|
|||||||||||||
Keynote Speakers Academia Track 1 Angelos D. Keromytis Columbia University, USA Characterizing Self-healing Software Systems (abstract) 2 Christian Collberg University of Arizona, USA Surreptitious Software: Models from Biology and History (abstract) Co-Authors: Jasvir Nagra, University of Trento, Italy Fei-Yue Wang, Key Lab for Complex Systems and Intelligence Science, Institute of Automation, Chinese Academy of Sciences 3 Paulo Verissimo University of Lisboa, Portugal Assumptions: the Trojan Horses of secure protocols (abstract) Industry Track 1 Jean-Daniel Aussel Gemalto, France Smart Cards and Digital Security (abstract) 2 Mauricio Sanchez ProCurve Networking, HP, USA Virus Throttle as the basis for ProActive Defense (abstract) 3 Victor Serdiouk Joint Stock Company "DialogueScience", Russia Technologies for protection against insider attacks on computer systems (abstract) Angelos D. Keromytis Columbia University, USA Characterizing Self-healing Software Systems Abstract. Automated reactive defense systems have emerged as a new research area, promising to complement other protective measures. In this talk, I will investigate the space of automated reactive defenses that focus on preserving software confidentiality, integrity, and availability (CIA). Emphasis will be given on techniques that evolve systems from a vulnerable state to a state of immunity, with respect to specific vulnerabilities.
Christian Collberg University of Arizona, USA Surreptitious Software: Models from Biology and History Abstract. Over the last decade a bewildering array of techniques have been proposed to protect software from piracy, malicious reverse engineering, and tampering. While we can broadly classify these techniques as obfuscation, watermarking/fingerprinting, birthmarking, and tamperproofing there is a need for a more constructive taxonomy. In this paper we present a model of Surreptitious Software techniques inspired by defense mechanisms found in other areas: we will look at the way humans have historically protected themselves from each other and from the elements, how plants and animals have evolved to protect themselves from predators, and how secure software systems have been architected to protect against malicious attacks. In this model we identify a set of primitives which underlie many protection schemes. We propose that these primitives can be used to characterize existing techniques and can be combined to construct novel schemes which address a specific set of protective requirements.
Paulo Verissimo University of Lisboa, Portugal Assumptions: the Trojan Horses of secure protocols Abstract. Secure protocols rely on a number of assumptions about the environment which, once made, free the designer from thinking about the complexity of what surrounds the execution context. Henceforth, the designer forgets about the environment and moves on proving his algorithm correct, given the assumptions. When assumptions do not represent with sufficient accuracy the environment they are supposed to depict, they may become the door to successful attacks on an otherwise mathematically correct algorithm. Moreover, this can happen as unwitting to systems as a Trojan Horse's action. Intrusion-tolerant protocols that deal with intrusions much along the lines of classical fault tolerance, like for example Byzantine agreement, have become a reference for achieving security in an automatic way. However, there are issues specific to malicious faults (attacks and intrusions) that bring about some of the problems and limitations introduced above. Using them as example, we wish to discuss the theoretical underpinnings of the problem and evaluate some recent research results that demonstrate a few of those limitations in actual secure protocols.
Jean-Daniel Aussel Gemalto, France Smart Cards and Digital Security Abstract. Smart cards are portable tamper-resistant cryptographic devices that play a key role in digital security. This paper is a review of the state-of-the-art of the use of smart cards in securing the network, the online services, the operating system, and the card-holder identity. Smart card network authentication is routinely used on GSM and 3G networks, and for virtual private network authentication. Mobile network operator (MNOs) use custom 2G and 3G private key cryptography to authenticate users on the network, whereas VPN typically use public key cryptography. With the recent deployment of WiFi hot spots, eventually operated by MNOs, new strong authentication techniques based on the Extensible Authentication protocol have been developed, such as EAP-SIM and EAP-AKA, that can reuse the MNO's cryptographic infrastructure and avoid the deployment of public key infrastructure. Securing online services with smart card is traditionally performed at the SSL/TLS level using public key cryptography (PKI) and certificates, or using one-time-passwords (OTP) generated by tokens and smart cards. Some card issuers, such as financial institutions and MNOs, already have smart cards deployed on the field with their associated server infrastructure, and would like to avoid the burden of deploying new cards or tokens on the field, and new servers. To avoid this new deployment, authentication techniques have been developed to allow conventional card issuers to perform end-to-end browser to server authentication using their installed server database and standard cards, such as Eurocard Mastercard Visa (EMV) cards for financial institutions, or 2G and 3G cards for MNOs. At the operating system level, the Trusted Computing initiative attends to address the issue of computing platform trustworthiness, thru the specification of hardware-based security computing platforms (TPMs). We will show how smart cards and TPM have complementary roles, and why it makes sense to physically separate the platform credentials, stored in the TPM, and the credentials of the individual temporarily using this platform, stored in the smart card. The paper reviews the usage of smart card as identity and authentication tokens in identity frameworks such as the liberty-alliance single-sign-on and federation framework and the Microsoft cardspace framework. The Microsoft Cardspace authentication framework supports three types of authentication: basic login/password, Kerberos and PKI authentication. We show how smart cards can be used in this context, with straightforward PKI authentication, but also OTP authentication as a derivative of the login/password, or authentication using mobile phones and MNOs infrastructure. In the liberty alliance framework, the authentication is currently out-of-scope of the specification, which leaves many possibilities to perform strong authentication with smart cards. Another advantage of the card is to hold securely card holder attributes and control thru user consent the publication of these attributes. Finally, we will review emerging USB smart cards, such as the Network Identity Module (NIM), that can mutually authenticate the user and servers thru an end-to-end connection using standard security protocols.
Mauricio Sanchez ProCurve Networking, HP, USA Virus Throttle as the basis for ProActive Defense Abstract. The spread of viruses and worms has severe implications on the performance of virtually any network. Current methods to stop the propagation of malicious code rely on anti-virus signature recognition to prevent hosts from being infected. Unfortunately, the latency between the introduction of a new virus into a network and the implementation/distribution of a patch can be significant. Within this period, a network can be crippled by the abnormally high rate of traffic generated by infected hosts. Previous research has provided a mechanism for controlling the rate at which a host can make new network connections when exhibiting virus-like behavior. Extending this technology to network routers provides the benefit of network protection without the need for individual client support, and serves as an initial step in developing a virus-resilient network. This paper/presentation reflects on the unique challenge of adapting the Virus Throttle mechanism to HP ProCurve network switch routers. Also discussed is the method of proving that it works in realistic network conditions to protect against worms without interfering with normal network traffic.
Victor Serdiouk Joint Stock Company "DialogueScience", Russia Technologies for protection against insider attacks on computer systems Abstract. During last decade the number of successful intruder attacks has increased in many times. The damage caused by these attacks is estimated in hundreds millions of dollars. According to the latest results of research conducted by leading institutes and laboratories in the field of information security more than 80% of computer attacks are coming from inside of the company. Insiders have a significant advantage over others who might want to harm an organization. Insiders can bypass physical and technical security measures designed to prevent unauthorized access. Mechanisms such as firewalls, intrusion detection systems, and electronic building access systems are implemented primarily to defend against external cyber threats. In spite of the complexity the problem, insiders can be stopped by means of a layered defense strategy consisting of policies, procedures, and technical controls. The paper describes a threat model of insider attacks and modern technologies that allow to protect computer systems against insiders. The paper covers advantages and disadvantages of different approaches that are used nowadays for detection and prevention of insider attacks.
|
|||||||||||||
Copyright ©2006-2007 Computer Security Research Group, Saint-Petersburg Institute for Informatics and Automation of RAS, All rights reserved. |