Cybersecurity Research Challenges

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Operating System Security
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
VM: Chapter 5 Guiding Principles for Software Security.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
A First Course in Information Security
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
BRAIN: Brain Research through Advancing Innovative Neurotechnologies Announced by President Obama in February 2013 as part of FY 2014 Budget Request to.
Operating Systems AOIT Principles of Information Technology.
4/2/03I-1 © 2001 T. Horton CS 494 Object-Oriented Analysis & Design Software Architecture and Design Readings: Ambler, Chap. 7 (Sections to start.
Security in Computer System 491 CS-G(172) By Manesh T
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
Computing and Communications and Biology Molecular Communication; Biological Communications Technology Workshop Arlington, VA 20 February 2008 Jeannette.
Organizational Structure Coordination and Leadership Group (CLG) AD Council BIOCISEEHRENGGEOMPSSBE OIIA Charge: Coordinating NSF’s cyberinfrastructure.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Cybersecurity Research Challenges Cybersecurity Summit, Crystal City, VA May 8, 2008 Jeannette M. Wing Assistant Director Computer and Information Science.
IS3220 Information Technology Infrastructure Security
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Chapter 21 Successfully Implementing The Information System.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
CS457 Introduction to Information Security Systems
Dibyajit Computer Security Hacking dibyajit
Chapter 7. Identifying Assets and Activities to Be Protected
Cyber Security – An Existential Threat? (IIC, Singapore)
Information Security, Theory and Practice.
Add video notes to lecture
Educause/Internet 2 Computer and Network Security Task Force
Data and database administration
Chapter 1: Introduction
N-Tier Architecture.
Software Security Testing
COMP3357 Managing Cyber Risk
STEGANOGRAPHY.
Advance Software Engineering
Key Issues in Licensing Software and Associated Intellectual Property: Matching Licensing Models to Business Strategies Steve Mutkoski Regional Director,
Information and Network Security
IBM Start Now Host Integration Solutions
Information and documentation media systems.
TRUST:Team for Research in Ubiquitous Secure Technologies
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Today’s Risk. Today’s Solutions. Cyber security and
IS4550 Security Policies and Implementation
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
Introduction to Cyber Security
Digital Certificates HUIT IT Security | May
Chapter 27 Security Engineering
ONE® Mail Training Presentation
How to Mitigate the Consequences What are the Countermeasures?
REAL-TIME, INTERACTIVE DOCUMENT AUTOMATION
Faculty of Science IT Department By Raz Dara MA.
Chapter 1: Introduction
Engineering Secure Software
The Secure Contingency Plan
O.S. Security.
Instructor Materials Chapter 5: Ensuring Integrity
Cyber Security R&D: A Personal Perspective
Securing web applications Externally
Presentation transcript:

Cybersecurity Research Challenges Jeannette M. Wing Assistant Director Computer and Information Science and Engineering Directorate National Science Foundation and President’s Professor of Computer Science Carnegie Mellon University Cybersecurity Summit, Crystal City, VA May 8, 2008

Outline The Setting: Then and Now What’s Missing Long-term outlook Big picture 5 new research areas Cybersecurity Jeannette M. Wing

The Setting: Then and Now We are at risk. Increasingly, America depends on computers. They control power delivery, communications, aviation, and financial services. They are used to store vital information, from medical records to business plans to criminal records. Although we trust them, they are vulnerable—to the effects of poor design and insufficient quality control, to accident, and perhaps most alarmingly, to deliberate attack. The modern thief can steal more with a computer than with a gun. Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb. 1991 Computers at Risk, National Academies CSTB Study, p. 7. 8 networked systems 1999 Trust in Cyberspace, CSTB Study. 8 ubiquity 2001 September 11 everywhere, everyone, all the time, embedded, invisible, visible, mobile, wearable, handheld, remote, peta, tera, giga, mini, micro, nano, good guys, bad guys 2007 Improving Cybersecurity for the 21st Century, CSTB Study. Cybersecurity Jeannette M. Wing

Cybersecurity Jeannette M. Wing Credit: NCO/NITRD Credit: U.S. Department of Homeland Security Credit: NCO/NITRD Cybersecurity Jeannette M. Wing

What’s Missing in Our Thinking Be proactive, not reactive. We are using yesterday’s solutions to address today’s threats. We should be ready today for tomorrow’s threats. We are not. Anticipate the future. Long-term outlook Big picture view Foundational research Cybersecurity Jeannette M. Wing

Long-Term Outlook: Who and Why Threats Today: hackers, criminals Tomorrow: organized crime, terrorists, nation-state, enemy state Motivation Today: fame, money Tomorrow: power, control Attacks Use cyberattack as an amplifier of a physical attack Cyberspace is an enabler Attack the Internet More likely as we put more key functionality on-line Use cyberspace to hide Today (2008) Cybersecurity Jeannette M. Wing

Long-Term Outlook: How Today: code-level vulnerabilities Flaws in the code Tomorrow: component-level vulnerabilities Flaws in the design module, system, application, service, … aka interface mismatch, composition flaws, feature interaction, … Simple examples of design-level flaws - Netscape browser and Domain Name Server spoofing attack, Princeton [DFW96] - Google Desktop Search and Java applets, Rice [NFW04] - Microsoft Outlook and IE settings, Microsoft Research and Carnegie Mellon [PW05] Cybersecurity Jeannette M. Wing

Big Picture: It’s not just security Cyber Security and Information Assurance Big Picture: It’s not just security Trustworthy systems Security Reliability Privacy Usability people hardware program prog. lang. O/S compiler system arch. application service High Confidence Systems Holistic view Technical: The whole stack  Non-Technical Psychology and human behavior - Usable security - Social engineering attacks - Privacy - Insider threat - Attacker’s motivation Economics, risk management, law, politics Cybersecurity Jeannette M. Wing

Cybersecurity Jeannette M. Wing Credit: NCO/NITRD

What’s Missing? 5. Usability 1.Foundations 2. Software security 4. Privacy 3. Metrics 2. Software security 2. Composability 5. Usability What’s Missing? Cybersecurity Jeannette M. Wing Credit: NCO/NITRD

1. Foundations New models, logics, and theories for analyzing and reasoning about Security Reliability Privacy Usability Crypto for quantum Cybersecurity Jeannette M. Wing

Foundations: Security Models Yesterday: Security Perimeter - Bell-LaPadula model, Orange Book - Lampson’s access rights matrix - Secure O/S kernel Egeskov Slot, Denmark (1554) Today: “Security Without Borders” Spread of Code Red Worm 2001 drawbridge moat Where’s the perimeter? What do you try to protect? Cybersecurity Jeannette M. Wing

Foundations: Logics for Reasoning About Privacy Do you read these? What are they saying? Can you trust them? This privacy statement goes on for seven screenfuls! Cybersecurity Credit: Microsoft Jeannette M. Wing

Foundations: Cryptography Quantum/traditional cryptography immune to quantum-based attacks Traditional cryptography based on RSA is breakable by Shor’s quantum algorithm Credit: Oxford University Cybersecurity Jeannette M. Wing

2. Security Architectures What we have Point solutions to point problems, e.g., Code-level solutions buffer overruns Firewalls for intrusion detection What we need Integration of solutions Up and down the vertical stack, from hardware to appl’ns. At each layer, e.g., routers and links at the network layer Compositionality of components and services Cybersecurity Jeannette M. Wing

Composition of Components and of Security Policies Global Security Policy (GSP)  Consider more simply, SPA  SPB: SPA  SPB  GSP SPA  SPB  SPA and SPA  SPB  SPB ? Local Security Policy (SPA) Local Security Policy (SPB) || Consider the composition A || B: A || B GSP A || B SPA and A || B SPB ? Component A Component B Cybersecurity Jeannette M. Wing

Google Desktop Search Google Desktop Search results www.google.com results Cybersecurity Jeannette M. Wing Credit: Google

Netscape and Domain Name Server Give me an IP address for user.foo.com browser DNS server Here is one: 1.2.3.4 Names to IP addresses mapping user.foo.com [1.2.3.4, 1.2.3.5, 1.2.3.6] user.bar.com [1.2.3.5, 1.2.3.7] Cybersecurity Jeannette M. Wing

3. Security Metrics Challenge #3: Computing Research Associates Grand Challenges on Trustworthy Computing, November 16-18, 2003 http://www.cra.org/grand.challenges Challenge #3: Within 10 years, develop quantitative information-systems risk management that is at least as good as quantitative financial risk management. Cybersecurity Jeannette M. Wing

Measuring the Relative Attack Surface Windows NT 4 Windows 2000 Windows Server 2003 RASQ RASQ with IIS enabled RASQ with IIS Lockdown 100 200 300 400 500 600 700 3. Windows in “lockdown” mode for NT4.0 and 2000 are each more secure than raw mode. 1. Windows Server 2003 is “more secure” than previous versions. 2. Windows w/IIS enabled is only slightly worse for Windows Server 2003, in contrast to its predecessors. Cybersecurity Jeannette M. Wing

Attack Surface Attacks system surface 1. Methods 2. Channels 3. Data Attacks Entry/Exit Points The attack surface of a system is the ways in which an adversary can enter the system and potentially cause damage. Reduce the attack surface  Increase system’s security Cybersecurity Jeannette M. Wing

4. Privacy Today: Threats to citizens’ privacy in many sectors of daily life Health, financial, e-commerce, social networks, e-voting Fundamental challenge: Once someone learns a secret about you, you cannot take away that knowledge Different from security (e.g., revoking access to a file, changing a lock on a door) Cybersecurity Jeannette M. Wing

Privacy: A Few Questions to Ponder What does privacy mean? How do you state a privacy policy? How can you prove your system satisfies it? How do you reason about privacy? How do you resolve conflicts among different privacy policies? Are there things that are impossible to achieve wrt some definition of privacy? How do you implement practical mechanisms to enforce different privacy policies? As they change over time? How do you measure privacy? (Is that a meaningful question?) Cybersecurity Jeannette M. Wing

Privacy and Confidentiality Doctor Billing bill X-ray Patient Database Only the doctor may see the privacy policy What other privacy policies does the database enforce? Unfortunately, such confidentiality policies are embedded in source code. Cybersecurity Jeannette M. Wing

Privacy and Software Analysis extraction tool application code policy Cybersecurity Jeannette M. Wing

5. Usability The user is the weakest link in security. Challenges Striking a balance between control and convenience Users are human. Targets of social engineering attacks Sources of insider threats Cybersecurity Jeannette M. Wing

Usable Security (IE) Clicking Your Way Through Security Cybersecurity Jeannette M. Wing

Usable Privacy (Firefox) Clicking Your Way Through Privacy Cybersecurity Jeannette M. Wing

Summary of Research Challenges New research foci Theoretical foundations: models, logics, crypto Software architecture Metrics Privacy Usability Enhanced investments in existing research foci: Software security engineering Networking Testbeds Cybersecurity Jeannette M. Wing

Summary of What’s Missing Anticipate tomorrow’s threat. Take a broad view. Long-term Holistic Research Basic research in new areas Enhanced investments in existing areas Education Cybersecurity Jeannette M. Wing

Good guys and bad guys are in a never-ending race! Trustworthy Security Axiom Good guys and bad guys are in a never-ending race! The Good Guys try to ensure the Security Properties. The Bad Guys launch the Security Attacks. Cybersecurity Jeannette M. Wing

Thank you.

Academia-Industry Relations Old Model Go it alone Individual work Slow, serial Focus on ideas Basic research Less focus on specific ideas Simpler regulations Funding sufficiency Companies had money Indirect benefits New Model Partnered Joint work Fast, parallel Focus on IP Bayh-Dole (1985) Applied research More focus on specific ideas Complex regulations Tax rules, export rules, COI Funding challenges Research $ at program manager level Direct benefits Cybersecurity Jeannette M. Wing

Credits Copyrighted material used under Fair Use. If you are the copyright holder and believe your material has been used unfairly, or if you have any suggestions, feedback, or support, please contact: jsoleil@nsf.gov Except where otherwise indicated, permission is granted to copy, distribute, and/or modify all images in this document under the terms of the GNU Free Documentation license, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation license” (http://commons.wikimedia.org/wiki/Commons:GNU_Free_Documentation_License) Cybersecurity Jeannette M. Wing