Summary of the NSF/IARPA/NSA Workshop on the Science of Security David Evans University of Virginia INFOSEC Research Council 16 July 2009.

Slides:



Advertisements
Similar presentations
W ashington A rea T rustworthy C omputing H our
Advertisements

Next steps towards a Science of Security David Evans University of Virginia IARPA Visit 11 January 2010.
Design of Experiments Lecture I
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
Jenkins — Modular Perception and Control Brown Computer — ROUGH DRAFT ( ) 1 Workshop Introduction: Modular Perception.
Cryptography and Data Security: Long-Term Challenges Burt Kaliski, RSA Security Northeastern University CCIS Mini Symposium on Information Security November.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Automated Analysis and Code Generation for Domain-Specific Models George Edwards Center for Systems and Software Engineering University of Southern California.
A Type System for Expressive Security Policies David Walker Cornell University.
Scientific method - 1 Scientific method is a body of techniques for investigating phenomena and acquiring new knowledge, as well as for correcting and.
What has been will be again, what has been done will be done again; there is nothing new under the sun. Ecclesiastes 1:9 NOT.
Control of Personal Information in a Networked World Rebecca Wright Boaz Barak Jim Aspnes Avi Wigderson Sanjeev Arora David Goodman Joan Feigenbaum ToNC.
The Road to a Good Science Project Dr. Michael H. W. Lam Department of Biology & Chemistry City University of Hong Kong Hong Kong Student Science Project.
The Impact of Programming Language Theory on Computer Security Drew Dean Computer Science Laboratory SRI International.
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
Foundations of Educating Healthcare Providers
Unit 2: Engineering Design Process
Ciarán O’Leary Wednesday, 23 rd September Ciarán O’Leary School of Computing, Dublin Institute of Technology, Kevin St Research Interests Distributed.
Biology—the science of life  Study the origins and history of life and once-living things  Study the structures of living things Chapter 1 The Study.
Complexity and Fragility? John Doyle Control and Dynamical Systems BioEngineering Electrical Engineering Caltech with Prajna, Papachristodoulou, and Parrilo.
Software Engineering ‘The establishment and use of sound engineering principles (methods) in order to obtain economically software that is reliable and.
Science of Security Experimentation John McHugh, Dalhousie University Jennifer Bayuk, Jennifer L Bayuk LLC Minaxi Gupta, Indiana University Roy Maxion,
The Architecture of Secure Systems Jim Alves-Foss Laboratory for Applied Logic Department of Computer Science University of Idaho By, Nagaashwini Katta.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
David Evans Turing Machines, Busy Beavers, and Big Questions about Computing.
Containment and Integrity for Mobile Code Security policies as types Andrew Myers Fred Schneider Department of Computer Science Cornell University.
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
Let’s Stop Beating Dead Horses, and Start Beating Trojan Horses! David Evans INFOSEC Malicious Code Workshop San Antonio, 13.
Introductory Chemistry, 2 nd Edition Nivaldo Tro Chapter 1 The Chemical World.
Assessing the Frequency of Empirical Evaluation in Software Modeling Research Workshop on Experiences and Empirical Studies in Software Modelling (EESSMod)
Chapter 1 The Science of Biology. (What is science?) The Nature of Science.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
1. Process Gather Input – Today Form Coherent Consensus – Next two months.
Introduction to Science Informatics Lecture 1. What Is Science? a dependence on external verification; an expectation of reproducible results; a focus.
Science and Psychology Psych 231: Research Methods in Psychology.
An Examination of Science. What is Science Is a systematic approach for analyzing and organizing knowledge. Used by all scientists regardless of the field.
Virtual Data Grid Architecture Ewa Deelman, Ian Foster, Carl Kesselman, Miron Livny.
How do we know things? The Scientific Method Psych 231: Research Methods in Psychology.
A Research Agenda for Scientific Foundations of Security David Evans University of Virginia NITRD Post-Oakland Program 25 May 2011 Artwork: Giacomo Marchesi.
Model Checking and Model-Based Design Bruce H. Krogh Carnegie Mellon University.
Biological Science.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Copyright Prof. Dr. Shuichiro Yamamoto Prof. Dr. Shuichiro Yamamoto Nagoya University.
The E ngineering Design Process Foundations of Technology The E ngineering Design Process © 2013 International Technology and Engineering Educators Association,
1 CSCD 326 Data Structures I Software Design. 2 The Software Life Cycle 1. Specification 2. Design 3. Risk Analysis 4. Verification 5. Coding 6. Testing.
1 Basic Chemistry: A Foundation by Steven S. Zumdahl University of Illinois.
Theories and Hypotheses. Assumptions of science A true physical universe exists Order through cause and effect, the connections can be discovered Knowledge.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
Scientific Debugging. Errors in Software Errors are unexpected behaviors or outputs in programs As long as software is developed by humans, it will contain.
High Confidence Software and Systems HCMDSS Workshop Brad Martin June 2, 2005.
CSPC 464 Fall 2014 Son Nguyen.  Attendance/Roster  Introduction ◦ Instructor ◦ Students  Syllabus  Q & A.
Hosted by: Institute for Software Integrated Systems (ISIS) Vanderbilt University Software Reliability for FCS Discussion Format May 18-19, 2004 ARO Workshop.
Quantification of Integrity Michael Clarkson and Fred B. Schneider Cornell University IEEE Computer Security Foundations Symposium July 17, 2010.
ECE/CS 584: Verification of Embedded Computing Systems Model Checking Timed Automata Sayan Mitra Lecture 09.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Belief in Information Flow Michael Clarkson, Andrew Myers, Fred B. Schneider Cornell University 18 th IEEE Computer Security Foundations Workshop June.
National Science Foundation Blue Ribbon Panel on Cyberinfrastructure Summary for the OSCER Symposium 13 September 2002.
Roy Kennedy Massachusetts Bay Community College Wellesley Hills, MA Introductory Chemistry, 2 nd Edition Nivaldo Tro 2006, Prentice Hall Chapter 1 The.
What’s it all about Alfie? Scientific tools and the scientific method Scientific tools and the scientific method What is chemistry? What is chemistry?
Basic Concepts of Software Architecture. What is Software Architecture? Definition: – A software system’s architecture is the set of principal design.
Unit 1: The Nature of Science
Research Methods Dr. X.
WSRec: A Collaborative Filtering Based Web Service Recommender System
How do we know things? The Scientific Method
Model-Driven Analysis Frameworks for Embedded Systems
Psych 231: Research Methods in Psychology
Measurement What is it and why do it? 2/23/2019
Automated Analysis and Code Generation for Domain-Specific Models
Presentation transcript:

Summary of the NSF/IARPA/NSA Workshop on the Science of Security David Evans University of Virginia INFOSEC Research Council 16 July 2009

Outline Workshop description, participants, format Summary of prevailing consensus Highlight some key ideas What next?

Workshop Stated Goals: Identify scientific questions regarding computer security Stimulate new work toward defining and answering those questions. Encourage work that goes beyond ad hoc point solutions and informal security arguments to discover foundational scientific laws for reasoning about and designing secure computing systems. 2-day workshop in Berkeley, CA (Nov 2008) Premise: need new ideas from outside traditional infosec research community

44 Participants David Bray, IDA Fred Chang, U. of Texas/NSA Byron Cook, MSR/Cambridge Son Dao, HRL Laboratories Anupam Datta, CMU John Doyle, Caltech Anthony Ephremides, UMd David Evans (organizer), UVa Manfai Fong, IARPA Stephanie Forrest, UNM John Frink, ODUSD Joshua Guttman, MITRE Robert Herklotz, AFOSR Alfred Hero, U. of Michigan Sampath Kannan, NSF Steven King, ODUSD Carl Landwehr, IARPA Greg Larsen, IDA Karl Levitt (organizer), NSF Brad Martin (organizer), NSA John Mallery, MIT CSAIL Roy Maxion, CMU Robert Meushaw, NSA John Mitchell, Stanford Pierre Moulin, U. Illinois Timothy Murphy, IARPA Dusko Pavlovic, Kestrel/Oxford Nick Petroni, IDA Lisa Porter, IARPA Michael Reiter, UNC Phillip Rogaway, UC Davis John Rushby, SRI Stuart Russell, UC Berkeley Fred Schneider, Cornell Jim Silk (organizer), IDA Dawn Song, UC Berkeley Pieter Swart, Los Alamos NL Vicraj Thomas, BBN/GENI Hal Varian, Berkeley/Google Cliff Wang, ARO Rebecca Wright, Rutgers Shouhuai Xu, UT San Antonio Ty Znati, NSF Lenore Zuck, NSF

Participant Affiliation David Bray, IDA Fred Chang, U. of Texas/NSA Byron Cook, MSR/Cambridge Son Dao, HRL Laboratories Anupam Datta, CMU John Doyle, Caltech Anthony Ephremides, UMd David Evans (organizer), UVa Manfai Fong, IARPA Stephanie Forrest, UNM John Frink, ODUSD Joshua Guttman, MITRE Robert Herklotz, AFOSR Alfred Hero, U. of Michigan Sampath Kannan, NSF Steven King, ODUSD Carl Landwehr, IARPA Greg Larsen, IDA Karl Levitt (organizer), NSF Brad Martin (organizer), NSA John Mallery, MIT CSAIL Roy Maxion, CMU Robert Meushaw, NSA John Mitchell, Stanford Pierre Moulin, U. Illinois Timothy Murphy, IARPA Dusko Pavlovic, Kestrel/Oxford Nick Petroni, IDA Lisa Porter, IARPA Michael Reiter, UNC Phillip Rogaway, UC Davis John Rushby, SRI Stuart Russell, UC Berkeley Fred Schneider, Cornell Jim Silk (organizer), IDA Dawn Song, UC Berkeley Pieter Swart, Los Alamos NL Vicraj Thomas, BBN/GENI Hal Varian, Berkeley/Google Cliff Wang, ARO Rebecca Wright, Rutgers Shouhuai Xu, UT San Antonio Ty Znati, NSF Lenore Zuck, NSF 14 Government 9Governmentish 21 Academia

Participant Background David Bray, IDA Fred Chang, U. of Texas/NSA Byron Cook, MSR/Cambridge Son Dao, HRL Laboratories Anupam Datta, CMU John Doyle, Caltech Anthony Ephremides, UMd David Evans (organizer), UVa Manfai Fong, IARPA Stephanie Forrest, UNM John Frink, ODUSD Joshua Guttman, MITRE Robert Herklotz, AFOSR Alfred Hero, U. of Michigan Sampath Kannan, NSF Steven King, ODUSD Carl Landwehr, IARPA Greg Larsen, IDA Karl Levitt (organizer), NSF Brad Martin (organizer), NSA John Mallery, MIT CSAIL Roy Maxion, CMU Robert Meushaw, NSA John Mitchell, Stanford Pierre Moulin, U. Illinois Timothy Murphy, IARPA Dusko Pavlovic, Kestrel/Oxford Nick Petroni, IDA Lisa Porter, IARPA Michael Reiter, UNC Phillip Rogaway, UC Davis John Rushby, SRI Stuart Russell, UC Berkeley Fred Schneider, Cornell Jim Silk (organizer), IDA Dawn Song, UC Berkeley Pieter Swart, Los Alamos NL Vicraj Thomas, BBN/GENI Hal Varian, Berkeley/Google Cliff Wang, ARO Rebecca Wright, Rutgers Shouhuai Xu, UT San Antonio Ty Znati, NSF Lenore Zuck, NSF Traditional Infosec Researchers Computer Scientists Outside Area

Format 2 days Keynotes: Fred Schneider, Frederick Chang Panels: – What is a science of security? – What can we learn from other fields? – How can we reason about impossible things? – Are scientific experiments in security possible? Breakout groups on various topics including: – Metrics, provable security, managing complexity, composition, experimentation

Philosophical Questions (Usually Not Worth Discussing) Is there science in computer system security? Yes, but of course there should be more.

Meaning of “Science” Systematization of Knowledge – Ad hoc point solutions vs. general understanding – Repeating failures of the past with each new platform, type of vulnerability Scientific Method – Process of hypothesis testing and experiments – Building abstractions and models, theorems Universal Laws – Widely applicable – Make strong, quantitative predictions

Realistic Goal Can we be a science like physics or chemistry? Unlikely – humans will always be a factor in security. How far can we get without modeling humans? How far can we get with simple models of human capabilities and behavior? Workshop charge: avoid human behavior issues as much as possible.

Alchemy (700-~1660) Well-defined, testable goal (turn lead into gold) Established theory (four elements: earth, fire, water, air) Methodical experiments and lab techniques (Jabir ibn Hayyan in 8 th century) Wrong and unsuccessful...but led to modern chemistry.

Questions for a Science of Security Resilience: Given a system P and an attack class A, is there a way to: – Prove that P is not vulnerable to any attack in A ? – Construct a system P' that behaves similarly to P except is not vulnerable to any attack in A ? How can we determine if a system A is more secure than system f(A) (where f is some function that transforms an input program or system definition)?

Metrics Scientific understanding requires quantification For most interesting security properties, not clear what to measure or how to measure it Comparative metrics may be more useful/feasible than absolute metrics: – How can we quantify the security of two systems A and B in a way that establishes which is more secure for a given context? – Quantify the security of a system A and a system f(A) (where f is some function that transforms an input program or system definition)?

Metrics: Promising Approaches Experimental metrics: more systematic “red team” approaches (hard to account for attacker creativity) Economic metrics: active research community Epidemiological metrics: good at modeling spread over network, but need assumptions about vulnerabilities Computational complexity metrics: define attacker search space (promising for automated diversity)

Formal Methods and Security Lots of progress in reasoning about correctness properties – Byron Cook: reasoning about termination and liveness Systems fail when attackers find ways to violate assumptions used in proof – Need formal methods that make assumptions explicit in a useful way – Combining formal methods with enforcement mechanisms that enforce assumption

Formal Methods Questions Refinement: Can we use refinement approaches (design →... → implementation) that preserve security properties the way they are used to preserve correctness properties now? Program analysis: What security properties can be established by dynamic and static analysis? How can computability limits be overcome using hybrid analysis, system architectures, or restricted programming languages?

Experimentation Security experiments require adversary models Need to improve adversary models – Coalesce knowledge of real adversaries – Canonical attacker models (c.f., crypto) Design for reproducibility Roy Maxion later today

Some Highlights Caveat: I won’t do justice to these ideas...but (almost) all the presentation materials are here:

Towards Scientific Defenses Target for 2015: “Defense class D enforces policy class P when facing attacks from class A.” Defining classes of policies: – System behavior: infinite trace of states (or events) t = s 0 s 1 s 2... s i... – System property: set of traces P = { t | pred(t) } – A system S satisfies property P if S  P Due to Fred Schneider Formal way to reason about what system properties different mechanisms can enforce

Example: Execution Monitoring Ideal reference monitor: sees all policy-relevant events, cannot be circumvented, can block execution immediately EM-enforceable policies  Safety Properties Implementation approaches: – Inlined reference monitor (SASI, Naccio) – Proof-carrying code: prove the automaton necessary to enforce policy is correctly embedded in program – Combine approaches for improved performance and small TCB Due to Fred Schneider

Limitations of Execution Monitoring Liveness properties: something good eventually happens – Requires reasoning about all possible future paths Non-interference: low-level users get same outputs regardless of high-level actions – Requires reasoning about all possible executions Due to Fred Schneider

Hyper-Properties Hyper-property: set of sets of traces System satisfies HP is set of traces it can produce is in the HP set Claim: can define all security properties as Hyper- properties Open questions: – Is there a way to enforce/verify them? – Are there restricted property classes between EM- enforceable and Hyper-properties? k -safety hyperproperties: property that can be refuted by observing ≤ k traces Clarkson & Schneider, 2008

Formal Methods vs. Complexity (Loosely) Due to Fred Chang Time Pessimist’s View Complexity Formal Techniques Capability Deployed Systems

Formal Methods vs. Complexity (Loosely) Due to Fred Chang Time Optimist’s View Complexity Deployed Systems Formal Techniques Capability TCB of Deployed

Ideas from Networks and Biological Systems Bowtie architecture in: – Internet Applications – TCP/IP – Link – Power distribution Power plants – Stan – Many Devices – Biological Systems Cell Metabolism (next slide) Due to John Doyle Diverse function Diverse components Universal Control “Constraints that De-Constrain”

Co-factors Fatty acids Sugars Nucleotides Amino Acids Catabolism Precursors Taxis and transport Nutrients Carriers Core metabolism Huge Variety Same 12 in all cells Same 8 in all cells  100  same in all organisms John Doyle’s slide

Robustness/Fragility Tradeoff Systems tradeoff robustness and fragility: – Robustness for some set of permutations implies fragility for other set of permutations – Some fragilities are inevitable for complex systems Seems to hold for biological evolved systems, must it for engineered systems? Due to John Doyle Robust Fragile

Recap Summary Systematization of Knowledge – Ad hoc point solutions vs. general understanding – Repeating failures of the past with each new platform, type of vulnerability Scientific Method – Process of hypothesis testing and experiments – Building abstractions and models, theorems Universal Laws – Widely applicable – Make strong, quantitative predictions Valuable and achievable: need the right incentives for community Uncertainty if such laws exist; long way to go for meaningful quantification. Progress in useful models; big challenges in constructing security experiments

What Next?: Systematization of Knowledge IEEE Symposium on Security and Privacy (Oakland 2010): call for systematization papers “The goal of this call is to encourage work that evaluates, systematizes, and contextualizes existing knowledge. These papers will provide a high value to our community but would otherwise not be accepted because they lack novel research contributions.”

Discussion What next? – Metrics – Experimentation – Formal methods Challenge problems?