CS/ECE Applied Cryptography Dr. Attila Altay Yavuz

Slides:



Advertisements
Similar presentations
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Advertisements

Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
FIT3105 Smart card based authentication and identity management Lecture 4.
1 29 September 2010 NATO IST-092 Symposium New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2 Christopher Dearlove
Practice and Experience in the Application of Cryptography Bao Feng Cryptography and Security Department.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
BLENDED LEARNING Technology in the Traditional Classroom Alyssa DeBlasio, PhD (Dickinson College, USA)
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Introduction to Network Security Dr. Attila Altay Yavuz Big Picture and Organization.
1 Pervasive & Ubiquitous Computing (UbiComp) Lecture #1: Introduction Hao-hua Chu ( 朱浩華 )
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
IS Doctoral Seminar in Systems and Technology Information Assurance James Joshi August 31, 2011.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Big Picture and Organization Advanced.
Most of contents are provided by the website Introduction TJTSD66: Advanced Topics in Social Media Dr.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Applied Cryptography Dr. Attila Altay Yavuz Big Picture and Organization Applied.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Topic 1.0 Big Picture, Vision.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Introduction to Network Security Dr. Attila Altay Yavuz Big Picture and Organization.
Security of the Internet of Things: perspectives and challenges
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Big Picture and Organization
CS6501/ECE6501 IoT Sensors and Systems
Proposal for Term Project Information Security, Fall 2016
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Principles of Computer Security
VANET.
The Vertically-Integrated Projects (VIP) Program: Integrating Undergraduate Education and Graduate Research Bloom, B. S. (Ed.). (1956). Taxonomy of educational.
Program Analysis and Software Security
ISO Smart and Sustainable Cities developments
Introduction to Information Security
Introduction to Information Security
ASSET - Automotive Software cyber SEcuriTy
Data & Network Security
World-Leading Research with Real-World Impact!
Living in a Network Centric World
Living in a Network Centric World
ITIS 6200/8200: HCIP 6200 Principles of Information Security and Privacy Dr. Weichao Wang.
Industry-based Senior Project in the
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Internet of Things (IoT)
International Collaboration Project on Information Security
Cryptography and Computer Security for Undergraduates
Overlay Networking Overview.
SPINS: Security Protocols for Sensor Networks
Skills Workshop Mentors & Mentees
Living in a Network Centric World
BROADCAST AUTHENTICATION
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Living in a Network Centric World
CS 8532: Advanced Software Engineering
SPINS: Security Protocols for Sensor Networks
CS6501 Embedded Operating Systems for the IoT
Living in a Network Centric World
ISO Smart and Sustainable Cities developments
Living in a Network Centric World
What I’ve done in the past 6 months
Lecture on High Performance Processor Architecture (CS05162)
IS8014 Theory & Qualitative Research in IS Week 1:
Presentation slide for courses, classes, lectures et al.
Course Overview and Organization
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Data and Applications Security Developments and Directions
Cyber Security R&D: A Personal Perspective
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Living in a Network Centric World
Presentation transcript:

CS/ECE Applied Cryptography Dr. Attila Altay Yavuz Big Picture and Organization Applied Cryptography Dr. Attila Altay Yavuz Winter 2017

Outline (current lecture) Self-introduction Course Objectives (overview) Touching important problems and tools (name & functionality) Grading Requirements Example Project Topics Decision on your topic, assess your background/commitment Dr. Attila Altay Yavuz

Self-Intro Assistant Professor, EECS at Oregon State University Adjunct Faculty, University of Pittsburgh (Jan. 2013 - now) Research Scientist, Bosch Research Center (Dec. 2011- Aug. 2014) Develop security and privacy research programs Privacy-preserving Big Data Technologies Secure Internet-of Things and Systems Ph.D., North Carolina State University (Jan. 2007- Aug. 2011) Compromise Resilient and Compact Crypto for Digital Forensics MS, Bogazici University (2004-2006) Efficient Crypto Mechanisms for Military Ad-hoc Networks Dr. Attila Altay Yavuz

Self-Intro (Cont’) Research Interests: Applied cryptography, network security, privacy Academic Collaborations: Upitt, UNC, UCI, Purdue, CMU Some Impact Examples: Secure Intra-car Networks (OEMs, 2019) Privacy-Preserving Medical Databases (HCTM, 2017-2020) ECU Oblivious Search and Cloud Accesses 2017-2022 Cyber-infrastructure security and forensics Dr. Attila Altay Yavuz

Big Picture: Technology Trends & Vision Inter vehicular networks Smart-infrastructures and distributed systems Big Data Technologies Long term Smart-grid Smart-city Medium term Smart Home Near term Digitalized Healthcare Inf. Sys. Cloud-based Applications

Requirements and Challenges Challenges of Security and Privacy in IoTS Requirements and Challenges Cloud-based Services Smart-home and WSNs Heterogeneity Vehicular networks (e.g., Car-2-X) High Performance/Scalability Data Availability Interconnectivity SOMETHING MISSING?

Privacy Breaches: Big Data and IoTS Need for Privacy Enhancing Technologies

Cyber Physical Systems - Vulnerabilities Reliable Cyber-Physical Systems (e.g., smart-grid) are vital Susceptible: Northeast blackout (2003), 50 million people, $10 billion cost Attacks: False data injection [Yao CCS09’], over 200 cyber-attacks in 2013 Vulnerability: Commands and measurements are not authenticated Requirements for a security method Real-time  Extremely fast processing (a few ms) Limited bandwidth  Compact Several components  Scalability Limitations of Existing Methods PKC is not yet feasible (computation, storage, tag size) Symmetric crypto is not scalable (key management)

Inter-car and Intra-car Networks Security Challenges for Smart-Infrastructures (II) Vulnerability: Commands and measurements are not authenticated Security for Inter-car Networks Manipulate direction/velocity, crashes Security for Intra-car Networks Large attack surface [Usenix '11] ECUs of break/acceleration, airbag Challenges Strict safety requirements Limited bandwidth, real-time processing The state-of-art cannot address (as discussed) ECU Internet

Pillars and Target Topics Please check course website for material and Syllabus! Pillar I-II: Authentication and Integrity Broadcast Authentication: Internet, wireless net., multi-media, … Vehicular networks, power-grid, smart-grid, drones… Specialized Signatures: Real-time, compromise-resilient, hybrid, … Pillar III: Privacy (Confidentiality) and Functionality Privacy Enhancing Technologies Cloud computing and data outsourcing: SE, ORAM, Garbled Circuits, OT Pillar IV: Availability and Resiliency (time permits) Denial of Service (Client-server application)

Background Requirements: None enforced, BUT No specific requirement enforced, self-assess your readiness Research-oriented, elective grad course (PhD focus), but still, some undergraduate received significant benefit from it before (some not). Independent work and research are essential A previously taken cryptography/network security class is a suggested CS 419 Introduction to Network Security CS 519 Special Topics on Crypto/NetSec CS 419 Cryptography (Mike Rosulek) A good programming skill is necessary for some projects Good C/C++ experience, Linux Java/C# may be ok (but C/C++ rules the crypto world, for good reasons!) How to achieve more in less than two months? Form sub-teams and integrate them into my research group It is your responsibility to compensate missing knowledge gap

High-Level Objectives (All tentative) RSA, Condensed-RSA, Practical Immutable Signature Bouquets HAA (Hardware-Accelerated Authentication) and Structure-Free Compact Authentication (BLS Signatures extra) Broadcast Authentication (2 lectures) TESLA: Playing with time factor  efficient authentication EMSS: Address non-repudiation and sync. issues Group Key Management and Exchange DH, Group DH 1,2-3 with O(L) overhead Iolus Tree-based Group DH Logical Key Hierarchy One-way Function Tree

High-Level Objectives (Authentication Track) Dynamic Symmetric Searchable Encryption (DSSE) (1 lecture) Guest Lecture from Intel’s Former Chief Cryptography (1 lecture) Oblivious Random Access Memory (2 lecture) [student] Basic ORAM, Partition ORAM, Path ORAM Novel ORAM constructions with highly efficient constants Oblivious Dynamic Searchable Encryption (Guest Lecture) A multi-server approach Multi-server PIR Techniques Light-weight Cryptographic Services for IoT Devices [student] Self-certified Cryptography for key exchange BPV Technique, Improved Crypto suites

High-Level Objectives (Authentication Track) Lattice-based Cryptographic Constructions (1 lecture) NTRU Overview PEKS and ESE Guest Lecture from RSA Corp. (potential) (1 lecture) Student Presentation (first timers) Potentially first research-focus presentation, and it is OK See how previous presentations are done (plenty) A similar quality and effort is expected Motivation Contributions of the paper, difference with the state of the art Main idea, what is the crux of it? Without technical details at the beginning Tie this with unique contributions Bring the technical details All equations and statements, you must understand it Don’t put anything on a slide that you did not understand! Comparison with the state-of-the-art

Student Presentations Depends on the size of the class Students with no prior presentation opportunity will be prioritized. Two high-quality paper to be presented. One base paper and one the most recent progress paper  See course website about requirements Topics to be selected: Privacy-preserving data mining I and II (two students 4 papers) Physical Layer Security Secure Multi-Party Computation Hardware-security OS security

Potential Projects and Presentations PhD students can purse their own research as a part of the course Please coordinate with your advisor. This is critical. Prior projects (from Fall 2016) continues so no change is needed Class project is different then co-authoring, which requires: Contribution well-beyond class Continuous involvement, completing all aspects, active writing efforts Potentially 4-6 months more work after the class! But well-worth if you commit

Grading In-class paper presentation, %40 (subject to change) See potential topics at the webpage Full lecture style (or a single paper style) + question preparation Research Project or survey/implementation, %55 (subject to change) Discussions with the team leader (if not alone) Interim Report Graded Common mistake to omit Discussion and agenda for deliverables and grading accordingly Class attendance/participation %5 Please let me know if you will continue this course by this week You are expected to conduct your research independently.