Presentation is loading. Please wait.

Presentation is loading. Please wait.

TRUST:Team for Research in Ubiquitous Secure Technologies

Similar presentations


Presentation on theme: "TRUST:Team for Research in Ubiquitous Secure Technologies"— Presentation transcript:

1 TRUST:Team for Research in Ubiquitous Secure Technologies
Mike Reiter Carnegie Mellon University NSF STC Review September 6, 2004

2 Security Technologies
Will focus our research in four key areas Software security Trusted platforms Applied cryptography Network security NSF STC Review September 17, 2018

3 Software Vulnerabilities Reports to CERT/CC
NSF STC Review September 17, 2018

4 Incidents [Reports to CERT/CC]
NSF STC Review September 17, 2018

5 Software Security Software design Dynamic analysis
Tools for “secure by design” coding Focus on static analysis tools, security-friendly APIs, compositional reasoning Dynamic analysis Runtime monitoring and enforcement of security properties NSF STC Review September 17, 2018

6 Software Security (cont.)
Multi-lingual security Need to resolve incompatible aspects of diverse language implementations Build from proof-carrying code to enable extensible code verification NSF STC Review September 17, 2018

7 Software Security (Example) Courtesy F. Schneider
An “inline reference monitor” inserted to monitor app Policy Secure P App App Fundamental issues: Does the application behave the same? Can the application subvert the monitor? Pragmatic issues: What policies can be enforced? What is the overhead of enforcement? Rewriter NSF STC Review September 17, 2018

8 Trusted Platforms Historically, PC manufacturers chose flexibility over security User can modify the PC in any way she likes Today this is changing with efforts like the Trusted Computing Platform Alliance (TCG) Alliance formed in Jan 1999 by Compaq, HP, IBM, Intel & Microsoft More than 150 companies by 2002 Developed a standard for a “trusted platform” (TP) NSF STC Review September 17, 2018

9 Trusted Platforms (cont.)
Some goals of TP Enable local & remote users to obtain reliable info about software running on platform Provide basis for secure key storage Enable conditional release of information to computer based on software running NSF STC Review September 17, 2018

10 Trusted Platforms (cont.)
Example challenges Is privacy-preserving attestation possible? To what extent can software-based approaches replace specialized hardware? How can virtualization best be used to protect computers and networks? NSF STC Review September 17, 2018

11 The Internet in 1980 NSF STC Review September 17, 2018

12 The Internet Today http://cm.bell-labs.com/who/ches/map/gallery/index.html
NSF STC Review September 17, 2018

13 Bad Code + Big Networks = Problems
Geographic spread of Sapphire worm 30 minutes after release Source: CodeRed worm (Summer 2001) Infected 360,000 hosts in 10 hours (CRv2) Sapphire/Slammer worm (Spring 2003) 90% of Internet scanned in <10mins NSF STC Review September 17, 2018

14 Applied Cryptography Cryptography is an essential tool for network security Historically, requires significant expertise Need approaches for developing correct crypto protocols more easily Better protocol analysis, testing & verification Protocol derivation frameworks & “compilers” NSF STC Review September 17, 2018

15 Network Security Systems to monitor & “discipline” the existing Internet Tracing source of denial-of-service attacks Better filtering and choking of attack flows Defenses to secure routing infrastructure Better infrastructure for networking Overlay approaches to controlling access Better monitoring through peer-to-peer approaches NSF STC Review September 17, 2018


Download ppt "TRUST:Team for Research in Ubiquitous Secure Technologies"

Similar presentations


Ads by Google