©1999 by J. D. Tygar Endeavour Overview 1 Endeavour Security and assurance Doug Tygar UC Berkeley 25 May 1999.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

McAfee One Time Password
Azure AD & Office Logon with Username / Password 2. MFA challenge 3. Reply to MFA challenge -1-way or 2-way SMS -Phone call -Mobile Application.
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Research Seminar on Telecommunications Business IPSEC BUSINESS Henri Ossi.
Zero-Interaction Authentication April 15, 2003 Mark D.Corner, Brian D. Noble Presented by Seong Oun Hwang CS744 Special Topics in System Architecture:
Cryptography and Data Security: Long-Term Challenges Burt Kaliski, RSA Security Northeastern University CCIS Mini Symposium on Information Security November.
Mobile IP Security Dominic Maguire Research Essay Presentation Communications Infrastructure Module MSc Communications Software, WIT
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J.D. Tygar – University of California, Berkeley.
SPINS: Security Protocols for Sensor Networks Adrian Perrig Robert Szewczyk Victor Wen David Culler Doug TygarUC Berkeley.
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden1 Current Flattening in Software and Hardware for Security Applications Authors: R.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Towards High-Assurance Hypervisors Jason Franklin Joint with Anupam Datta, Sagar Chaki, Ning Qu, Arvind Seshadri.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) Web Service Description KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
Automatic Implementation of provable cryptography for confidentiality and integrity Presented by Tamara Rezk – INDES project - INRIA Joint work with: Cédric.
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.
A Survey on Interfaces to Network Security
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Real Security InterSwyft Technical information's.
Lessons Learned in Smart Grid Cyber Security
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Java SNMP Oplet Tal Lavian. Goals Portable across a range of devices Extensible Simple and convenient for client use Consistent with SNMP model Hide unnecessary.
Ad Hoc Networks Curtis Bolser Miguel Turner Kiel Murray.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Semantics for Cybersecurity and Privacy Tim Finin, UMBC Joint work with Anupam Joshi, Karuna Joshi, Zareen Syed andmany UMBC graduate students
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Quantum Information Science The size of transistors decreases by half every eighteen months Intel’s 20 and 45 nm transistor Laser MRI Information Theory.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Lecture 24 Wireless Network Security
Slide to sign on Leverage your existing Wi-Fi assets to provide the home Wi-Fi user experience anywhere.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
TRUSTED FLOW: Why, How and Where??? Moti Yung Columbia University.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
1 SHARCS: Secure Hardware-Software Architectures for Robust Computing Systems Sotiris Ioannidis FORTH.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Network Security The Parts of the Sum Stephen T. Walker Overview by Justin Childs.
Embedded system security
AIA IAS Research Review & Proposals July 14, 2006 Turgay Korkmaz Department of Computer Science UTSA
Understand Wireless Security LESSON Security Fundamentals.
Microsoft Windows NT 4.0 Authentication Protocols
Wireless Protocols WEP, WPA & WPA2.
Operating System 2 Overview
Protect Your Hardware from Hacking and Theft
Operating System 2 Overview
Operating System 2 Overview
Lecture 36.
Lecture 36.
Presentation transcript:

©1999 by J. D. Tygar Endeavour Overview 1 Endeavour Security and assurance Doug Tygar UC Berkeley 25 May 1999

©1999 by J. D. Tygar Endeavour Overview 2 Challenges: Protocols and Mobile Applications Two sides for mobile applications: –protecting the remote host from the mobile code –protecting the mobile code from the remote host! Automatic generation of best security protocol Ad hoc and temporal access control –Access control/security negotiation Use of cryptographic hardware tokens –How to evaluate, build, break tamper-resistant boundaries –Differential power analysis

©1999 by J. D. Tygar Endeavour Overview 3 Wider challenges Microauctions/economics for resource control Rights management tagging Design for survivability All of this with privacy

©1999 by J. D. Tygar Endeavour Overview 4 Plan One year –Synthesis of code for optimal security protocols –Toolkit for cryptographic key management for mobile code –Design of ad hoc and temporal access control –“Little TEMPEST” protection for hardware tokens Three year –Integration with applications across Endeavour –Privacy analysis for high assurance mechanisms –Automatic or semi-automatic resource allocation using micro-auctions. –High survivability mechanisms

©1999 by J. D. Tygar Endeavour Overview 5

©1999 by J. D. Tygar Endeavour Overview 6 Latest wrinkle -- power analysis attacks Publicized by Paul Kocher et al. Use current drawn by device to read off cryptographic key Typical MOS Transistor:

©1999 by J. D. Tygar Endeavour Overview 7 Simple Power Analysis

©1999 by J. D. Tygar Endeavour Overview 8 Differential Power Analysis

©1999 by J. D. Tygar Endeavour Overview 9