vulnerabilities
Embedded systems have extensive applications in consumer, commercial, automotive, industrial and healthcare markets. Examples of embedded devices include TVs, household appliances, banking ATM machines, routers, POS (point of sale) terminals, automobiles and cell phones. Internally, many of these devices are much like a traditional personal computer, running static versions of Linux and Windows. Often times, these devices are connected to the Internet but have no way of patching against discovered vulnerabilities. This presentation will explore methods of accessing the underlying systems in these devices as well as demonstrate methods of discovering vulnerabilities.
Prof. Cook is the head of the Computer Network Tech program at Herkimer College. His research interests include embedded systems security, operating system and network security. He is a US Air Force veteran that has completed degrees in Data Processing, Programming and Systems as well as a BS and MS in Telecommunications from SUNY Poly. John’s career experience includes: government contracting at Rome Labs, and over 20 years as an independent IT consultant.
Mr. Michael Moore – Harris Corp.
Title: Neuromorphic Computing
The emergence of main stream artificial intelligence has been a prediction of computer scientists for more than fifty years; yet, there are still no robots among us. After a half century of research and development, predictions by Ray Kurzweil of a break-through in less than two decades have refueled speculation. The renewed interest is aligned with ‘neuromorphinc computing,’ an approach inspired by biology. Reaching a break-through will involve much more than computer science alone can provide. It will rest on new foundations of nano technology, neuroscience, mathematics and behavioral sciences.
Michael Moore is a principle engineer and project manager at Harris Corporation in Rome NY. His career interests have focused on high performance computing, neuroscience, embedded systems, domain specific languages and distributed computing. Mr. Moore has published technical papers on the real-time emulation of a cortical visual track using CELL-B technology. He also published a book on real-time embedded software design, and has contributed to multiple defense system developments. Mr. Moore has a BS in Electrical Engineering from the University of Detroit, an MS in Electrical Engineering from the University of Dayton, and forty years of involvement with computer engineering. He has also served for the past 21 years as a School Board member at Oneida-Herkimer-Madison BOCES.
Dr. Jeanna N. Matthews – Clarkson University
Title: Big Data’s Big Problems
The data that we record daily about ourselves through our cell phones, credit card purchases, emails, social media postings, etc., helps us connect with each other and improve our quality of life. However, we are also enabling a set of societal harms that we have not yet begun to grapple with seriously. I will be discussing some of the problems of big data including insufficient anonymization and unfairness in automated decision making.
Jeanna Neefe Matthews is an associate professor of Computer Science at Clarkson University (Potsdam, New York). Her research interests include virtualization, cloud computing, computer security, computer networks and operating systems. At Clarkson, she leads several hands-on computing laboratories including the Clarkson Open Source Institute and Clarkson Internet Teaching Laboratory. Students in these labs and in her classes at Clarkson and Cornell have been winners in a number of prestigious computing contests including the 2001, 2002, and 2004 IBM Linux Challenge, the 2005 IBM North American Grid Scholar’s Challenge, the 2005 Unisys Tuxmaster competition, and the 2006 VMware Ultimate Virtual Appliance Challenge. She is currently a member of the Executive Committee of ACM as the Chair of the Special Interest Group Governing Board. She has written several popular books including Running Xen: A Hands-On Guide to the Art of Virtualization and Computer Networking: Internet Protocols in Action. Jeanna received her Ph.D. in Computer Science from the University of California at Berkeley in 1999, a B.S. in Mathematics and Computer Science from Ohio State University in 1994 and a B.A. in Spanish from the State University of New York at Potsdam in 2015.
Here are some photos taken from the Spring 2016 CNY Hackathon event. Everyone had a lot of fun and the event turned out to be a huge success!
Our CTF design lead Mike Lisi has been hard at work over the past three months developing the 2016 CNY Hackathon Capture the Flag challenges. Unfortunately, Mike will not be able to attend the event this semester so he has prepared a document explaining everything that you will need to know in order to get started. The document can be downloaded at the following link:
As many of you have heard we are revamping the format of the CNY Hackathon event this semester to be more realistic. There will no longer be multiple rounds, instead the event will consist of two parts which will last the entire day. There will be a Capture the Flag (CTF) portion and an infrastructure portion. For the CTF portion of the event multiple virtual machines will be sitting on the WAN portion of the network that are loaded with flags for the teams to capture. When a team finds a flag they will enter it into the new scoring engine, and if it is valid then the points for that particular flag will be added to their score. The infrastructure portion of the event is geared towards network defense and administration. Students will have full virtual networks that they will have to defend against a Red Team of professional attackers. Teams will accumulate points based on service uptime checks. The object is to keep the Red Team out and keep the services up. Students will have to configure their router virtual machines at the start as well as all of the networking information and port forwarding rules for their internal server systems and workstations before they can start getting points. The first team to get their services online and open to the scoring engine will get a head start on point accumulation. The following network diagram depicts the new design: (Click the image for a larger view)
Remember to bring your resumes to the Hackathon event this semester! The following companies will be present during the event to talk with students about job and internship opportunities. They will also have the chance to walk around during the event and observe student teams in action!
M.A. Polce Consulting, Inc.
AIS (Assured Information Security)
Harris Critical Networks
Critical Technologies, Inc.
Quanterion Solutions, Inc.