Foundations of Secure Networked Computing Participants: Chen-Nee Chuah Joan Feigenbaum Russell Impagliazzo Matti Kaariainen Karl Levitt Scott Shenker Salil.

Slides:



Advertisements
Similar presentations
Security Challenges for Future Internet Design Cybertrust PI Meeting Breakout.
Advertisements

Ed Duguid with subject: MACE Cloud
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Fault-Tolerant Real-Time Networks Tom Henzinger UC Berkeley MURI Kick-off Workshop Berkeley, May 2000.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
CS538: Advanced Topics in Information Systems. 2 Secure Location transparency Consistent Real-Time Available Black Box: Distributed Storage [GMM] ? Data.
1 The Future of Cryptography Salil Vadhan Harvard University.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
(Geneva, Switzerland, September 2014)
1 Algorithmic Foundations of the Internet Alejandro Lopez-Ortiz (Waterloo) Jennifer Rexford (Princeton) Rebecca Wright (Stevens)
Network Design and Implementation IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Control of Personal Information in a Networked World Rebecca Wright Boaz Barak Jim Aspnes Avi Wigderson Sanjeev Arora David Goodman Joan Feigenbaum ToNC.
March 24, 2003Upadhyaya – IWIA A Tamper-resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors R. Chinchani.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
3 Cloud Computing.
Securing Information Systems
SEC835 Database and Web application security Information Security Architecture.
1 Autonomic Computing An Introduction Guenter Kickinger.
Lessons Learned in Smart Grid Cyber Security
Smart Grid Technologies Damon Dougherty – Industry Manager.
“Assuring Reliable and Secure IT Services”. IT Redundancy: Its Value How much reliability to buy? Customer Service impacted as a result of 15 minutes.
Hot Topics in OS Research Andy Wang COP 5611 Advanced Operating Systems.
VeriFlow: Verifying Network-Wide Invariants in Real Time
CS525: Special Topics in DBs Large-Scale Data Management Hadoop/MapReduce Computing Paradigm Spring 2013 WPI, Mohamed Eltabakh 1.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,
Cluster Reliability Project ISIS Vanderbilt University.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 3: Trust assumptions and.
Your Business Challenges
Dr. V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI to 84 October 30,
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
1 ISA&D29-Oct ISA&D29-Oct-13 Systems Analyst: problem solver IT and Strategic Planning.
Denial-of-Service, Address Ownership,and,Early Authentication in IPv6 World (An Approach) Aditya Vutukuri From article by Pekka Nikander Ericsson Research.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Cyber Security, Internet, and Wireless Networks Shigang Chen, Associate Professor Dept of Computer & Information Science & Engineering University of Florida.
Module 11: Designing Security for Network Perimeters.
R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
Security Vulnerabilities in A Virtual Environment
Current state of affairs No framework for theoretical analysis of (some) protocols –chaos small changes make a lot of difference difficult to tune - or.
Programming Sensor Networks Andrew Chien CSE291 Spring 2003 May 6, 2003.
Reasoning about the Behavior of Semantic Web Services with Concurrent Transaction Logic Presented By Dumitru Roman, Michael Kifer University of Innsbruk,
Hadoop/MapReduce Computing Paradigm 1 CS525: Special Topics in DBs Large-Scale Data Management Presented By Kelly Technologies
Carnegie Mellon University Software Engineering Institute Lecture 4 The Survivable Network Analysis Method: Evaluating Survivability of Critical Systems.
Author: Krishna P.C. Madhavan And Sebastien Goasguen Saurabh Goyal Purnima Mandava.
Header Space Analysis: Static Checking for Networks Broadband Network Technology Integrated M.S. and Ph.D. Eun-Do Kim Network Standards Research Section.
Session 1: Technology Development August 15 NSF Workshop.
Sub-fields of computer science. Sub-fields of computer science.
Managing Secure Network Systems
Detection and Analysis of Threats to the Energy Sector (DATES)
Kuchimanchi Lakshmi Prasanna
Cloud Computing By P.Mahesh
Privacy Through Anonymous Connection and Browsing
Software Connectors – A Taxonomy Approach
3 Cloud Computing.
PBKM: A Secure Knowledge Management Framework
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

Foundations of Secure Networked Computing Participants: Chen-Nee Chuah Joan Feigenbaum Russell Impagliazzo Matti Kaariainen Karl Levitt Scott Shenker Salil Vadhan

Directions Problems raised by networks to be solved by ToNC. More exciting: Networking problems can lead ToNC to develop new theoretical frameworks. ToNC can provide new paradigms for thinking about networking.

Where do security & reliability fit? First: building & running networks –Security-aware network architecture –Preventing, detecting, and recovering from attacks/failures Then: secure applications! –Modern crypto allows information to be used without revealing it –Google: Web search, , remote data storage –Auctions –E-voting –Databases, datamining –Real-time computing/control –Outsourced/grid computation –And much more…

Cryptography Crypto not limited to “transforming data”. ToC takes a broad view: secure multiparty computation 9 protocols for performing any task in face of adversarial behavior Security questions not traditionally addressed –What tasks to allow (privacy) –Denial of service –Cascading failures (critical infrastructure) –Malware (worms, viruses) Why? Conservative tendency

Extending Scope of Cryptography Model of adversary/faults: –monolithic vs. non-colluding –Byzantine vs. random vs. selfish Notions of “security” –Traditional crypto: black & white –Quantitative measures – tradeoffs between security, privacy, reliability, utility, resource depletion –System-wide vs. individual guarantees –What are we protecting - data, resources, channel? Want formal models, proofs of security –Don’t forget lessons learned (why we are so conservative)

Security Infrastructure/Architecture What can be built into a “clean-slate” architecture to enable security & reliability? [FIND/GENI] Can make difference between impossible & possible. Examples: secure logger, crypto “set-up” assumptions, key infrastructure, randomness beacons, micropayments, anonymous channels, … Separation of concerns (protecting channel vs. data, mechanism vs. policy, long-term vs. short-term)

Interactions between Protocols “Stand-alone” security/reliability/performance not necessarily maintained when protocols executed concurrently in complex network environment. Crypto community studying concurrent security, “universal composability”. Far from fully understood. Overlay networks optimizing resources (Chen-Nee). Dependency graph, predict what will happen.

Specifying/monitoring/verifying security & reliability properties Need language for expressing desired properties, and automatic tools for verifying (or designing) protocols & configuration Both static properties & real-time behavior –What to measure? –Decide what to monitor when designing architecture/protocols Bridge between logic/formal methods, probabilistic/learning models, and crypto. Troubleshooting & fault isolation

More Network Models –Wireless, optical switches, time-varying –How do these affect security, reliability? New Threats –Spam, DoS, clutter –Cascading failures (critical infrastructure) –Worms, viruses, intrusion