Illinois Center for Wireless Systems Wireless Security Quantification and Mechanisms Bill Sanders Professor, Electrical and Computer Engineering Director,

Slides:



Advertisements
Similar presentations
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Advertisements

Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
CS 795 – Spring  “Software Systems are increasingly Situated in dynamic, mission critical settings ◦ Operational profile is dynamic, and depends.
Chapter 19: Network Management Business Data Communications, 4e.
1 Steve Chenoweth Friday, 10/21/11 Week 7, Day 4 Right – Good or bad policy? – Asking the user what to do next! From malware.net/how-to-remove-protection-system-
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
SYSchange for z/OS By Pristine Software April 2009 Thomas Phillips April 2009 SYSchange Pristine Software.
1 Achieving Trusted Systems by Providing Security and Reliability (Research Project #22) Project Members: Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jun.
Achieving Trusted Systems by Providing Security and Reliability Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jun Xu, Shuo Chen, Nithin Nakka and Karthik Pattabiraman.
Figure 1.1 Interaction between applications and the operating system.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security: Principles and Practice
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Frequently asked questions about software engineering
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
November 2009 Network Disaster Recovery October 2014.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Chapter 1- Introduction
Achieving Qualities 1 Võ Đình Hiếu. Contents Architecture tactics Availability tactics Security tactics Modifiability tactics 2.
SEC835 Database and Web application security Information Security Architecture.
IC3 Chapter 8 Computer Fundamentals
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Data Security.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
THREATS TO MOBILE NETWORK SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System.
B.Ramamurthy9/19/20151 Operating Systems u Bina Ramamurthy CS421.
CS 1308 Computer Literacy and the Internet. Introduction  Von Neumann computer  “Naked machine”  Hardware without any helpful user-oriented features.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Distributed Systems: Concepts and Design Chapter 1 Pages
INVITATION TO COMPUTER SCIENCE, JAVA VERSION, THIRD EDITION Chapter 6: An Introduction to System Software and Virtual Machines.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Trusted ILLIAC - A Configurable, Application-Aware, High-Performance Platform for Trustworthy Computing Ravishankar Iyer, Wen-mei Hwu, Klara Nahrstedt,
CE Operating Systems Lecture 3 Overview of OS functions and structure.
Systems II San Pham CS /20/03. Topics Operating Systems Resource Management – Process Management – CPU Scheduling – Deadlock Protection/Security.
“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten.
Operating System 2 Overview. OPERATING SYSTEM OBJECTIVES AND FUNCTIONS.
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Silberschatz, Galvin and Gagne  Operating System Concepts UNIT II Operating System Services.
Monitoring and Managing Server Performance. Server Monitoring To become familiar with the server’s performance – typical behavior Prevent problems before.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Functions of Operating Systems V1.0 (22/10/2005).
Windows Vista Configuration MCTS : Maintenance and Optimization.
CSCE 548 Secure Software Development Risk-Based Security Testing
Instructor Materials Chapter 7 Network Security
Security Engineering.
Frequently asked questions about software engineering
Operating Systems Bina Ramamurthy CSE421 11/27/2018 B.Ramamurthy.
System Testing.
PLANNING A SECURE BASELINE INSTALLATION
Security in SDR & cognitive radio
Presentation transcript:

Illinois Center for Wireless Systems Wireless Security Quantification and Mechanisms Bill Sanders Professor, Electrical and Computer Engineering Director, Information Trust Institute

Illinois Center for Wireless Systems Sample Projects  Mechanisms:  Mobile Device Protection using the Reliability & Security Engine  OS Architecture for Reliability and Security  Quantification:  Experimental Quantification of Mobile Phone Failure  Mobile Phone Virus Effect Mitigation and Quantification

Illinois Center for Wireless Systems Providing Application-aware Reliability and Security Ravi Iyer & Zbigniew Kalbarczyk Applicatio n Operating system Processor Middleware Example techniques: data value checking – detects corruption of critical program variables data-flow signatures checking – detects violation of data dependencies in the computation of critical variables Customize mechanisms for detecting security attacks and execution errors based on knowledge about expected/allowed program behavior Extract application characteristics using compiler analysis Enforce the characteristics at runtime using configurable hardware Develop methods for automated derivation of runtime checks FPGA prototype of RSE in the pipeline of DLX and LEON3 processors Plan to implement in the ARM pipeline

Illinois Center for Wireless Systems OS Architecture for Security & Reliability Roy Campbell Microkernel Client 1 Client 1 Data Client2 Client 2 Data Server Server Data Traditional Microkernel OS  Recovering from errors using server restarts  Server restart is not sufficient for recovery  State information maintained by OS services may be lost when service is terminated and restarted  Error in server due to one client affects all clients Our Approach: State Management Microkernel Client 1 Client1 Data Client2 Client2 Data Server Local Data Client2 Info Client1 Info Microkernel Client 1 Client1 Data Client2 Client2 Data Server Local Data Client2 Info Client1 Info PartitioningDistribution + Request Processing Microkernel Client1 Client1 Data Client2 Client2 Data Server Local Data Client2 Info Client1 Info Resp Re q  Client Information is managed in Server State Region (SSR) structures  SSR’s are mapped into server address spaces only when processing requests  When request is processed, the server’s access to the associated SSR is revoked Dependability Characteristics  Reliability  Client state not lost when server crashes  Error propagation between clients reduced  Availability  SSR memory allocation charged to client: prevents DoS  Confidentiality & Integrity  “Need to Know” basis for server access to SSRs  Maintainability  Server Upgrade: Terminate old and start new

Illinois Center for Wireless Systems Failure Data Analysis of Smart-Phones: How do Mobile Phones Fail? Ravi Iyer & Zbigniew Kalbarczyk  Data sources:  Publicly available failure reports (from ’03 to ’06)  Failure data collected from actual smart-phones Data collected from 25 smart phones (running Symbian OS) over 14 months Regular phones instrumented with a logger program Collects data on phone freezes and self-shutdowns  Use collected data to guide enhancement of robustness of mobile phones

Illinois Center for Wireless Systems Sample Results Reboot duration Panics Analysis of Failure Reports Freeze: device does not respond to inputs Self-shutdown: device shuts down itself Unstable behavior: device exhibits erratic behavior, e.g. back light flashing Output failure: device, in response to an input, delivers an unexpected output Input failure: user inputs have no effect on device behavior Analysis of Data from Monitoring Smart phones Self-shutdown duration: 80 s MTBFr = 313 h (~13days) MTBS = 250h (~10days) Cascading panic events indicate error propagation across applications MTBFr – Mean Time Between Freezes MTBS – Mean Time Between Self-shutdowns

Illinois Center for Wireless Systems Mobile Phone Virus Mitigation and Quantification Elizabeth van Ruitenbeek, Bill Sanders, Tod Courtney  Smartphones—mobile phones with operating systems— have sophisticated computational and communication capabilities that make them attractive to virus writers  The threat of mobile phone viruses is real  Viruses already exist that can send unauthorized text messages, replace screen icons, install corrupted applications, replace font files, delete data, steal data, or infect system application files on phones  The situation is expected to worsen as more viruses are written and more people acquire smartphones  This research evaluates that threat  By modeling the propagation of viruses between mobile phones  By providing insight on the effectiveness of potential virus response mechanisms

Illinois Center for Wireless Systems Modeling Phone Virus Spread using Möbius  We model the biggest potential mobile phone virus threat: virus propagation via Multimedia Messaging Service (MMS) message attachments  We model the spread of viruses via MMS using the Möbius stochastic modeling software tool  Each phone in the simulation is represented by a submodel  To produce a network of 1000 phones, the phone submodel is replicated 1000 times  Of the 1000 phones, 800 are designated as susceptible to the virus  Of the phones repeatedly exposed to the virus, 40% eventually choose to accept the infection. Thus, when the virus completely penetrates the population, we can expect 320 phones to become infected.  At initialization, each phone is assigned an identification number and a contact list containing the numbers of other phones

Illinois Center for Wireless Systems Phone Submodel for MMS Virus Infection of this Phone Virus Propagation from this Phone

Illinois Center for Wireless Systems Simulation Results Generated X X X X X X X X X X X X

Illinois Center for Wireless Systems How quickly should the patches be distributed? Immunization Software Patches & Virus 4