Information Security Research and Education at Aalto

Slides:



Advertisements
Similar presentations
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Advertisements

Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
Process Coloring: an Information Flow-Preserving Approach to Malware Investigation Eugene Spafford, Dongyan Xu Department of Computer Science and Center.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Towards A User-Centric Identity-Usage Monitoring System - ICIMP Daisuke Mashima and Mustaque Ahamad College of Computing Georgia Institute of Technology.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
University of Tulsa - Center for Information Security Center for Information Security: An Overview October 4th, 2002.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Research at MSEC Vincent Naessens – Jorn Lapon – Jan Vossaert – Koen Decroix – Faysal Boukayoua – Laurens Lemaire.
Senior Project Ideas: Blind Communication & Internet Measurements Mehmet H. Gunes.
DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor Craig Shue
Network security Product Group 2 McAfee Network Security Platform.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
TGDC Meeting, July 2010 Security Considerations for Remote Electronic UOCAVA Voting Andrew Regenscheid National Institute of Standards and Technology
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Automatic Detection of Emerging Threats to Computer Networks Andre McDonald.
Data and Applications Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas April 25, 2006.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
TEMPLATE DESIGN © Automatic Classification of Parameters and Cookies Ali Reza Farid Amin 1, Gregor v. Bochmann 1, Guy-Vincent.
Avtec Inc Virtualization - Securely Moving to the Cloud.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
CMSC 818J: Privacy enhancing technologies Lecture 2.
Clouding with Microsoft Azure
Seminar Announcement December 24, Saturday, 15:00-17:00, Room: A302, WNLO Title: Quality-of-Experience (QoE) and Power Efficiency Tradeoff for Fog Computing.
2017 Security Predictions from FortiGuard Labs
Security in Internet of Things Begins with the Data
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
5/31/2018 3:40 PM BRK3113 How Microsoft IT builds Privileged Access Workstation using Windows 10 and Windows Server 2016 Jian (Jane) Yan Sr. Program Manager.
Real-time protection for web sites and web apps against ATTACKS
IoT at the Edge Technical guidance deck.
Private and Secure Biometric User Authentication in the Web Master Thesis Defense Zaki Alsubhi Department of Computer Science University of Colorado.
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Prof. Yrjö Neuvo Chairman of the Aalto DigimPlatform
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Privacy-preserving Machine Learning
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
IoT at the Edge Technical guidance deck.
Internet of Things (IoT)
Institute for Cyber Security: Research Vision
On the Efficacy of Anomaly Detection in Process Control Networks
Networking Specialization Overview
Institute for Cyber Security: Research Vision
Four Generations of Security Devices Putting IDS in Context
Cloud Security 李芮,蒋希坤,崔男 2018年4月.
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Common-sense applications of hardware-based TEEs
Can blockchains be made better using hardware-assisted security?
UTSA Cyber Security Ecosystem
Attribute-Based Access Control: Insights and Challenges
Stealing DNN models: Attacks and Defenses
Privacy-preserving and Secure AI
MEETING AT NYU WIRELESS 24th April 2018
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
Computer Science and Engineering
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware Kriti shreshtha.
Institute for Cyber Security Overview
Erica Burch Jesse Forrest
Cyber Security R&D: A Personal Perspective
Securing Cloud-assisted Services
INTERNET SECURITY.
IT Applications with Emerging Techniques: Security Solutions
Cloud Computing for Wireless Networks
Presentation transcript:

Information Security Research and Education at Aalto N. Asokan http://asokan.org/asokan/ @nasokan

About me Professor, Aalto University, from Aug 2013 Professor, University of Helsinki, 2012-2017 IEEE Fellow (2017), ACM Distinguished Scientist (2016) Associate Editor-in-Chief, IEEE Security & Privacy (2017) Previously Nokia (14 y; built up Nokia security research team) IBM Research (3 y) https://asokan.org/asokan/ for more background

Secure Systems Group Prof N. Asokan Prof Tuomas Aura Dr Andrew Paverd Professor, Department of Computer Science Director: Helsinki-Aalto Center for Information Security https://asokan.org/asokan/ Prof Tuomas Aura Professor, Department of Computer Science Director: SECCLO joint degree program https://people.aalto.fi/tuomas_aura Dr Andrew Paverd Research Fellow, Department of Computer Science Deputy Director: Helsinki-Aalto Center for Information Security https://ajpaverd.org

Secure Systems Group How to make it possible to build systems that are simultaneously easy-to-use and inexpensive to deploy while still guaranteeing sufficient protection? Usability Deployability/Cost Security

Building systems that are secure, usable, and deployable Research Building systems that are secure, usable, and deployable

Current major themes Platform Security How can we design/use pervasive hardware and OS security mechanisms to secure applications and services? Machine Learning & Security Can we guarantee performance of machine-learning based systems even in the presence of adversaries?

Research: Platform Security

Platform security: overview Applications of platform security Examples: Protecting password-based web authentication systems Breaking & repairing deniable messaging Novel platform security mechanisms Linux kernel hardening Hardening embedded systems (C-Flat and HardScope)

SafeKeeper: Protecting Web Passwords How can we use widely available trusted hardware to deter password database theft and server compromise? Web Server f(k,p,s), s salt (s) key (k) Browser f password (p) =? (k) Client-side browser extension TEE https://ssg.aalto.fi/research/projects/passwords/

Attestation can help restore deniability in messaging Breaking & repairing deniable messaging Attestation can be used to undetectably break deniable messaging Attestation can help restore deniability in messaging Deniable messaging is useful… whistleblowers, marginalized, politicians,… and popular Signal/WhatsApp, Telegram, OTR, … Undetectably breaking deniability have TEE attest received messages to skeptical verifiers S/W attacker: thwarted using attestation H/W attackers are hard to defend against https://eprint.iacr.org/2018/424

Research: ML & Security

Machine learning and Security Machine learning for security and privacy Examples: Fast client-side phishing detection (off-the-hook) Detection of vulnerable/compromised IoT devices (IoT Sentinel and DÏoT) Security and privacy of machine-learning based systems Privacy-preserving neural network predictions (MiniONN) Model stealing: attacks and defenses

IoT Sentinel: Automated device-type identification How to protect smart home networks from vulnerable IoT devices? IoT Security Service Provider Security Gateway IoT Device Device Classification Isolation Profile Generation Enforcement Rule DB Device Fingerprinting 2. Identify device-type using fingerprint 3. Isolation decision based on security assessment of device-type 1. Passively monitor communications and extract device fingerprint 4. Enforcement of device isolation using traffic filtering https://ssg.aalto.fi/projects/seliot

DÏoT: A self-learning system for detecting compromised IoT devices Can an IoT network autonomously detect compromised IoT devices? Device Fingerprinting Anomaly Detection Local SOHO network Security Gateway Device Identification Device detection Profiling IoT Security Sevice Provider DÏoT system design Self-learning device-type identification Device-type-specific anomaly detection model Distributed and collaborative system Performance evaluation 98% accuracy in devices-type identification 94% detection of Mirai (IoT botnet) attacks No false positives https://arxiv.org/abs/1804.07474

Privacy-preserving Neural Networks How to make cloud-based prediction models preserve privacy? Input Input Blinded input oblivious protocols Predictions Blinded predictions Predictions violates clients’ privacy Use inexpensive cryptographic tools MiniONN (ACM CCS 2017) https://eprint.iacr.org/2017/452 By Source, Fair use, https://en.wikipedia.org/w/index.php?curid=54119040

Building systems that are secure, usable, and deployable Research: Other Building systems that are secure, usable, and deployable Skip to Education Skip to summary

Other themes / Emerging topics Distributed consensus and blockchains (theory, applications) [AoF BCon, ICRI-CARS] Can hardware security mechanisms help design scalable consensus schemes? Securing IoT (scalability, usability) [AoF SELIoT] How do we secure IoT devices from birth to death? Stylometry and security [HICT scholarship] Can text analysis help detect deception?

Stay On-Topic: Generating Context-specific Fake Restaurant Reviews How close are we to creating machine-generated deceptive online text? FAKE NMT-Fake* creates fake reviews from description: 5 Chipotle Mexican Grill Las Vegas NV Mexican Fast Food User study with skeptical people: Very poor detection, almost random (~53%) Detectable with machine learning (~97%) Demo: generate your own fake restaurant reviews REAL REAL https://arxiv.org/abs/1805.02400

Media coverage of our research

Research Funding (Summary) Cloud Security Services (CloSer 2016 - 2018) Funded by Business Finland (formerly Tekes) Securing Lifecycles of IoT devices (SELIoT 2017 - 2019) Funded by NSF and Academy of Finland (WiFiUS program) Aalto (Asokan), UC Irvine (Tsudik), U Florida (Traynor) Intel Collaborative Research Institute (ICRI-SC 2014 – 2017 & ICRI-CARS 2017 - 2020) Secure Computing Collaborative, Autonomous and Resilient Systems Blockchain Consensus and Beyond (Bcon 2017 - 2020) Funded by Academy of Finland

Education Training the next generation of information security researchers and professionals Skip to summary

http://www.aalto.fi/en/studies/education/programme/security_and_cloud_computing/

Applications: open in December Scholarships available secclo.aalto.fi secclo@aalto.fi facebook.com/secclo

Helsinki-Aalto Center for Information Security (HAIC) Joint initiative: Aalto University and University of Helsinki Mission: attract/train top students in information security Offers financial aid to top students in both CCIS Security and Cloud Computing & SECCLO Three scholars in 2017; Up to five (expected) in 2018 Call for donors and supporters Supported by donations from F-Secure, Intel, Nixu, Huawei, and Aalto University School of Science https://haic.aalto.fi/ 2017 2018

InfoSec Research and Education @ Aalto 20+ MSc and BSc theses yearly Runner-up: Best CS MSc Thesis in Finland WWW (1) 2014 ACM ASIACCS (1) Proc. IEEE (1) Best InfoSec MSc thesis in Finland PerCom (1) ACM CCS (1) Black Hat USA (1) ACM WiSec (1) PerCom (1) ACM CCS (2) 2015 Black Hat Europe (1) ACM ASIACCS (1) UbiComp (1) ACM CCS (1) NDSS (2) IEEE ICDCS (1) 2016 Best InfoSec MSc thesis in Finland CeBIT (1) Black Hat Europe (1) Runner-up: Best CS MSc Thesis in Finland ACM ASIACCS (1) DAC (1) IEEE ICDCS (2) IEEE SECON (1) 2017 Best InfoSec MSc thesis in Finland ACM CCS (1) IEEE IC (1) RAID (1) IEEE TC (1) IEEE TMC (1) WWW (1) ESORICS (1) DAC (1) IEEE TCAD (1) 2018 IEEE DSN (1) CT-RSA (1) IEEE Euro S&P (1) IEEE TC (1) (awards in green)

Information Security Research and Education at Aalto https://ssg.aalto.fi/about-us/ N. Asokan http://asokan.org/asokan/ @nasokan