keynote 1        keynote 2       keynote 3 


Keynote 1:

The Persistent Problem of Applications Insecurity

Elisa Bertino

Professor of Computer Science

Purdue University, USA

Abstract:

Data is a critical resource and as such it is very often the target of cyber-attacks with a variety of goals, including data theft and ransom requests. Today database systems provide several effective security controls and defenses, such as database encryption, fine-grained content and context-based access control, role-based access control, and logging capabilities for security relevant events. In addition, database systems support a variety of authentication techniques, such as multi-factor authentication. However, there is a major weak point in data security: the applications. Once data is transmitted from a database to applications, the data is exposed to many risks if applications have vulnerabilities. Unfortunately, applications and more in general software systems are still often insecure, despite the fact the “problem of software security” had been known to the industry and research communities for decades. In the case of database applications, for example, SQL injection vulnerabilities – known since more than 20 years, are still common; for example just in 2022, 1162 vulnerabilities with the type “SQL injections” were accepted as a common CVE (common vulnerability exposure). In this talk, I first briefly argue why the software security problem is more complex than ever. I then focus on the problem of SQL injection and other vulnerabilities, often occurring in database applications, and present an initial approach to automatically detect these vulnerabilities and “repair” them. I also cover the case of a more sophisticated attacker, able to tamper the application code. I then move to discuss the problem of software supply-chain attacks and research directions.

Biography:

Elisa Bertino is Samuel Conte professor of Computer Science at Purdue University. Prior to joining Purdue, she was a professor and department head at the Department of Computer Science and Communication of the University of Milan. She has been a visiting researcher at the IBM Research Laboratory in San Jose (now Almaden) and at Rutgers University. She has held visiting professor positions at the Singapore National University and the Singapore Management University. Her recent research focuses on security and privacy of cellular networks and IoT systems, and on edge analytics for security. Elisa Bertino is a Fellow member of IEEE, ACM, and AAAS. She received the 2002 IEEE Computer Society Technical Achievement Award for “For outstanding contributions to database systems and database security and advanced data management systems”, the 2005 IEEE Computer Society Tsutomu Kanai Award for “Pioneering and innovative research contributions to secure distributed systems”, the 2019-2020 ACM Athena Lecturer Award, and the 2021 IEEE 2021 Innovation in Societal Infrastructure Award. She is currently serving as ACM vice-president.

Keynote 2:

Trust in the Untrusted World

Divyakant Agrawal

Professor of Computer Science

University of California at Santa Barbara, USA

Abstract:

We live in interesting times in that our digital lives have become increasingly interdependent and interconnected. Such interconnections rely on a vast network of multiple actors whose trustworthiness is not always guaranteed. Over the past three decades, rapid advances in computing and communication technologies have enabled billions of users with access to information and connectivity at their fingertips. Unfortunately, this rapid digitization of our personal lives is also now vulnerable to invasion of privacy. In particular, now we have to worry about the malicious intent of individual actors in the network as well as large and powerful organizations such as service providers and nation states. In the backdrop of this reality of the untrusted world, we raise the following research questions: (i) Can we design a scalable infrastructure for voice communication that will hide the knowledge of who is communicating with whom? (ii) Can we design a scalable system for oblivious search for documents from public repositories? (iii) Can we develop scalable solutions for private query processings over public databases? These are some of the iconic problems that must be solved before we can embark on building trusted platforms and services over untrusted infrastructures. In this talk, we present a detailed overview of a system for voice communication that hides communication metadata over fully untrusted infrastructures and scales to tens of thousands of users. We also note that solutions to the above problems rely on an intermediary service provider. We conclude this talk with an open question on the efficacy of a decentralized paradigm for cryptocurrency in the broader context of our digital lives that can potentially eliminate the need for an intermediary in provisioning trusted services and platforms.

Biography:

Divy Agrawal is a Distinguished Professor of Computer Science at the University of California at Santa Barbara. He received BE(Hons) from BITS Pilani in Electrical Engineering and then received MS and PhD degrees in Computer Science from State University of New York at Stony Brook. Since 1987, he has been on the faculty of computer science at the University of California at Santa Barbara. His research expertise is in the areas of databases, distributed systems, cloud computing, and big data infrastructures and analysis. Over the course of his career, he has published more than 400 research articles and has mentored approximately 50 PhD students. He serves as Editor-in-Chief of the Springer journal on Distributed and Parallel Databases and has either served or is serving on several Editorial Boards including ACM Transactions on Databases, IEEE Transactions on Data and Knowledge Engineering, ACM Transaction on Spatial Algorithms and Systems, ACM Books, and the VLDB Journal. He served as a Trustee on the VLDB Endowment and is currently serving as the Chair of ACM Special Interest Group on Management of Data (ACM SIGMOD). He received a Gold Medal from BITS Pilani. Professor Agrawal is the recipient of the UCSB Academic Senate Award for Outstanding Graduate Mentoring. He is a Fellow of the ACM, the IEEE, and the AAAS.



Keynote 3:

What Makes Database Systems Fast? An Ablation Study

Thomas Neumann

Professor of Computer Science

Technical University of Munich, Germany

Abstract:

Database systems are very complex pieces of software, which makes comparisons notoriously difficult. One system being faster than another for one particular workload can have a multitude of reasons, which makes absolute performance numbers hard to interpret. In this talk we therefore study the affect of implementation techniques while staying within one execution engine, our research system Umbra. We discuss a number of techniques we have used to speed up query processing, and try to quantify their impact by explicitly disabling them. Which gives an overview over how impactful individual techniques are and what has to be implemented to get a fast database system.

Biography:

Thomas Neumann is a full professor in the Department of Computer Science at the Technical University of Munich. After his PhD in Computer Science at the University of Mannheim in 2005, he was Senior Researcher at the Max-Planck Institute for Informatics in Saarbrücken until 2010. His research interests are in the areas of database systems, query processing, and query optimization. In 2020, he received the Gottfried Wilhelm Leibniz Prize.