I EEE Cybersecurity I nitiative ( CybSI ) Accelerating I nnovation - - PowerPoint PPT Presentation

i eee cybersecurity i nitiative cybsi accelerating i
SMART_READER_LITE
LIVE PREVIEW

I EEE Cybersecurity I nitiative ( CybSI ) Accelerating I nnovation - - PowerPoint PPT Presentation

I EEE Cybersecurity I nitiative ( CybSI ) Accelerating I nnovation in Security & Privacy Technologies Greg Shannon, IEEE CybSI Chair ( shannon at cert dot org ) Chief Scientist, CERT Division, Software Engineering Institute at Carnegie


slide-1
SLIDE 1

I EEE Cybersecurity I nitiative ( CybSI ) Accelerating I nnovation in Security & Privacy Technologies

Greg Shannon, IEEE CybSI Chair ( shannon at cert dot org ) Chief Scientist, CERT Division, Software Engineering Institute at Carnegie Mellon University

23 February 2015

slide-2
SLIDE 2

A Challenge for Engineers

http://www.dilbert.com/strips/2011-02-03/

slide-3
SLIDE 3

Today’s Presentation

I nitiative Goal: Accelerate innovative research, developm ent and use of efficient cyber security & privacy technologies that protect com m erce, innovation and expression

slide-4
SLIDE 4

Today’s Presentation

–Overview IEEE & CybSI –Center for Secure Design –try-cybsi Platform –Collaborations

slide-5
SLIDE 5

5 10 November 2014

Overview of I EEE and CybSI

slide-6
SLIDE 6

About I EEE( .org)

4 3 0 ,0 0 0 +

Members

3 8

Technical Societies

1 6 0 +

Countries

1 ,3 0 0 +

Annual Conferences

3 ,5 0 0 ,0 0 0 +

Technical Documents

1 6 0 +

Top-cited Periodicals

slide-7
SLIDE 7

About I EEE: Global Standards Developer

Over 9 0 0 active standards 5 0 0 + standards under developm ent Over 7 ,0 0 0 individual m em bers and 2 0 ,0 0 0 standards developers from every continent 2 0 0 + entity m em bers W orking w ith I nternational standards bodies

  • f I SO, I EC and I TU

I EEE-SA’s process is w idely respected and aligns w ith the W TO and OpenStand principles

7

slide-8
SLIDE 8

Security & Privacy Conferences

I n 2 0 1 5 , I EEE w ill hold over 9 0 0 conferences touching security and privacy. To note are:

– International Conference on Information Systems Security and Privacy (9-11 Feb.; France) – 3 6 th Annual I EEE Sym posium on Privacy and Security ( 1 8 -2 0 May; San Jose) – IEEE Conference on Communications and Network Security (28-30 Sept.; Italy) – IEEE World Forum on Internet of Things (4-6 Nov.; Switzerland) – IEEE International Conference on Identity, Security and Behavior Analysis (23-25 March; Hong Kong)

8

slide-9
SLIDE 9

Security & Privacy Publications

I EEE Security and Privacy Magazine

– Provides articles with both a practical and research bent by the top thinkers in the field along with case studies, tutorials, columns, and in-depth interviews and podcasts for the information security industry

I EEE publishes nearly a third of the w orld’s technical literature in electrical engineering, com puter science and electronics, including the encryption dom ain. E.g.:

– Performance Analysis of Data Encryption Algorithms – Comparison of Data Encryption Algorithms with the Proposed Algorithm: Wireless Security – Technical Comparison Analysis of Encryption Algorithm On Site-to-Site IPSec VPN – Impact of Wireless IEEE 802.11n Encryption on Network Performance of Operating Systems – Comparative Study of Attribute Based Encryption Techniques in Cloud Computing – Implementation of Advanced Encryption Standards-192 Bit Using Multiple Keys – A Multi-layer Evolutionary Homomorphic Encryption Approach for Privacy Preserving

  • ver Big Data

9

slide-10
SLIDE 10

I EEE Security-related Standards

Just a sam pling: Encryption ( I EEE P1 3 6 3 ) Fixed & Rem ovable Storage ( I EEE P1 6 1 9 , I EEE P1 6 6 7 ) Printers, copiers, etc. ( I EEE P2 6 0 0 ) Provisions of connectionless user data confidentiality by m edia access independent protocols ( I EEE 8 0 2 .1 AE) MAC security key agreem ent protocol ( P8 0 2 .1 Xbx)

10

slide-11
SLIDE 11

Cybersecurity I nitiative

Goal: Accelerate research, developm ent and use of efficient cyber security & privacy technologies that protect com m erce, innovation and expression.

slide-12
SLIDE 12

Cybersecurity I nitiative

Activities

– Center for Secure Design – try-cybsi Platform – Collaborations

slide-13
SLIDE 13

Chair, Greg Shannon, CMU

– Network security and anomaly detection

I EEE Fellow , Carl Landw ehr, George W ashington U.

– Cybersecurity “building codes”

I EEE Fellow , Michael W aidner, Fraunhofer SI T & Darm stadt

– Security & privacy architectures

I EEE Fellow , Nasir Mem on, NYU

– Digital forensics

I EEE Fellow , Jeff Jaffe, W 3 C.org

– CEO, HTML standards and security

Jim DelGrosso, Cigital

– Project Lead for Center for Secure Design

Jonathan Katz, U. of Maryland

– Cryptography

Carrie Gates, Dell Research

– Empirical/ experimental methodswww.laser- workshop.org

Celia Merzbacher, Sem iconductor Research ( SRC.org)

– Hardware

Kathleen Clark-Fisher, Com puter Society

– Initiative Director for IEEE

Steering Com m ittee

slide-14
SLIDE 14

14 10 November 2014

Center for Secure Design

slide-15
SLIDE 15

http://cybersecurity.ieee.org/center-for-secure-design.html

slide-16
SLIDE 16

2004 2007 2010 2013 A1 Unvalidated Input A1 Cross Site Scripting (XSS) A1 Injection A1 Injection A2 Broken Access Control A2 Injection Flaws A2 Cross-Site Scripting (XSS) A2 Broken Authentication and Session Management A3 Broken Authentication and Session Management A3 Malicious File Execution A3 Broken Authentication and Session Management A3 Cross-Site Scripting (XSS) A4 Cross Site Scripting A4 Insecure Direct Object Reference A4 Insecure Direct Object References A4 Insecure Direct Object References A5 Buffer Overflow A5 Cross Site Request Forgery (CSRF) A5 Cross-Site Request Forgery (CSRF) A5 Security Misconfiguration A6 Injection Flaws A6 Information Leakage and Improper Error Handling A6 Security Misconfiguration A6 Sensitive Data Exposure A7 Improper Error Handling A7 Broken Authentication and Session Management A7 Insecure Cryptographic Storage A7 Missing Function Level Access Control A8 Insecure Storage A8 Insecure Cryptographic Storage A8 Failure to Restrict URL Access A8 Cross-Site Request Forgery (CSRF) A9 Application Denial of Service A9 Insecure Communications A9 Insufficient Transport Layer Protection A9 Using Components with Known Vulnerabilities A10 Insecure Configuration Management A10 Failure to Restrict URL Access A10 Unvalidated Redirects and Forwards A10 Unvalidated Redirects and Forwards

Patterns in OW ASP Vulnerabilities

slide-17
SLIDE 17

Sam e/ Sim ilar Defects For A Decade

I njection Attacks Broken Authentication and Session Managem ent Cross-Site Scripting Security Misconfiguration I nsecure Direct Object References Missing Function Level Access Control

slide-18
SLIDE 18

Som ething Needs To Change

W e have know n about these issues for decades

–Knowing != Avoiding

Even w hen w e docum ent these issues, and provide standards describing w hat to do, that advice is often not follow ed

slide-19
SLIDE 19

Avoiding Top Ten Security Flaw s ( 5 )

Earn or give, but never assum e, trust Use an authentication m echanism that cannot be bypassed or tam pered w ith Authorize after you authenticate Strictly separate data and control instructions, and never process control instructions received from untrusted sources Define an approach that ensures all data are explicitly validated

slide-20
SLIDE 20

Avoiding Top Ten Security Flaw s ( 5 )

Use cryptography correctly I dentify sensitive data and how they should be handled Alw ays consider the users Understand how integrating external com ponents changes your attack surface Be flexible w hen considering future changes to objects and actors

slide-21
SLIDE 21

Design Flaw s Results, Next Steps

Avoiding the Top 1 0 Softw are Security Design Flaw s

– Iván Arce, Kathleen Clark-Fisher, Neil Daswani, Jim DelGrosso, Danny Dhillon, Christoph Kern, Tadayoshi Kohno, Carl Landwehr, Gary McGraw, Brook Schoenfield, Margo Seltzer, Diomidis Spinellis, Izar Tarandach, and Jacob West

– cybersecurity.ieee.org/ images/ files/ images/ pdf/ CybersecurityInitiative-online.pdf

– Spanish Version in March

W orkshop on Specific Dom ains – March 2 4 -2 6

– Tools for avoiding flaws – Consider specific domains: automotive, medical, smart grid, etc. – Consider Privacy

slide-22
SLIDE 22

22 10 November 2014

try-cybsi Platform

slide-23
SLIDE 23

Understanding Security & Privacy Technologies and Challenges

W e’ve all read or heard about com plex technologies, m ethods and ideas

23

slide-24
SLIDE 24

Understanding Security & Privacy Technologies and Challenges

W e’ve all read or heard about com plex technologies, m ethods and ideas Have you w anted to know m ore beyond reading about it?

24

slide-25
SLIDE 25

Understanding Security & Privacy Technologies and Challenges

W e’ve all read or heard about com plex technologies, m ethods and ideas Have you w anted to know m ore beyond reading about it? Have you tried to use the technology? Reproduce the results? Run the dem o?

25

slide-26
SLIDE 26

Understanding Security & Privacy Technologies and Challenges

W e’ve all read or heard about com plex technologies, m ethods and ideas Have you w anted to know m ore beyond reading about it? Have you tried to use the technology? Reproduce the results? Run the dem o? Have you had those fail directly? Or fail to help you understand m ore?

26

slide-27
SLIDE 27

try-cybsi Platform

Goal: archive, curate and present: cyber security & privacy technical artifacts ( code, data, results, exploits, etc.) AND cyber security & privacy experiences of those ( exam ples, dem os, experim ents, m easurem ents, evaluations)

27

slide-28
SLIDE 28

try-cybsi Platform

try4 1 Dem o

– Dendrite example, https: / / try.lab41.org – Uses Docker and OpenStack in a private “cloud” – In-Q-Tel funded – https: / / github.com/ Lab41/ try41

28

slide-29
SLIDE 29

try-cybsi Platform

Objectives for 2 0 1 5

–Replicate try41 platform in an accessible cloud –12 experiences (containers) available –1000 completed user experiences

Experience possibilities

–Input fuzzing technique for command line inputs –Examples of buffer overflow –Threats mitigated by the new HTST web protocol

29

slide-30
SLIDE 30

Q1 2 0 1 5

– Project lead and team formed – Contracts in place or process – Initial design completed – Specific cloud selected

Q2 2 0 1 5

– Try41 capability replicated, IOC – 1 exemplar container created and available for limited use – Tutorial available for creating and ingesting containers – 3 containers in development

Q3 2 0 1 5

– try-cybsi platform announced with access to 3 exemplar containers – FOC – Call for container content creation/ submission – Ingest 3 new containers – Drive users/ viewers to containers via narrow PR

Q4 2 0 1 5

– Ingest 6 new containers – Solicit and award best content/ container – Drive users/ viewers to containers via broad PR

try-cybsi Project Plan

30

slide-31
SLIDE 31

W ant to Participate in try-cybsi?

I ndividual

–Volunteer for the development/ operations team –Create content –Use content

I nstitution

–Provide the compute platform –Provide resources to design, develop, instantiate, operate and support

Contact: try-cybsi@sei.cm u.edu

31

slide-32
SLIDE 32

32 10 November 2014

Collaborations

slide-33
SLIDE 33

NSF – W orkshop to Create a Building Code for Medical Device Softw are Security

https:/ / sites.google.com / site/ bcform dss/ hom e Novem ber 1 9 -2 1 , 2 0 1 4 New Orleans, Louisiana Co-organized by C.Landw ehr, T.Haigh

slide-34
SLIDE 34

DI MACS/ I EEE ESCAPE W orkshop

34 10 November 2014

Efficient and Scalable Cyber-security using Algorithm s Protected by Electricity ( ESCAPE)

– @CMU in Pittsburgh, June 10-12, 2015 – Co-organized by Karl Rohloff, Konrad Vesey – Considers the research and engineering implications of an IDA study for the IC: That power (electricity) is the dominate consideration in very large computations

I m plication for NI TRD is, can access to pow er be a strategy for constraining cyber threat proliferation?

slide-35
SLIDE 35

3 I – I EEE I nternet I nitiative

Goals

– Mobilize the IEEE global technical community to support an open, transparent and inclusive participatory Internet governance policy process – Promote and facilitate the development of trustworthy technology solutions in cyber-security and privacy – Help connect the IEEE technical community with the policy community toinform and amplify the voice of the technical community in policy discussion venues

IEEE Expert in Technology and Policy (ETAP) on Internet Governance, Cybersecurity, Privacy, and Policy

– May Forum co-incident with Oakand Conference – http: / / sites.ieee.org/ etap/

35

slide-36
SLIDE 36

Further I nform ation

W ebsite

– cybersecurity.ieee.org – cybersecurity.ieee.org/ center-for-secure-design.html

Em ail

– Shannon at cert dot org – kclark-fisher at computer dot org – try-cybsi@sei.cmu.edu

Tw itter

– @ieeecybsi (overall initiative) – @ieeecsd (center for secure design)

36

slide-37
SLIDE 37

Thank You

37 10 November 2014

Questions?