Anthony D. Joseph UC Berkeley SCRUB ISTC: Secure Computing Research for Users’ Benefit TRUST Autumn 2011 Conference.

Slides:



Advertisements
Similar presentations
Why should my organisation move to Internet Explorer 9? An upgrade guide for IT professionals.
Advertisements

IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Security for Mobile Devices
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
CHANGING THE WAY IT WORKS Cloud Computing 4/6/2015 Presented by S.Ganesh ( )
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Defending against Sniffing Attacks on Mobile Phones Liang Cai (University of California, Davis), Sridhar Machiraju (Sprint Applied Research), Hao Chen.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
Secure web browsers, malicious hardware, and hardware support for binary translation Sam King.
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
March 13, 2004Securing Privacy Conference1 SENSOR NETWORKS & PRIVACY Pamela Samuelson, UC Berkeley, Securing Privacy Conference, March 13, 2004.
Andrew Schroeder Networking Aspects of Cloud Computing.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Norman SecureSurf Protect your users when surfing the Internet.
OWASP Mobile Top 10 Why They Matter and What We Can Do
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Osama Shahid ( ) Vishal ( ) BSCS-5B
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
EarthLink Server Management and Monitoring Updated August 6, 2015.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
- Raghavi Reddy.  With traditional desktop computing, we run copies of software programs on our own computer. The documents we create are stored on our.
Introduction. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Network security Product Group 2 McAfee Network Security Platform.
Hardware, Languages, and Architectures for Defense Against Hostile Operating Systems (DHOSA) Vikram Adve, Krste Asanović, David Evans, Sam King, Greg Morrisett,
Automatic Detection of Emerging Threats to Computer Networks Andre McDonald.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Security Analytics Thrust Anthony D. Joseph (UCB) Rachel Greenstadt (Drexel), Ling Huang (Intel), Dawn Song (UCB), Doug Tygar (UCB)
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Computer Security By Duncan Hall.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Powered by the Microsoft Azure Platform, Truck Tin Helps Your Sales Consultants Improve Efficiency, Information Sharing, Client Relations MICROSOFT AZURE.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Cloud Computing ENG. YOUSSEF ABDELHAKIM. Agenda :  The definitions of Cloud Computing.  Examples of Cloud Computing.  Which companies are using Cloud.
By RevelOps Logentries DataHub is offering the first cloud-based service for log management real-time analytics designed to enable security, privacy, and.
ZIMBRA ROADMAP. Contains proprietary and confidential information owned by Synacor, Inc. © / 2015 Synacor, Inc. Deliver an advanced, feature rich collaboration.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Back-End Software for Dating: System Platforms, Accessories/Options and New Technologies Presented by Brad Hogg CEO Vintacom Media Group Inc.
New cloud services demand new security solutions. The evolving cloud landscape is paving the way for modern and more sophisticated technology. Among the.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
CMSC 818J: Privacy enhancing technologies Lecture 2.
WELCOME Mobile Applications Testing
Chapter 6: Securing the Cloud
Lecture 1-Part 2: Operating-System Structures
5/31/2018 3:40 PM BRK3113 How Microsoft IT builds Privileged Access Workstation using Windows 10 and Windows Server 2016 Jian (Jane) Yan Sr. Program Manager.
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
Real-time protection for web sites and web apps against ATTACKS
On the road: Test automation in practice for a BMW map update service
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Protecting your data with Azure AD
The MobileIron® Threat Detection difference:
COMPLETE BUSINESS TEXTING SOLUTION
{ How can your Business benefit from uniFLOW? }.
Presentation transcript:

Anthony D. Joseph UC Berkeley SCRUB ISTC: Secure Computing Research for Users’ Benefit TRUST Autumn 2011 Conference

Insecurity is a tax on computing  Our lives, and our data, and our money, are increasingly flowing through our computers, our phones, …  However, technology isn’t always secure.  65% of Internet users have personally experienced cybercrime  Companies are concerned: 91% expressed concern over exploits like those that hit Google  760 companies compromised through SecurID info theft  Security concerns slow adoption of technology 9

Malware-tolerant computing  Malware is a fact of life  We cannot banish it. We must live with it  We need technology for establishing security amidst a sea of malware  Don’t want security problems to slow adoption of technology

Security touches many fields Security Systems Architecture Networking UsabilityAlgorithms Machine learning 1

 SCRUB is a new Berkeley center focusing on security for user’s benefit  Improve security for future technologies, at every layer of the stack  One of four Intel Science and Technology Centers  Model: industry funding (Intel) + collaboration  4 Intel researchers in residence on 7 th floor Soda  $2.5M/year in funding: 3 years + 2 year renewal option  UCB PI: David Wagner. Intel PI: John Manferdelli.  Associate Director: Anthony D. Joseph  Headquartered at Berkeley ($1.8M/yr) + CMU, Drexel, Duke, UIUC ($0.7M/yr) New initiative: Security ISTC

Establish secure computing environment via thin intermediation layer. Make 3 rd party apps safe. Enable one phone for both work and personal use Help administrators manage, monitor, and protect their networks, information, & services. Integrate security into network and system architecture

SCRUB Research Agenda Thin intermediation layer Mobile security Data-centric security Security analytics SCRUB Security-centric networking

 How do we make 3 rd party apps safe?  How do we enable a rich, thriving marketplace? Secure mobile phones

 Robust, secure app stores  Can we provide libraries/tools to developers to make it easier to get security right than to get it wrong?  Understanding app behavior  Can we automate parts of the app review process?  Secure phone platforms  Can we improve the permission system? Ideally, it would be usable yet still give users enough control  The multi-use, multi-context device  Can we make the phone safe for personal use, without endangering corporate data or functionality?  Can we avoid carrying two phones, one for work and one for yourself, without losing security or privacy? Example research challenges

 Longer term, are app-centric mobile platforms a more effective model for securing the desktop? Mobile  Desktop? ?

Securing the desktop: Thin intermediation layer Hardware Intermediation layer OS Web browser Banking app Thin client

 Data increasingly resides not only on end-user devices, but also on servers, cloud, …  Can we provide consistent protection for user data as it flows through a complex distributed system, no matter where it is stored? Data-centric security

 Proposal: Data-centric security.  Attach security policies to data, and ensure they stay bound together  Example: Data capsules, unsealable only within a secure execution environment  e.g., secured with a TPM, information flow tracking, …  Goal: A platform for secure computation, with privacy for user data Data-centric security

 How can the network architecture facilitate security?  What primitives should it provide to applications? Network security

Monitoring network traffic…  … at scale  … with a view into application-level semantics  Potential: Enable more sophisticated, semantic- aware analysis of network traffic, to detect and block attacks Network security

 Goal: robust security metrics and analytics  Developing tools combining machine learning and program analysis to automatically extract features and build models  Improving users’ experiences by translating the reasoning behind security decisions into human understandable concepts  Designing robust algorithms and finding lower-bounds for techniques defending against adversarial manipulation Security analytics

Adversarial Machine Learning In real life, adversaries are Byzantine In real life, adversaries are patient They adapt behavior Example goals:  Avoid detection of attacks  Cause benign input to be classified as attacks  Launch a focused attack  Search a classifier to find blind-spots

Security analytics Security Analytics and Metrics Decision Model Biometrics Collector Biometrics Collector Biometrics Collectors Adversarial Machine Learning Text Analysis Log Analysis Decision Analysis Code Analysis Metrics, Alerts

 We want to focus on security for all areas where users come in contact with technology  Enabling secure computing on malware-infected computers  Identifying primitives that hardware, networks, OSs, … should provide, to best support security  Developing a better security paradigm for desktop computers of the future  Designing adversarial resistant algorithms for measuring a system’s security  Helping users feel comfortable and safe with computing and e-commerce SCRUB Goals

SCRUB Dawn SongDavid WagnerScott ShenkerDoug Tygar Vern PaxsonAnthony JosephDavid Culler Sylvia Ratnasamy Landon Cox Rachel Greenstadt Sam KingAdrian Perrig Ling HuangVyas SekarPetros ManiatisJohn Manferdelli

Thrust areas Secure mobile devices Data-centric security Secure thin intermediation layer Security analytics Security-centric network architectures