Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU.

Slides:



Advertisements
Similar presentations
Usable Bootstrapping of Secure Ad Hoc Communication Ersin Uzun PARC 1.
Advertisements

Teaching and Learning Center Title V Impact Created a training classroom so that instructors may explore the newest technology available for them.
Conformance Testing of MOST based Applications Towards Effective System Testing André Baresel, Michael Schmidt - DaimlerChrysler AG Contact:
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Unit 5 Terminology Study Assignment Review Computer Technology
Vpn-info.com.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Trusted Platform Modules: Building a Trusted Software Stack and Remote Attestation Dane Brandon, Hardeep Uppal CSE551 University of Washington.
Discovering Computers: Chapter 1
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
Center for Advanced Technology in Telecommunications (CATT) Director: Shivendra S. Panwar 1.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Introduction to Computers. Michael R. Izzo
Dimitrios Hatzinakos, Ph.D., P.Eng Professor, ECE Dept., UofT Bell Canada Chair in Multimedia Director, Identity, Privacy and Security Initiative (IPSI)
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
ITIS 6200/8200: Principles of Information Security and Privacy Dr. Weichao Wang.
An Open Digital Camera Amnon Dekel. Embedded Computing Seminar (fall 2005)2 Does an Open Digital Camera Exist? Digita? –Partially open, but has disappeared.
Electronic and Computer Engineering D Azzi (PL)R Khusainov (SL) D Robinson (RF-HEIF IV)
CURRENT TRENDS IN DIGITAL ELECTRONICS– AN OVERVIEW
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Discovering Computers 2010
Practice and Experience in the Application of Cryptography Bao Feng Cryptography and Security Department.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
Information Security for Managers (Master MIS)
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Computers Mrs. Doss.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Real-Time Human Posture Reconstruction in Wireless Smart Camera Networks Chen Wu, Hamid Aghajan Wireless Sensor Network Lab, Stanford University, USA IPSN.
Lecture 12.1: User-Enabled Device Authentication - I CS 436/636/736 Spring 2012 Nitesh Saxena.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Networks Computer Technology. Network A computer network, or simply a network, is a collection of computers and other hardware components interconnected.
1 EEEM048- Internet of Things Lecture 1- Introduction Dr Payam Barnaghi, Dr Chuan H Foh Centre for Communication Systems Research Electronic Engineering.
IT 351 Mobile &Wireless Computing Semester 2, Dr. Hala Mokhtar Room 79- 2nd floor.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Ben Livelsberger NIST Information Technology Laboratory, CFTT Program
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
Cosc 4765 Trusted Platform Module. What is TPM The TPM hardware along with its supporting software and firmware provides the platform root of trust. –It.
$20 billion business 230 million printers sold  170 million inkjet  60 million laserjet #1 in ink, laser, scanners, designjet, print servers Consistent.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
1 Part 7: State of the Art and Future u Are we in a sorry state? u How to keep us Safe? u Software trust management u Hardware trust management u Evasive.
Future Internet: Some ideas from CINI Giorgio Ventre Università di Napoli Federico II & Consorzio Interuniversitario Nazionale per l’Informatica
Trusted Platform Module as Security Enabler for Cloud Infrastructure as a Service (IaaS). Gregory T. Hoffer CS7323 – Research Seminar (Dr. Qi Tian)
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication McCune, J.M., Perrig, A., Reiter, M.K IEEE Symposium on Security and.
Research Overview Nitesh Saxena Research areas: computer and network security, applied cryptography.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012.
Discovering Computers 2010
Slide 1 RFID Network Infrastructure Overview P. Krishna Reva Systems.
1 Information Security – Theory vs. Reality , Winter Lecture 12: Trusted computing architecture (cont.), Eran Tromer Slides credit:
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
Engaging Students in Technical Modules: The Quest to Promote Student Identification of Problematic Knowledge. Dr William Lyons, School of Engineering,
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Key management issues in PGP
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
Technologies: for Enhancing Broadcast Programmes with Bridgets
Computer Hardware-Meeting the machine
Mobile &Wireless Computing
Enhancing Web Application Security with Secure Hardware Tokens
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

ISIS - Highlights  8 faculty members in program  More than a dozen Ph.D. students  More than a dozen specialized courses in security  More than over $10 million in funding over the last 3 years  Host of NSA/NSF Cyber Corps Program (SFS)  NSA Center of Excellence in IA Education, NSA Center of Excellence in IA research  One of the premier cyber security programs in US Cyber Corps Group

ISIS - Research Areas  Hardware for Secure Systems  Trusted hardware, hardware obfuscation, Gigabit IDS/IPS, DDoS defense.  Multimedia Security  Image forensics, digital watermarking, steganography and steganalysis  Software Security  Static analysis, software obfuscation  Host Security  Disk forensics, secure virtualization  Network Security  Infection detection, Ad-hoc networks, network forensics. Cyber Corps Group

Secure Device Pairing Fundamental Security Objective: How to bootstrap secure communication between Alice’s and Bob’s devices when they have  no prior context  no common trusted CA or TTP Examples:  Pairing a bluetooth cell phone with a headset  Pairing a WiFi laptop with an access point Solution Idea:  make use of a physical channel between devices  with least involvement from Alice and Bob Out-Of-Band (OOB): Audio, Visual or Tactile Faculty: NiteshSaxena; Funded by NSF

Research Challenges  OOB channels are low-bandwidth  Devices may be constrained in terms of interfaces, e.g.,  access points, headsets  implanted wireless devices  User is constrained - Usability  Multiple devices  Sensor network initialization  Group formation Ohh! I cannot even pair my socks!

Other Ongoing Projects  RFID Security and Privacy  Mobile Phone Assisted Usable Password Authentication  Fault-Tolerant User-Centric Security Services (with Yevgeniy Dodis)  Privacy of Web Search  Inference of Private Attributes on Facebook (with Keith Ross) More info:

Media Forensics

Media Forgery Detection Many aspects to the problem Scanner- Model Media Forensics Identification of Synthetic media Media Source Identification Camera- Model Source- Model Identification Individual Source Identification Scanner Camera

Contributions CFA Detector Lens Processing Filters Color Interpolation Gamma Correction White Point Correction Color Conversion Compression Developed novel techniques to collect, attribute and authenticate image (video) evidence. Funded by NSA, NIJ, AFOSR Camera Imaging Pipeline

Trusted and Secure Hardware ( towards building hardware root of trust) RameshKarri ECE Department Ph. D. students  A. Kanuparthi and R. Guo: Trusted Platform Modules  J. Rajendran: Hardware Trojans  J. Li: Circuit Obfuscation  K. Rosenfeld: Secure Testing  J. Quan: Hardware Sidechannels Supported by: Air Force Research Labs, NSF, Army, Cisco Systems

Embedded Devices – Trust?

 Supports: Remote attestation, data sealing, and binding  Remote Attestation  Proving to you (the challenger) that I (the attester)  run legitimate programs  am sending you legitimate data (ground truths) etc Approach – Trusted Platform Modules (TPM) RNG RSA key gen. SHA-1 Signature engine Crypto ProcessorNon-volatile memory Endorsement key Storage root key Volatile memory PCRs Attestation keys Storage keys

TPM: ongoing research  High performance vs Low cost vs Low Power vs Application Specific  Prototypes successfully tested on different application scenarios  Redesign smart grid elements (smart meters, grid sensor platforms and grid control elements)  Deployment in pilot studies will uncover practical kinks…