introduction
play

Introduction What is the Problem What is Science? 3 Themes - PowerPoint PPT Presentation

M EET S CIENCE OF S ECURITY Adam Tagert Ph.D. actager@tycho.ncsc.mil Science of Security & Privacy Technical Director National Security Agency Introduction What is the Problem What is Science? 3 Themes Research Focus Areas


  1. M EET S CIENCE OF S ECURITY Adam Tagert Ph.D. actager@tycho.ncsc.mil Science of Security & Privacy Technical Director National Security Agency

  2. Introduction • What is the Problem • What is Science? • 3 Themes • Research Focus Areas • Become Involved 2

  3. What is the Problem? • Best Practices • Do it Twice -> Possibly Different Results • Need to Move to Scientific Sound Approach • Science Needs to Catch up with the Engineering https://www.flickr.com/photos/digitalurbanlandscape 3

  4. Science is… • A Philological Unanswered Question • Definition is mushy • Our goal with science: – Rigorous Research – Generalizable – Predictable – Foundational – Explains the World/Cyberspace 4

  5. Tackling the Problem • In the 2000s, recognition of problem • CNCI jump start funding • NSA signed up to lead the effort for the USG • Started in 2012 5

  6. 3 Pillars of 1. Fund Needed Foundational Research 2. Nurture and Grow the SoS Community 3. Support Rigorous Research Methods 6

  7. 1. Invest in Foundational Research 7

  8. 4 Lablets • Lablet – a small transdiciplinary lab • Competitive Selection • Began 2012 using an ARO grant to 3 universities • 2014 – NSA contract with 4 Universities – From a BAA – About $8 million per year total – 20% of funding to other institutions (25 other Universities) – For Research and to build a science • 370 Published Papers 8

  9. Lablet Funding Supports • Research • Salaries and/or Tuition of Professors, Researchers, Post-Docs, Ph.D. Students, Masters Students, and undergraduate research • Outreach activities for making a science • Quarterly Meetings – Next NCSU Feb 1,2 9

  10. 5 Hard Problems • Goals & Rallying Points • A Measure for Progress • Developed with lablet PIs • Not all inclusive • Needed for improving cybersecurity situation • Progress Paper Posted 10

  11. NCSU Lablet • PIs – Laurie Williams and Munindar Singh • Metrics – 3 Projects • Human Behavior – 3 • Policy – 4 • Resilient Architectures – 4 • Evaluation & Research Methods Projects • Summer Workshop & Community Day Events 11

  12. About Science • Evaluation – Investigators: Lindsey McGowen, David Wright, Jon Stallings • Research Methods, Community Development, & Data Sharing – Investigators: Jeff Carver (UAB), Lindsey McGowen, Ehab Al-shaer (UNCC), Jon Stallings, Laurie Williams, David Wright 12

  13. S cience of Sec U re and RE silient Cyber- Physical Systems (SURE) • Vanderbilt (Lead) ; MIT; University of Hawaii; UC Berkeley • Foundational Research on Cyber Physical Systems • Research Thrusts: ▪ Hierarchical Coordination and Control ▪ Cyber Risk Analysis and Incentive Design – Resilient Monitoring and Control ▪ Science of Decentralized Security ▪ Reliable and Practical Reasoning about Secure Computation and Communication in Networks ▪ Evaluation and Experimentation ▪ Education and Outreach cps-vo.org/group/sure

  14. Science of Security Lablets National Security Agency Lablet (4) 14

  15. Science of Security Lablets and Sub-Lablets 15

  16. Science of Security Lablets, Sub-Lablets, SURE 16

  17. Lablets, Sub-Lablets, SURE, and Collaborators 17

  18. Science of Security International Locations 18

  19. 2. Nurture and Grow Science of Security & Privacy Community 19

  20. HoT-SoS • Annual Community Meeting: – Hot Topics in the Science of Security: Symposium and Bootcamp in the Science of Security • Brings Academia, Industry, Gov • HoTSoS 17 - April 3-4, 2017 – Registration Open, Posters Open • ACM In-cooperation • 2017 -> In Maryland 20

  21. Virtual Organization • Online Collaboration on NSF Virtual Organization Platform • News, Publications, Research, Forums, Events, Collaboration • 1200+ Members Joined • http://www.sos-vo.org 21

  22. Workshops, Internships, Outreach • Other activities host workshops; have interns • Support other programs such as conferences • Curriculums • Graduating Students spread the culture 22

  23. 3. Promote Rigorous Research Methods 23

  24. • Annual Competition • Papers reviewed by NSA & External Distinguished Experts • Open to All • Papers Nominated by Public • Researchers visit NSA and Present Research • Nominated Papers Before March 31 • http://sos-vo.org/ 24

  25. 4 th Annual Competition Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration Soo-Jin Moon, Vyas Sekar and Michael Reiter from Carnegie Mellon University and University of North Carolina. (CCS15) 25

  26. Also Honorable Mentions • Quantum-Secure Covert Communication on Bosonic Channels and Increasing Cybersecurity Investments in Private Secort Firms, Bash, etc al • Increasing Cybersecurity Investments in Private Secort Firms Gordon, etc al. 26

  27. Intel ISEF • NSA Research Directorate Award at Intel International Science and Engineering Fair (ISEF) • Present Award to High School Research Projects in Cybersecurity • 2017 – Los Angeles 27

  28. ISEF 2016 • 1750 Students; 80 Countries; Phoenix • 4,000 Local Students Visit Plus others 28

  29. 1st Place - $3,000 – Charles Noyes from Villa Park California for Efficient Blockchain-Driven Multiparty Computation Markets at Scale 29

  30. 2nd Place - $1,000 – Karthik Yegnesh from Lansdale Pennsylvania for Cosheaf Theoretical Constructions in Networks and Persistent Homology – Rucha Joshi from Austin Texas for Determining Network Robustness Using Region Based Connectivity 30

  31. Visit NSA 31

  32. Metrics • Attack Surface and Defense-in-Depth Metrics – Investigators: Andy Meneely (RIT), Laurie Williams • Systemization of Knowledge from Intrusion Detection Models – Investigators: Huaiyu Dai, Andy Meneely (RIT) • Vulnerability and Resilience Prediction Models – Investigators: Mladen Vouk, Laurie Williams 32

  33. Human Behavior • Warning of Phishing Attacks: Supporting Human Information Processing, Identifying Phishing Deception Indicators, and Reducing Vulnerability – Investigators: Christopher B. Mayhorn, Emerson Murphy- Hill • A Human Information-Processing Analysis of Online Deception Detection – Investigators: Robert W. Proctor, Ninghui Li, Emerson Murphy-Hill • Leveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security – Investigators: David L. Roberts, Robert St. Amant 33

  34. Secure Collaboration • Understanding the Effects of Norms and Policies on Robustness, Liveness, and Resilience of Systems – Investigators: Emily Berglund, Jon Doyle, Munindar Singh • Formal Specification and Analysis of Security - Critical Norms and Policies – Investigators: Jon Doyle, Munindar Singh, Rada Chirkova • Scientific Understanding of Policy Complexity – Investigators: Ninghui Li, Robert Proctor • Privacy Incidents Database – Investigator: Jessica Staddon 34

  35. Resilient Architectures • Resilience Requirements, Design, and Testing – Investigators: Kevin Sullivan, Mladen Vouk, Ehab Al-Shaer (UNCC) • Redundancy for Network Intrusion Prevention Systems (NIPS) – Investigator: Mike Reiter (UNC) • Smart Isolation in Large-Scale Production Computing – Investigators: Xiaohui (Helen) Gu, William Enck • Automated Synthesis of Resilient Architectures – Investigator: Ehab Al-Shaer (UNCC) 35

  36. Let’s Talk Research – Focus Areas • Access Control • PKI • Analyzing Adversary • Phishing Supplied Code • Privacy • Anomaly Detection • Real Time Monitoring • Internet of Things • Sandboxing • Mitigation • Secure Configuration Development • Secure Programming • Mobility / Android App • Testing Environments Development • Workforce Training • NIDS / Firewalls Development End

  37. Summing Up 37

  38. Getting Involved • Join the SoS – VO: http://www.sos-vo.org – Contribute to discussion; learn about what’s going on – Read Annual Report – Find published Papers • Attend Hot-SoS 2017 in Maryland Go SoS • Quarterly Meeting at NCSU, Feb 1,2 • TESTFLIGHT (JWICS) • Nominate Papers for the Competition • Email: actager@tycho.ncsc.mil • Apply Scientific Principles to Your Work 38

  39. Thank You Questions?? 39

  40. Access Control • Developing methods to find anomalies using approach that provides faster results by trading some accuracy: expected use includes access control (CMU) • Study of Norms of information flows (sharing) and its use for collaboration. Norms include emergencies (NCSU) • Focus on access control for a formal automated framework in a resilient architecture (NCSU) Home 40

  41. Analyzing Adversary Supplied Code • Developing method [UberSpark] to enforce secure object abstractions on adversary- supplied code in C99 & Assembly (CMU) • Enabling proofs of safety of programs that execute adversary supplied code without code available for deep typing analysis – uses interface confinement [System M] (CMU) Home 41

  42. Anomaly Detection • Looking at redundancy-based anomaly detectors to recognize some high risk and difficult to detect attacks on web servers by studying information flows (NCSU) Home 42

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend