Friday December 7, 2007 SoBeNeT project 5 th User group meeting 07/12/2007.

Slides:



Advertisements
Similar presentations
Strategy and Project Management in the Academic Setting What best practices from industry can be applied within the academic setting?
Advertisements

<<replace with Customer Logo>>
1 Copyright © 2010 AQA and its licensors. All rights reserved. Introduction to the new specification GCSE Computer Science Paul Varey.
ECM RFP 101 Presented by: Carol Mitchell C.M. Mitchell Consulting.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Assurance through Enhanced Design Methodology Orlando, FL 5 December 2012 Nirav Davé SRI International This effort is sponsored by the Defense Advanced.
SmartER Semantic Cloud Sevices Karuna P Joshi University of Maryland, Baltimore County Advisors: Dr. Tim Finin, Dr. Yelena Yesha.
Security Controls – What Works
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
Reseach in DistriNet (department of computer science, K.U.Leuven) General overview and focus on embedded systems task-force.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
SE curriculum in CC2001 made by IEEE and ACM: Overview and Ideas for Our Work Katerina Zdravkova Institute of Informatics
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Fundamentals of Information Systems, Second Edition
Merlin ITEA Symposium Merlin Overview2 Problem domain Companies hardly develop embedded products completely on their own Embedded systems need.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
DiscoverU Plan. Discover. Share. dartmouth ∙ digital arts ∙ computer science ∙ native american program.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
SEC835 Database and Web application security Information Security Architecture.
Leveraging UICC with Open Mobile API for Secure Applications and Services Ran Zhou.
Use-Cases / Technology Session DE Cluster Meeting, Brussels nd May, 2007.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Objective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering Arian Zwegers European Commission Information Society and Media Directorate.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
IT Pro Day Auditing in SQL Server 2012 Charley Hanania Principal Consultant, QS2 AG – Quality Software Solutions
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Tuesday October 25, 2005 SoBeNeT project User group meeting 25/10/2005.
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
SoBeNeT User Group meeting Part II Wouter Joosen October
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
OOI CI LCA REVIEW August 2010 Ocean Observatories Initiative OOI Cyberinfrastructure Architecture Overview Michael Meisinger Life Cycle Architecture Review.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
Applying White-Box Cryptography SoBeNet user group meeting October 8, 2004 Brecht Wyseur.
The Systems Development Life Cycle
SBIR Final Meeting Collaboration Sensor Grid and Grids of Grids Information Management Anabas July 8, 2008.
KATHOLIEKE UNIVERSITEIT LEUVEN 1.NET Curriculum Workshop Teaching Software Security: Case Studies on the.NET Framework Frank Piessens and Wouter Joosen.
07/09/04 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
Fundamentals of Information Systems, Second Edition 1 Systems Development.
Enhanced Storage Architecture
Jose Jimenez Telefónica I+D Future Network & Mobile Summit 2011 The vision of Future Internet in the FI PPP Core Platform project.
Security Development Life Cycle Baking Security into Development September 2010.
The FI-WARE Project – Base Platform for Future Service Infrastructures FI-WARE Stefano De Panfilis (Fi-WARE PCC Member) 4 th July 2011 FInES - Samos Summit.
Scientific Annotation Middleware (SAM) Jim Myers, Elena Mendoza PNNL Al Geist, Jens Schwidder ORNL.
CSCE 548 Secure Software Development Security Operations.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
SWE 513: Software Engineering
SSQSA present and future Gordana Rakić, Zoran Budimac Department of Mathematics and Informatics Faculty of Sciences University of Novi Sad
Tuesday October 25, 2005 Preview SoBeNeT- II project.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
Computing Systems: Next Call for Proposals Dr. Panagiotis Tsarchopoulos Computing Systems ICT Programme European Commission.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
By Ramesh Mannava.  Overview  Introduction  10 secure software engineering topics  Agile development with security development activities  Conclusion.
Enterprise Library 3.0 Memi Lavi Solution Architect Microsoft Consulting Services Guy Burstein Senior Consultant Advantech – Microsoft Division.
WP3 Task 3.2 Adaptation of the Training Material.
Advanced Software Engineering Dr. Cheng
Joseph JaJa, Mike Smorul, and Sangchul Song
TRUST:Team for Research in Ubiquitous Secure Technologies
Model-Driven Analysis Frameworks for Embedded Systems
Enhancing Web Application Security with Secure Hardware Tokens
Internet-based monitoring and control of embedded systems
Security in SDR & cognitive radio
Presentation transcript:

Friday December 7, 2007 SoBeNeT project 5 th User group meeting 07/12/2007

Friday December 7, Agenda 16:00hWelcoming 16:10hProject overview and status 16:40hCLASP, SDL and TouchPoints compared 17:00hSoProTo – A software protection tool 17:20hRun-time enforcement of security policies on the.NET framework 17:40hDiscussion and wrap-up 18:00hDrink

Friday December 7, Overview 1.Project context 2.Overview of main results 3.Valorization program 4.Outlook on finalization

Friday December 7, I. Context: project in a nutshell IWT SBO project ( )  Extended until April 2008 Context: availability of security components (still evolving but relatively mature) Goal: to enable the development of secure software applications 4 Research tracks:  Programming and Composition Technology  Software engineering – “full life cycle”  Tamper and analysis resistance  Shielding and interception

Friday December 7, The project’s user group 3E Agfa Alcatel Application Engineers Cryptomatic EMC 2 Inno.com Johan Peeters bvba Microsoft L-SEC NBB OWASP-Belgium Philips PWC Siemens UZ Gasthuisberg Zetes User group  Channel for direct feedback on the execution of the project  Primary audience for dissemination  Possible channel for validation and valorization Composition:

Friday December 7, Evolution of the user group (Wouter: update - remove ?) Frequent contacts with active members, have also led to collaborative research projects Still new members showing up  Custodix  Cronos  … Hard to organize plenary meetings 

Friday December 7, II. Project of fourth project year Significant amount of results  Academic: scientific publications at all levels several completed PhD’s involvement in national and international events  Broader dissemination: workshops and courses Project execution is on schedule  Taking into account the project extension  Priorities were fine-tuned during execution Industrial validation:  Spin-off projects  Opportunities for feedback  Continuous interest in practical validation !

Friday December 7, Looking Back… Year 1 Project support activities  Vulnerability study and classification  Inception of case studies Feasibility study of engineering application-level security with AOSD Study of techniques for tamper and analysis resistance Study of interception techniques

Friday December 7, Headlines of Year 2 Model for addressing code injection vulnerabilities Interrelations between point solutions in track I (Languages and composition)  E.g., security contracts as a language extension and a vehicle for reasoning on composition  Focus on component frameworks Activating the software engineering track  Study activities (incl. workshops) Architecture for management and monitoring Survey of attack methods and options in application protocols First industrial validations

Friday December 7, Headlines of Year 3 Release of dnmalloc Support for different types of security contracts  CAS, data dependencies, concurrency Fine-tuning of modularized access control Study of AOP security implications Refinement of secure development process activities (leveraged, among others, by results of other tracks) Improved techniques for tamper and analysis resistance Security management and monitoring applied to the.Net platform

Friday December 7, Headlines Y4: Track 1 General model for security contracts (PhD)  Language specification and static verification based on Spec# Access Control Interfaces (PhD)  Security-tuned composition mechanism based on AOSD technology AOPS, a permission system for dealing with AOP risks Security architecture for third-party applications on mobile devices

Friday December 7, Headlines Y4: Track 2 In-depth study and comparison of SDL, CLASP and Touchpoints has resulted in the activity matrix Analysis and systematic support for security principles in process activities Towards automated transition from requirements -> architecture Survey of security patterns

Friday December 7, Headlines Y4: Track 3 New techniques and attacks  Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings [SAC 2007]  Remote attestation on legacy operating systems with trusted platform modules [REM 2007]  Software Security Through Targeted Diversification [CoBaSSA 2007] SoProTo - Software Protection Tool  White-box cryptography  Obfuscation transformations

Friday December 7, Headlines Y4: Track 4 Application protocol checker Integration of protocol checker in application-level firewall

Friday December 7, Some numbers Over 100 publications in 4 years (>10 researchers involved) 3 PhD’s completed, more coming up (Co-)organization of >10 dissemination events  Project specific workshops  International conferences and workshops >5 spin-off projects with industrial partners Intensive contacts with >10 partners from user group

Friday December 7, III. Valorization A number of results are applicable in practical settings  C/C++ memory allocator  Protocol checking for web applications  SSE process comparison  Library of analysis / tamper resistance techniques National and international contact networks Several spin-of projects have been created

Friday December 7, Some of the spin-off projects Pecman Bcrypt EHIP II (possibly starting in 2008)

Friday December 7, Pecman: Personal Content Management Project summary  A user-centric solution enabling uniform storage and manipulation of personal data as well as universal access to this data Security-specific expectations  Security service bus: an architectural approach for crosscutting security enforcement  User-level policies, and their translation to system-level policies

Friday December 7, BCRYPT: Belgian Fundamental Research on Cryptology and Information Security Project summary  Interuniversity Attraction Pole (IAP) Concrete expectations  Fundamental research: discrete mathematics, cryptographic algorithms and protocols, watermarking, secure software, and secure hardware.  Application areas: secure documents, ultra low power crypto for sensor networks, ambient intelligence and RFID, mobile terminals, DRM and trusted computing

Friday December 7, Industry segments System Integrators and consultants (software development on a project base) Product development companies  Traditional Embedded systems  Telecom  Other  (boundaries are vague) Other stakeholders in software applications: business owner, system manager

Friday December 7, Upcoming events December 18-19, 2007Remote EnTrusting by RUn-time Software auThentication (RE-TRUST) - Workshop, Leuven March 3-7, 2008Secure Application Development course, Leuven July 22, 2008Advanced Applications for the Electronic Identity Card (ADAPID) – Workshop, Leuven July 23-25, 2008The 8th Privacy Enhancing Technologies Symposium (PETS 2008), Leuven To be announcedOWASP event on secure software development processes

Friday December 7, IV. Outlook Finalization headlines  Provably correct inliner  Improvement of verification techniques  Validation of AOP permission system  SoProTo Extended analysis front-end Self-encrypting code module Opportunities for validation ? Incubation of SoBeNeT II (SEC SODA)

Friday December 7, SECSODA Stands for SECure of SOftware in Distributed Applications … IWT SBO Proposal  Due January 2008  Project:

Friday December 7, Research Themes Programming and Composition Technology Software Engineering 4 Security Tamper and Analysis Resistance Verification Application case studies Extensions of practical technologies and methodologies (WS, SOA,.NET, …) mailto: {bartd,

Friday December 7, 2007 Thank you! Questions?

Friday December 7, Agenda 16:00hWelcoming 16:10hProject overview and status 16:40hCLASP, SDL and TouchPoints compared 17:00hSoProTo – A software protection tool 17:20hRun-time enforcement of security policies on the.NET framework 17:40hDiscussion and wrap-up 18:00hDrink