1 / 27

TRUST :Team for Research in Ubiquitous Secure Technologies Overview

TRUST :Team for Research in Ubiquitous Secure Technologies Overview. Shankar Sastry, PI and Dir. Ruzena Bajcsy, Outreach Dir. Sigurd Meldal, Education co-Dir. John Mitchell, co-PI Vijay Raghavan, Exec Dir Mike Reiter, co-PI Fred Schneider, Chief Sci.

rrebekah
Download Presentation

TRUST :Team for Research in Ubiquitous Secure Technologies Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TRUST:Team for Research in Ubiquitous Secure TechnologiesOverview Shankar Sastry, PI and Dir. Ruzena Bajcsy, Outreach Dir. Sigurd Meldal, Education co-Dir. John Mitchell, co-PI Vijay Raghavan, Exec Dir Mike Reiter, co-PI Fred Schneider, Chief Sci. Janos Sztipanovits, co-PI and Education Co-Dir Steve Wicker, co-PI

  2. TRUST worthy Systems • More than an Information Technology issue • Complicated interdependencies and composition issues • Spans security, systems, and social, legal and economic sciences • Cyber security for computer networks • Critical infrastructure protection • Economic policy, privacy • TRUST: “holistic” interdisciplinary systems view of security, software technology, analysis of complex interacting systems, economic, legal, and public policy issues • Trustworthiness problems invariably involve solutions with both technical and policy dimensions (theme of Schneider’s talk) • Goals: • Composition and computer security for component technologies • Integrate and evaluate on testbeds • Address societal objectives for stakeholders in real systems "Overview"

  3. TRUST Research Vision Econ., Public Pol. Soc. Chall. Software Complex Inter - Security Dependency mod. Trusted Secure Network Platforms Embedded Sys Applied Crypto - Forensic Model - based and Privacy Security Integration. graphic Protocols HCI and Secure Compo - Network Security nent platforms Security Societal Challenges Details have changed Significantly but spirit of this vision remains. Privacy TRUST will address social, economic and legal challenges Computer and Critical Infrastructure Network Security Integrative Efforts Identity Theft Specific systems that Project represent these social Secure Networked Electronic Medical challenges. Embedded Systems Records Component Technologies Secure Info Mgt. Software Tools Component technologies that will provide solutions "Overview"

  4. TRUST First Year Portfolio We decided to use top down (Ex Comm) and bottom up (faculty) strategic planning at the June 05 kickoff to come up with • Integrated Research Themes • Phishing, Viruses, Spam and Identity Theft (leads: Mitchell, Tygar) • Secure Network Embedded Systems (leads: Wicker, Mulligan, Sztipanovits) • Trusted Platforms and Building Blocks (lead: Wagner) • Software Reliability and Security Tools (leads: Mitchell and Schmidt) • Integrative Trustworthy Systems Design (leads: Sztipanovits and Sastry) • Integrated Education Themes • Learning Module repository (lead: Sztipanovits) • National information assurance curriculum development (lead: Meldal) "Overview"

  5. Evolution of Agenda in 1st Year • Integrative design of trustworthy systems branched into • Security of the Global Information Grid/ DoD enterprise networks • Security and Privacy of Electronic Medical Records • Network Defense Portfolio was developed building from experience with DDOS and worm defense testbed (DETER/EMIST) • Secure network embedded systems expanded to include security of physical infrastructure: for e.g. SCADA/DCS systems "Overview"

  6. TRUST Second Year Portfolio • Integrative Research Project Themes • Secure Network Embedded Systems (Wicker, Mulligan leads) • Identity Theft, Phishing, Spyware and Related Issues (Mitchell, Tygar leads) • Electronic Medical Records (Sztipanovits, Bajcsy, Eklund leads) • Trustworthy Systems (Wagner, Aiken, Reiter leads) • Network Security (Joseph, Birman leads) • Seedling Topics • Integrative Education Project Themes • TRUST Academy Online (TAO: Sztipanovits, Meldal leads) • Education Community Development (EDC Meldal lead) • Outreach (OUR Bajcsy lead) "Overview"

  7. Integrative testbeds: Cyber Defense Technology and Experimental Reseach Network: DETER • Inadequate wide scale deployment of security technologies • Lack of experimental infrastructure • Testing and validation in small to medium-scale private research labs • Missing objective test data, traffic and metrics • Create reusable library of test technology for conducting realistic, rigorous, reproducible, impartial tests • For assessing attack impact and defense effectiveness • Test data, test configurations, analysis software, and experiment automation tools "Overview"

  8. Phishing, Spyware and Identity Theft • Faking • An e-mail that seems to be from a legitimate source • Spoofing • A Web site that appears to be “official” • Phishing • Luring users to provide sensitive data From Aucsmith, Microsoft "Overview"

  9. PHISHING and Spyware Impact Stats • Phishing: Most people are spoofed • Over 60% have visited a fake or spoofed site: 15% admit to havng provided personal data • Targets: Banks, credit card companies, Web retailers, online auctions (E-bay) and mortgage companies, 2780 sites in March 2005 alone • Economic loss • 1.2 million U.S. adults have lost money • The total dollar impact in first 6 months of 2005: $929 million, in all of 2003 $ 1.2B. • Spyware: Software that Collects personal information from you without your knowledge or permission • 15 percent of enterprise PCs have a keylogger Source: Webroot's SpyAudit • Number of keyloggers jumped three-fold in 12 months Source: Sophos • Impact and Support Costs • 50 % of crashes caused by spware (Microsoft Watson) • Dell, HP, IBM: Spyware causes ~30% of calls • Estimated support costs at $2.5m+ / day Source: TRUSTe & Gartner "Overview"

  10. TRUST Client Side Tools • SpoofGuard: Stanford (NDSS ’04) • Alerts user when browser is viewing a spoofed web page. • Uses variety of heuristics to identify spoof pages. • A new type of anomaly detection problem. • Dynamic Security Skins: Berkeley (SOUPS ’05) • Allows a remote web server to prove its identity in a way that is easy for human to verify and hard for attacker to spoof: uses a photograph to create trusted path • PwdHash: Stanford (Usenix Sec ’05) • Simple mechanism for strengthening password web auth. • SpyBlock: Stanford (http://www.getspyblock.com) • Prevent Spyware from capturing sensitive data such as passwords • Defends against session high jacking malware. "Overview"

  11. Tech Transfer from Phishing Work • SpoofGuard: • Some SpoofGuard heuristics now used in eBay toolbar and Earthlink ScamBlocker. • Very effective against basic phishing attacks. • PwdHash: • Collaboration with RSA Security to implement PwdHash on one-time RSA SecurID passwords. • RSA SecurID passwords vulnerable to online phishing • PwdHash helps strengthen SecurID passwords • SpyBlock • Free version (source code) running on Firefox available for download from http://www.getspyblock.com "Overview"

  12. TESTBED: Cyber Defense Technology and Experimental Reseach Network: DETER • Inadequate wide scale deployment of security technologies • Lack of experimental infrastructure • Testing and validation in small to medium-scale private research labs • Missing objective test data, traffic and metrics • Create reusable library of test technology for conducting realistic, rigorous, reproducible, impartial tests • For assessing attack impact and defense effectiveness • Test data, test configurations, analysis software, and experiment automation tools "Overview"

  13. Secure Network Embedded System Testbed (557 nodes) at Berkeley • Software • TinyOS • Deluge • Network reprogramming • Drip and Drain (Routing Layer) • Drip: disseminate commands • Drain: collect data • DetectionEvent • Multi-moded event generator • Multi-sensor fusion and multiple-target tracking algorithms • Other testbeds at Cornell, Vanderbilt (Wicker’s talk) "Overview"

  14. Oak Ridge/SensorNet Multiple Domains National Warning and Alert System Regional Level Network Services Single Domain "Overview"

  15. Health care IT testbeds • Vanderbilt Patient Portal • Electronic healthcare records • Include real-time monitoring of congestive heart failure patients • Heterogeneous sensor network for monitoring • Data integrated into MyHealth@Vanderbilt patient portal • Berkeley ITALH Testbed: seniors in Sonoma • Stationary sensors: Motion detectors, Camera systems • Wearable sensor: Fall sensors, Heart rate or pulse monitors "Overview"

  16. Federated Sensor Network Testbeds • Existing testbeds at Cornell (museum), Berkeley, Vanderbilt (dirty bomb detection, surveillance) • DoE ORNL and LBNL would like to have national scale testbeds • Industry would like to use testbeds for SCADA, surveillance applications • Federation Workshop held at Nashville, April 18th, 2006 "Overview"

  17. Sensor Networks in Public Places • Protecting Infrastructure • Opportunities for embedding sensor networks • Transportation • Water and Fuel • Power Grid • TRUST is emphasizing development of supporting technology for randomly distributed sensors • Buildings • Combine surveillance with energy control • Integrate into building materials • Open Spaces (parks, plazas, etc.) • Combine surveillance with environmental monitoring • Line-of-sight surveillance technologies "Overview"

  18. Technology bans Camera phones Aural communicationsTitle III Up-skirt laws Harassment/ stalking Electronic Communications ECPA Privacy zone Barak Obama Certain images Camera click (notice) VIDEOPRIVACY IN PUBLIC SPACES

  19. EDUCATIONAL INITIATIVES • Repositories set up, course work/modules development, summer school • Policy, Technology, Psychological Motivations of Terrorism: Maurer (Berkeley), Lazowska (Washington), Savage (UCSD) and Microsoft, Fall 05 http://www.cs.washington.edu/education/courses/csep590/05au/lectures/ • Lampson, “Accountability and Freedom • Varian “Economics and Computer Security” • Maurer “The Third Wave of Terrorism” • Aucsmith “Crime on the Internet” • Samuelson, Mulligan, Wicker, and Goldberg: Video Privacy in Public Places • Capacity Building program for HBCU, HSI: Reiter "Overview"

  20. Education Plans Accomplishments • Working with a Learning Community: BFOIT • Learning Science and Technology Insertion: VanTH • Curriculum Development and Refinement • Repository Development: CAPE/ELMS • TRUST Summer School and Workshops: WISE "Overview"

  21. Curriculum Development • Content creation • Presentation & Packaging • Learning Strategy Formalization • Delivery methods • Evangelization and dissemination • Challenges • Bringing in the policy-oriented educators • Bringing in the non-CS engineering disciplines • Evangelizing "Overview"

  22. Adoption of New Courseware • Security science (incremental, integrative, learning modules) • In-discipline: operating systems, programming languages, cryptography, secure networking, hardware architectures…Canonical security courses • Cross-discipline: Social impact, law, privacy, organizational roles, infrastructure • Case studies as vehicle for learning modules • Social sciences (incremental, integrative, learning modules) • In-discipline: Privacy, information management and security, economics, organization theory, IP • Cross-discipline: Fundamentals of security technologies, technology awareness • Systems science (new capstone courses) • Cross-discipline: Design and analysis of complex systems • Courseware repository • Web-deliverable courseware – VaNTH/eLMS "Overview"

  23. Course Repository • Implemented Course Repository in CAPE • Specify taxonomy • Define course learning objectives • Simulate learning process via sequencing of course modules • Include relevant resources in a course module • Lecture notes, Presentation slides • Home assignments, Projects • Exams, Quizzes • Web-based Delivery System • Hosted by VaNTH from Vanderbilt University • https://try.elms.vanth.org "Overview"

  24. Network Security Course Modules • How bad guys work • Network attacks from hackers’ perspective • Cryptography • Secret key, public key, hash functions • Authentication protocols • Authentication and key exchange protocols • Network security standards • Wireless security, IP security, SSL, email security • Analysis of security protocols • Inductive model, game theory, protocol logics… "Overview"

  25. Outreach: Partner Activities • BFOIT - Berkeley Foundation for Opportunities in Information Technologyhttp://www.bfoit.org/ • SUPERB-IT - Summer Undergraduate Program in Engineering Research at Berkeley - Information Technologyhttp://www.eecs.berkeley.edu/Programs/ugrad/superb/superb.html • SIPHER - Summer Internship Program in Hybrid and Embedded Software Researchhttp://fountain.isis.vanderbilt.edu/fountain/Teaching/ • Pennsylvania Area HBCU Outreach - Historically Black Colleges and Universitieshttp://is.hss.cmu.edu/summer.html "Overview"

  26. Outreach: WISE • Women’s Institute in Summer Enrichment (WISE) is affiliated with the Center for the Team in Research for Ubiquitous Secure Technology (TRUST). • WISE is a residential summer program on the University of California, Berkeley campus that brings together women (but it is not restricted to women only!) • Courses in several disciplines, including computer science, economics, law, and electrical engineering. • One-week program includes rigorous classes in the mornings, and hands-on experiments and team-based projects in the afternoons. "Overview"

  27. SUMMARY • TRUST has been successfully launched: research, education, outreach programs under way • Hallmark of TRUST: Grand Challenge Projects • Large Integrative Projects • Identity Theft, Phishing, Spyware Defenses • Secure Network Embedded Systems • Trustworthy Systems • Secure Electronic Patient Records Portal • Network Defense • Education: Large Projects • Repositories: Evaluation using Learning Theory • Modules for existing courses • TRUST Summer School • Outreach: Comprehensive • BFOIT, SUPERB, SIPHER • Capacity Building Program for HBCU/HSI • WISE outreach to women researchers "Overview"

More Related