Network Security Rethinking the Network to Support: Security Mobility Management Experimental Evaluation Karl Levitt NSF/CISE/NSF and UC Davis.

Slides:



Advertisements
Similar presentations
Network Support for Accountability Nick Feamster Georgia Tech Collaborative Response with David Andersen (CMU), Hari Balakrishnan (MIT), Scott Shenker.
Advertisements

Accountable Internet Protocol David Andersen (CMU) Hari Balakrishnan (MIT) Nick Feamster (Georgia Tech) Scott Shenker (Berkeley)
Network Support for Sharing. 2 CABO: Concurrent Architectures are Better than One No single set of protocols or functions –Different applications with.
Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
SCADA Security, DNS Phishing
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Lecture 11 Reliability and Security in IT infrastructure.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Lecture 15 Denial of Service Attacks
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Department Of Computer Engineering
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
APA of Isfahan University of Technology In the name of God.
Attacks on Computer Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
PART THREE E-commerce in Action Norton University E-commerce in Action.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Final Introduction ---- Web Security, DDoS, others
Software Security Testing Vinay Srinivasan cell:
CSC8320. Outline Content from the book Recent Work Future Work.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Intrusion Detection Reuven, Dan A. Wei, Li Patel, Rinku H.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
DoS/DDoS attack and defense
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Role Of Network IDS in Network Perimeter Defense.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Network security Vlasov Illia
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Network Security Basics: Malware and Attacks
Instructor Materials Chapter 7 Network Security
Exam Review.
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Securing Information Systems
Security in Networking
Presentation transcript:

Network Security Rethinking the Network to Support: Security Mobility Management Experimental Evaluation Karl Levitt NSF/CISE/NSF and UC Davis

Thanks to our PIs and NSF Colleagues  Dave Clark  John Doyle  Vern Paxson  Wenke Lee  R. Sekar  Scott Shenker  David Anderson  Fred Schneider  Nick Feamster  John Mitchell  Ty Znati  Ralph Wachter  Darleen Fisher  Allison Mankin  Kevin Thompson  Jie Wu  David Du

Outline  Security issues in the network  Current Internet  A future Internet  Host vs. Network  Vulnerabilities  Attacks  Defenses  Other issues  Mobility  Economics  Towards a science of security so we can reason about the security of real systems analytically and experimentally  Priorities of CISE’s (with OCI) new Trustworthy Computing (TC) program Punch Lines:  Hosts and the network must cooperate to defend against attacks, especially those sure to come  An overall security architecture is needed to integrate the (very good) existing point solutions

Many bowties in Internet Variety of files Variety of files packets IP TCP Applications Link

Consequences of a Simple Routing Core Benefits  Universal connectivity  Data forwarding permits packets to be sent from anywhere to anywhere  Routers perform a very simple function and can be realized at any scale: central office to consumer devices  Internet is open: supports creation of many applications and link technology  Many faults are handled easily by the core Problems  Little support for management  Diagnosis can be a nightmare  Bad guys can launch attacks across Internet to any vulnerable node  Impossible to trace attackers to their source  Quality of service (especially RT) not easily achieved

The Core is more than Routers  Different kinds of routers  Domain Name Service (DNS)  Firewalls  ISPs  NICs  Others? All of these  Contain vulnerabilities  Are subject to attack  But help mitigate attacks  Are difficult to manage  Have economic consequences

The Many Topics of Security Cryptography: provable security, key management, lightweight cryptographic systems, conditional and revocable anonymity, improved hash functions Formal methods: access control rule analysis, analysis of policy, verification of composable systems, lightweight analysis, on-line program disassembly Formal models: access control, artificial diversity and obfuscation, deception Defense against large scale attacks: worms, distributed denial of service, phishing, spam, adware, spyware, stepping stone and botnets Applications: critical infrastructures, health records, voice over IP, geospatial databases, sensor networks, digital media, e-voting, federated systems Privacy: models, privacy-preserving data-mining, location privacy, RFID networks Hardware enhancements for security: virtualization, encryption of data in memory, high performance IDS, TPM Network defense: trace-back, forensics, intrusion detection and response, honeynets Wireless & Sensor networks: security, privacy, pervasive computing New challenges: spam in VoIP, “Google-like” everywhere, virtualization, quantum computing, service oriented architecture Metrics: Comparing systems wrt security, risk-based measurement Testbeds and Testing Methodology: DETER and GENI, scalable experiments, anonymized background data Cryptography: provable security, key management, lightweight cryptographic systems, conditional and revocable anonymity, improved hash functions Formal methods: access control rule analysis, analysis of policy, verification of composable systems, lightweight analysis, on-line program disassembly Formal models: access control, artificial diversity and obfuscation, deception Defense against large scale attacks: worms, distributed denial of service, phishing, spam, adware, spyware, stepping stone and botnets Applications: critical infrastructures, health records, voice over IP, geospatial databases, sensor networks, digital media, e-voting, federated systems Privacy: models, privacy-preserving data-mining, location privacy, RFID networks Hardware enhancements for security: virtualization, encryption of data in memory, high performance IDS, TPM Network defense: trace-back, forensics, intrusion detection and response, honeynets Wireless & Sensor networks: security, privacy, pervasive computing New challenges: spam in VoIP, “Google-like” everywhere, virtualization, quantum computing, service oriented architecture Metrics: Comparing systems wrt security, risk-based measurement Testbeds and Testing Methodology: DETER and GENI, scalable experiments, anonymized background data

What is Attackable? Where should Defenses be situated? Attacks on Network Attacks on End Points Defenses on Network In scope Defense on End- Points Marginally in scope Not in scope Cooperative Defenses In scope

Traditional (CIA) Security Objectives Apply to Network Core Confidentiality: E.g., Router passwords can be compromised Integrity: E.g., Router tables can be erroneously modified DNS caches can be poisoned Availability: E.g., Routers can be flooded; is this true for core routers? ISPs can be spammed, causing denial of information (DOI) Attacking the core can be an adversary’s end objective in itself Or, a means to attacking a host, e.g., routing traffic to a enterprise under the control of an attacker Confidentiality: E.g., Router passwords can be compromised Integrity: E.g., Router tables can be erroneously modified DNS caches can be poisoned Availability: E.g., Routers can be flooded; is this true for core routers? ISPs can be spammed, causing denial of information (DOI) Attacking the core can be an adversary’s end objective in itself Or, a means to attacking a host, e.g., routing traffic to a enterprise under the control of an attacker

Multi-Stage (Scenario) Attacks Connection Spoof Address Forging Execute Commands Seq # Probe Packet Spoofing Synflood Seq. Number Guess Prevent Connection Response RSH Active Forged Src Address Spoofed Packet RSH Connection Spoof Spoofed Connection Remote Login cat + + >> /.rhosts Remote Execution Example secnario attack composed of multiple steps giving adversary incremental capabilities

The Many Kinds of Vulnerabilities Enable Many Kinds of Attacks  Man in the middle (MITM)  Spoofing  Spam  Phishing  Targeted  Botnets  Stealing identity  Insider  Installation of Malware, Trojan Horses  Worms (many kinds), viruses Most apply to end-points and network core A taxonomy of network vulnerabilities and attacks is needed

Corrupt target of existing pointer Compromise security critical data File names opened for write or execute Security credentials -- has the user authenticated himself? Corrupt data pointer Frame pointer Local variables, parameters Pointer used to copy input Point to injected data Point to injected code Point to existing code A Taxonomy of Memory Error Exploits Includes common buffer overflows, strncpy(), off-by-one, cast screw-up, format strings, double-free, return to libc, other heap structure exploits Corrupt code pointer Return address Function pointer Dynamic linkage tables (GOT, IAT) Memory Corruption Attacks Point to existing data Example: corrupt string arguments to functions, pointing to attacker desired data already in memory, e.g., “/bin/sh”, “/etc/passwd” Corrupt a pointer value

The Meaning of Network Defense has Changed 1st Generation (Prevent Intrusions ) ‘80s 2nd Generation (Detect Intrusions, Limit Damage ) ‘90s Some Attacks will Succeed Intrusions will Occur 4 th Generation in ‘10s (E.g.,prediction of vulnerabilities, cross-enterprise negotiation before attacks, real-time reverse engineering of attacks and malware, planning methods to deal with expected attacks, automatic patch synthesis and distribution) “Intel” Will Direct Defenses 3rd Generation (Operate Through Attacks) ‘00s

Some Sobering Growth Trends that make Network Monitoring Difficult  Network traffic rates inexorably grow  Network traffic volumes inexorably grow  We need to do more analysis on larger amounts of data at higher speeds …  But CPU performance is NOT inexorably growing any more.  Network traffic rates inexorably grow  Network traffic volumes inexorably grow  We need to do more analysis on larger amounts of data at higher speeds …  But CPU performance is NOT inexorably growing any more.

Multi-Core Architecture for Parallelized Network Monitoring If process, then “routes” and places copy in L2 cache … ANI looks up flow to decide forward/block/process ANI receives packets from network …

Identity Management is Central to Security The current situation with source addresses  They are often used to identify end users  But, they can be forged  And, it is impossible to extract information from the network to permit traceback Some thoughts on how a future Internet could improve the situation  Network could require a binding between a packet’s source address and the identity of the sender  But, this permits the network to violate end-users’ privacy  There is a middle-of-the road possibility: The linking of a user to a source address is held by a trusted third party that can (partially) revoke anonymity In any event, new protocols and network services are needed

Towards an Accountable Internet Protocol (AIP) Key idea: New addressing scheme for networks and hosts Addresses are self-certifying Simple protocols that use properties of addressing scheme as foundation Anti-spoofing, secure routing, DDoS shut-off, etc.

AIP Addressing Autonomous domains, each with unique ID AD1 AD2 AD3 Address = AD1:EID If multihomed, has multiple addresses AD1:EID,AD2:EID,AD3:EID Each host has a global EID [HIP, DOA, etc.] Key Idea: AD and EID are self-certifying flat names AD = hash( public_key_of_AD ) Self-certification binds name to named entity Key Idea: AD and EID are self-certifying flat names AD = hash( public_key_of_AD ) Self-certification binds name to named entity Would fail together Single administrative domain An AD...

Botnets Are a Long-Term Problem Individual Machines Used to Be Targets --- Now They Are Resources  Bot (Zombie)  Software Controlling a Computer Without Owner Consent  Professionally Written; Self-propagating; 7% of Internet  Bot Armies (Botnets)  Networks of Bots Controlled by Criminals  Key Platform for Fraud and other For-Profit Exploits Individual Machines Used to Be Targets --- Now They Are Resources  Bot (Zombie)  Software Controlling a Computer Without Owner Consent  Professionally Written; Self-propagating; 7% of Internet  Bot Armies (Botnets)  Networks of Bots Controlled by Criminals  Key Platform for Fraud and other For-Profit Exploits

Botnet Epidemic  More Than 90% of All Spam  All Denial of Service (DDOS) Attacks  Clickfraud  Phishing & Pharming Attacks  Key Logging & Data/Identity Theft  Key/Password Cracking  Anonymized Terrorist & Criminal Communication  More Than 90% of All Spam  All Denial of Service (DDOS) Attacks  Clickfraud  Phishing & Pharming Attacks  Key Logging & Data/Identity Theft  Key/Password Cracking  Anonymized Terrorist & Criminal Communication

Attack Example  Botnets increasingly used for amplified distributed reflective attacks Victim Zombies … Large DNS TXT RR (1500+ bytes) Attacker Amplified Distributed Reflective Attack DNS Request for Large TXT record (~60 bytes) Open Recursive DNS Servers (anyone can query) Spoof victim’s IP

Thinking About the Botnet Problem Botnets will continue to be an issue  Any vulnerable host can become a bot  There will always be vulnerable hosts The source of a Botnet will be difficult to determine  Without accountability it is impossible to identify the commander of a Botnet So, it is essential to stop or delay the growth or damage associated wth Botnets; only the network can do this  An ISP or an enterprise router can detect Bot-like traffic  And, perhaps block or delay such traffic But, there are consequences to blocking  Blocking consumes precious human and device resources  False positives will lead to many calls to a help desk

Denial of Service Attacks  DDoS attacks are a consequence of Botnets  Mitigation of DDoS attacks: Host (especially service solution)  Distribute services over many machines; packets will be routinely routed to closest machine which might not be DoSed (yet)  Mitigation of DDoS attacks: Network solution  Pushback to block or delay traffic from Bots, but there are consequences due to false positives  Diffusion in routing: choose a route that avoids DDoSed hosts and machines instead of the optimal route

Envisioning a Rich Inter-site Analysis for Cooperative Attack Mitigation  Sites deploy activity repositories using common data format  Site A can send request for analysis against activity seen by Site B  E.g. “have you seen the following access sequence?”  Done by sending an analysis program  Note: due to co-aligned threat models, it’s often in B’s interest to investigate  B runs query against their repository …  … can also install same query against future activity  B decides what (sanitized) results to return to A  If request was unreasonable, B can smack requestor  Sites deploy activity repositories using common data format  Site A can send request for analysis against activity seen by Site B  E.g. “have you seen the following access sequence?”  Done by sending an analysis program  Note: due to co-aligned threat models, it’s often in B’s interest to investigate  B runs query against their repository …  … can also install same query against future activity  B decides what (sanitized) results to return to A  If request was unreasonable, B can smack requestor

Clearing House Architecture Local Site Remote Sites Clearing House OperatorOperator Bro Syslog SSH Apache Time Machine Time Machine Site Information Analysis Logic (e.g., extended Bro IDS) Communcation Platform

Is There a Science of Security?  Are there impossibility results?  Are there powerful models (like Shannon’s binary symmetric channel) so that realistic security and privacy properties can be computed? Possibilies include:  Control Theory for security  Kirchoff-like laws to capture normal behavior for routers  Is there a theory that enables:  Secure systems to be composed from insecure components, or even  Secure systems to be composed from secure components  Metrics: Is there a theory such that systems can be ordered (or even partially ordered) with respect to their security or privacy?  Can entire systems (hosts, networks) and their “defenses” be formally verified with respect to realistic security objectives and threats?  Are there security-related hypotheses that can be validated experimentally?  What kind of an instrument (testbed) is needed to validate such hypotheses?  Are there impossibility results?  Are there powerful models (like Shannon’s binary symmetric channel) so that realistic security and privacy properties can be computed? Possibilies include:  Control Theory for security  Kirchoff-like laws to capture normal behavior for routers  Is there a theory that enables:  Secure systems to be composed from insecure components, or even  Secure systems to be composed from secure components  Metrics: Is there a theory such that systems can be ordered (or even partially ordered) with respect to their security or privacy?  Can entire systems (hosts, networks) and their “defenses” be formally verified with respect to realistic security objectives and threats?  Are there security-related hypotheses that can be validated experimentally?  What kind of an instrument (testbed) is needed to validate such hypotheses?

Enforcement by Program Rewriting? Fred Schneider  Fundamental issues:  Does the application behave the same?  Can the application subvert enforcement code?  Pragmatic issues:  What policies can be enforced?  What is the overhead of enforcement?  Fundamental issues:  Does the application behave the same?  Can the application subvert enforcement code?  Pragmatic issues:  What policies can be enforced?  What is the overhead of enforcement? App P Policy Rewriter Secure App

Towards a Science of Security: Possible Experiments  What properties can be evaluated by experiment?  Usability?  By designers of system?  By additional users?  Performance?  Lab environment?  Under realistic conditions?  Security?  Resilience to known attacks?  Challenge community to explore new attacks?  Security against all attacks within given threat model?  What properties can be evaluated by experiment?  Usability?  By designers of system?  By additional users?  Performance?  Lab environment?  Under realistic conditions?  Security?  Resilience to known attacks?  Challenge community to explore new attacks?  Security against all attacks within given threat model?

Security Experiments  What properties can be evaluated by experiment?  Usability?  By designers of system? Yes  By additional users? Yes, if open user community  Performance?  Lab environment? Yes  Under realistic conditions Yes, if realistic user community  Security?  Resilience to known attacks? Yes  Challenge us to explore new attacks? Yes, if realistic user community  Security wrt all attacks threat model? No, not an experimental property  A Possible Position  Experimental evaluation is important for security mechanisms, applications  Open experiments, allowing users other than designers, are essential  What properties can be evaluated by experiment?  Usability?  By designers of system? Yes  By additional users? Yes, if open user community  Performance?  Lab environment? Yes  Under realistic conditions Yes, if realistic user community  Security?  Resilience to known attacks? Yes  Challenge us to explore new attacks? Yes, if realistic user community  Security wrt all attacks threat model? No, not an experimental property  A Possible Position  Experimental evaluation is important for security mechanisms, applications  Open experiments, allowing users other than designers, are essential

Requirements for Security Facility  Ability to determine performance effectively  Facility must allow accurate measurement of a system under stress  Resource allocation and accounting  Example: resistance to DoS from an attacker with local but not global control of network.  Need to allocate specific resources to agents running in virtualized environment  Open access to experimental systems  Usability studies informative only if the test user community is diverse and unlimited  Isolation  Experimental systems will subject to attack by designated and unknown attackers  Facility must provide isolation between independent slices allocated to diff experiments  Privacy  Experimental systems that offer privacy or anonymity to experimental users must not have these guarantees compromised arbitrarily by the facility itself  Ability to determine performance effectively  Facility must allow accurate measurement of a system under stress  Resource allocation and accounting  Example: resistance to DoS from an attacker with local but not global control of network.  Need to allocate specific resources to agents running in virtualized environment  Open access to experimental systems  Usability studies informative only if the test user community is diverse and unlimited  Isolation  Experimental systems will subject to attack by designated and unknown attackers  Facility must provide isolation between independent slices allocated to diff experiments  Privacy  Experimental systems that offer privacy or anonymity to experimental users must not have these guarantees compromised arbitrarily by the facility itself

Sample experiments  Spam-resistant  Electronic voting systems  Distributed decentralized access control  Worm propagation and mitigation  Reputation systems  Improved network infrastructure protocols  Selective traceability and privacy  SCADA simulation  Botnet and overlay network security and detectability  Economic incentives in network infrastructure and applications  Anonymity in routing and applications  Experimental combinations of security mechanisms for enterprise security  Others?  Spam-resistant  Electronic voting systems  Distributed decentralized access control  Worm propagation and mitigation  Reputation systems  Improved network infrastructure protocols  Selective traceability and privacy  SCADA simulation  Botnet and overlay network security and detectability  Economic incentives in network infrastructure and applications  Anonymity in routing and applications  Experimental combinations of security mechanisms for enterprise security  Others?

Main points about Security Experimtation  Security experiments are important  Only way to test usability, performance, some security properties  Adoption by test user community is best indicator of usability  Security experiments do not provide security guarantees  Experimental systems should also be subjected to security analysis  Facility must meet needs of security experimenters  Performance measurements  Resource allocation and accounting  Open access to experimental systems  Isolation  Privacy  More ideas?  Please send experiment descriptions  Security experiments are important  Only way to test usability, performance, some security properties  Adoption by test user community is best indicator of usability  Security experiments do not provide security guarantees  Experimental systems should also be subjected to security analysis  Facility must meet needs of security experimenters  Performance measurements  Resource allocation and accounting  Open access to experimental systems  Isolation  Privacy  More ideas?  Please send experiment descriptions

Trustworthy Computing (TC)  $45M/year  Deeper and broader than CT  Five areas:  Fundamentals: new models that are analyzable, cryptography, composability (even though security is not a composable property), new ways to analyze systems  Privacy: threats to privacy, surely metrics, privacy needs security, privacy might need regulation, database inferencing, tradeoffs between privacy and x  $45M/year  Deeper and broader than CT  Five areas:  Fundamentals: new models that are analyzable, cryptography, composability (even though security is not a composable property), new ways to analyze systems  Privacy: threats to privacy, surely metrics, privacy needs security, privacy might need regulation, database inferencing, tradeoffs between privacy and x

Trustworthy Computing (TC) (cont’d)  Usability: for home user (parent wanting to keep files from child), security administrator (who is overloaded), forensics  Overall Security Archicture: much of what CT has funded; currently we have point solutions, so we need to combine them, one size might not fill all. For example, should there be a security layer in the protocol stack?  Evaluation: especially experimental, testbed design, looking for research needed for better testbeds but also to use testbeds, data (sanitized) to support experiments  Usability: for home user (parent wanting to keep files from child), security administrator (who is overloaded), forensics  Overall Security Archicture: much of what CT has funded; currently we have point solutions, so we need to combine them, one size might not fill all. For example, should there be a security layer in the protocol stack?  Evaluation: especially experimental, testbed design, looking for research needed for better testbeds but also to use testbeds, data (sanitized) to support experiments

A Problem to Motivate Security Research Suppose an adversary inserts malicious logic into a program that controls a critical process. Can the presence of the malicious logic be reliably detected? Jim Gossler, Sandia Corp. Possible solutions:  Determine by proof that the program does more than intended; requires a specification  Monitor the behavior of the program with respect to a specification.  What if the adversary knows the specification?  What if the adversary knows details of the monitoring system? Suppose an adversary inserts malicious logic into a program that controls a critical process. Can the presence of the malicious logic be reliably detected? Jim Gossler, Sandia Corp. Possible solutions:  Determine by proof that the program does more than intended; requires a specification  Monitor the behavior of the program with respect to a specification.  What if the adversary knows the specification?  What if the adversary knows details of the monitoring system?