Successes and Failures applying to SaTC/TWC/TC/CT Nikita Borisov University of Illinois at Urbana- Champaign.

Slides:



Advertisements
Similar presentations
I Want My Voice to Be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention Amir Houmansadr (The University of Texas at Austin) Thomas.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Rohit Kugaonkar CMSC 601 Spring 2011 May 9 th 2011
Protecting Cyber-TA Contributors: Risks and Challenges Vitaly Shmatikov The University of Texas at Austin.
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Enabling the Social Web Krishna P. Gummadi Networked Systems Group Max Planck Institute for Software Systems.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
1 Intrusion Tolerance for NEST Bruno Dutertre, Steven Cheung SRI International NEST 2 Kickoff Meeting November 4, 2002.
This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Chapter © 2010 South-Western, Cengage Learning Planning Your Career Finding the Right Career Fit Finding Career Opportunities 2.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Now that you have the job, what do you do to keep it for a long time? Kenneth J. Sher University of Missouri – Columbia Part of a symposium, “Building.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Science of Security Experimentation John McHugh, Dalhousie University Jennifer Bayuk, Jennifer L Bayuk LLC Minaxi Gupta, Indiana University Roy Maxion,
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
CS 525 – Network Security Spring 2012 Instructor Craig Shue, Ph.D.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Course Projects Examples Guidelines Suggestions. Topics Overview of project Selected Fall 2003 projects List of Fall 2004 projects General comments.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Symposium on Global Scientific Data Infrastructures Panel Two: Stakeholder Communities in the DWF Ann Wolpert, Massachusetts Institute of Technology Board.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
SEC835 Security in Databases and Web applications Presentation.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Overlays and The Evolution of BGP Peering. Agenda BGP Issues – Overlay Networks – VPNs – ToR BGP Peering Today – Rise of the Tier-3 ISPs.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Finance Financial Aspects of Career Planning Section 2.1Decisions and Planning Your Career Section 2.2Obtaining Employment and Developing a Career.
September 2009Network Neutrality – the Norwegian ApproachPage 1 Network Neutrality – the Norwegian Approach Senior Adviser Frode Soerensen Norwegian Post.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Slide Template for Module 4 Data Storage, Backup, and Security
Senior Project Portfolios
Information Security, Theory and Practice.
Educause/Internet 2 Computer and Network Security Task Force
CS590B/690B Detecting Network Interference (Fall 2016)
Rakesh Verma University of Houston
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
Xiaohong (Dorothy) Yuan North Carolina A&T State University 11/16/2017
CIS 333 Competitive Success/snaptutorial.com
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- snaptutorial.com.
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
CIS 333 Teaching Effectively-- snaptutorial.com
Privacy Through Anonymous Connection and Browsing
Anupam Das , Nikita Borisov
IS4680 Security Auditing for Compliance
Anupam Das , Nikita Borisov
CS590B/690B Detecting network interference (Spring 2018)
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

Successes and Failures applying to SaTC/TWC/TC/CT Nikita Borisov University of Illinois at Urbana- Champaign

My SaTC Experience First PI experience in 2006 Four funded projects through some version of SaTC – Vulnerability signatures in intrusion detection – Security and privacy in building automation – Network traffic analysis – Anonymous communications (CAREER) About as many rejections Half dozen panels

Vulnerability Signatures Traditional signatures in intrusion detection: recognize attack – E.g., “AAAA….AAAA?idapi.ida” for CodeRed Too specific: – CodeRed II used “NNNN….NNNN?idapi.ida” Vulnerability signatures: recognize attack vector Challenge: faithfully reconstruct application parsing state with high performance

Behind the Proposal Genesis: internship at Microsoft Research as graduate student Development: – Identify basic research challenges – Create evaluation strategy Collaboration: – Two senior co-PIs / mentors

Building Automation Newer buildings use networked sensors and controls for lights, doors, HVAC, etc. Opportunity for applications that enrich inhabitants’ lives Woefully insecure Challenge: design interface that enables applications while preserving important privacy and security constraints

Behind the Proposal Genesis: Class project on applications for building automation Development: – Identify general principles that can be applied in this setting Collaboration: – My co-instructor in the course

Traffic Analysis Encrypted network traffic contains patterns: packet sizes, timings, counts, … Side channel that reveals information – User identity – Password characters – Web page content – VoIP phrases Challenge: Rigorous, systematic understanding of attacks and defenses

Behind the Proposal Genesis: Attack paper on network watermarking schemes Development: – Identify several important problems – Formulate fundamental theoretic questions – Connect them to experimental validation plan Collaboration: – Co-author from attack paper – Another communications expert – Senior mentor

Anonymous Communications Internet communication leaks metadata about interests, relationships, behavior, etc. This information is (ab)used by ISPs, employers, advertisers, intelligence agencies, repressive regimes, … Anonymity networks, such as Tor help protect metadata, but at a large performance cost Challenge: creating scalable, high-performance overlay networks while minimizing leaked information

Behind the Proposal Genesis: PhD work, followed by several years of research Development: – Detailed description of next few research papers Collaboration: – Support letters from foreign collaborator

Lessons from Rejections SaTC panelists are notorious skeptics! – Your job to convince them your approach will work and be secure Missing related work can be a killer – Spend twice as much time as you think you need Avoid being too broad

Closing Thoughts Get thee on a panel! – Can’t beat first-hand experience – PMs often struggle to fill slots Get co-PIs with prior SaTC successes – Can be helpful even at a low commitment level Enjoy the experience! – Even unfunded proposals have payoffs