Publications

Refine Results

(Filters Applied) Clear All

Bootstrapping and Maintaining Trust in the Cloud(469.63 KB)

Date:
December 5, 2016
Published in:
Proceedings of the 32nd Annual Computer Security Applications Conference, ACSAC 2016
Type:
Conference Paper

Summary

Today's infrastructure as a service (IaaS) cloud environments rely upon full trust in the provider to secure applications and data. In this paper we introduce keylime, a scalable trusted cloud key management system. Keylime provides an end-to-end solution for both bootstrapping hardware rooted cryptographic identities for IaaS nodes and for system integrity monitoring of those nodes via periodic attestation.

Leveraging Data Provenance to Enhance Cyber Resilience(273.48 KB)

Date:
November 3, 2016
Published in:
Proceedings of 1st IEEE Cybersecurity Development Conference (SecDev'16), Boston, Mass.
Type:
Conference Paper

Summary

Creating bigger and better walls to keep adversaries out of our systems has been a failing strategy. The recent attacks against Target and Sony Pictures, to name a few, further emphasize this. Data provenance is a critical technology in building resilient systems that will allow systems to recover from attackers that manage to overcome the “hard-shell” defenses. In this paper, we provide background information on data provenance, details on provenance collection, analysis, and storage techniques and challenges.

High-throughput Ingest of Data Provenance Records into Accumulo(349.93 KB)

Author:
Date:
September 13, 2016
Published in:
Proceedings of IEEE High Performance Extreme Computing Conference (HPEC '16)
Type:
Conference Paper

Summary

Whole-system data provenance provides deep insight into the processing of data on a system, including detecting data integrity attacks. The downside to systems that collect whole-system data provenance is the sheer volume of data that is generated under many heavy workloads. In this paper, we investigate the use of D4M and Accumulo to support high-throughput data ingest of whole-system provenance data.

Side Channel Authenticity Discriminant Analysis for Device Class Identification(247.57 KB)

Date:
March 16, 2016
Published in:
Proceedings of GOMACTech 2016, Orlando, Fla.
Type:
Conference Paper

Summary

Counterfeit microelectronics present a significant challenge to commercial and defense supply chains. Many modern anti-counterfeit strategies rely on manufacturer cooperation to include additional identification components. We instead propose Side Channel Authenticity Discriminant Analysis (SICADA) to leverage physical phenomena manifesting from device operation to match suspect parts to a class of authentic parts.

Spyglass: Demand-Provisioned Linux Containers for Private Network Access(1.26 MB)

Author:
Date:
November 8, 2015
Published in:
Proceedings of the 29th Large Installation System Administration conference (LISA15), Washington D.C.
Type:
Conference Paper

Summary

System administrators have super-user access to the low level infrastructure of the systems and networks they maintain. Given the typical administrator’s breadth of access to this infrastructure, administrators or the client devices they use are a prime target for compromise by a motivated adversary. In this paper, we describe Spyglass, a tool for managing, securing, and auditing administrator access to private or sensitive infrastructure networks by creating on-demand bastion hosts inside of Linux containers.

Timely Rerandomization for Mitigating Memory Disclosures(215.65 KB)

Date:
October 12, 2015
Published in:
Proceedings of ACM Conference on Computer and Communications Security (CCS)
Type:
Conference Paper

Summary

Address Space Layout Randomization (ASLR) can increase the cost of exploiting memory corruption vulnerabilities. One major weakness of ASLR is that it assumes the secrecy of memory addresses and is thus ineffective in the face of memory disclosure vulnerabilities. In this paper we present an approach that synchronizes randomization with potential runtime disclosure.

Trustworthy whole-system provenance for the linux kernel(682.54 KB)

Date:
August 12, 2015
Published in:
24th USENIX Security Symposium (USENIX Security 15), Washington, D.C.
Type:
Conference Paper

Summary

A provenance-aware system automatically gathers and reports metadata that describes the history of each object being processed on the system. Provenance itself is a ripe attack vector, and its authenticity and integrity must be guaranteed before it can be put to use. We present Linux Provenance Modules (LPM), the first general framework for the development of provenance-aware systems.

Take only what you need: Leveraging mandatory access control policy to reduce provenance storage costs(280.06 KB)

Date:
July 8, 2015
Published in:
Proceedings of 7th USENIX Workshop on the Theory and Practice of Provenance (TaPP 15), Edinburgh, Scotland
Type:
Conference Paper

Summary

Provenance-aware systems offer unprecedented insight into the workings of computing systems, but retaining provenance demands considerable storage space. In this work, we propose a novel approach to policy-based provenance pruning – leverage the confinement properties provided by Mandatory Access Control (MAC) systems in order to identify subdomains of system activity for which to collect provenance.

Demand-Provisioned Linux Containers for Private Network Access(43.42 KB)

Date:
November 9, 2014
Published in:
Proceedings of the 28th Large Installation System Administration conference (LISA14)
Type:
Abstract

Summary

System Administrators often need to have remote access to restricted networks that are separated for security reasons. The most common solution to this problem is to use a virtual private network (VPN), but this exposes the restricted network directly to a potentially compromised client host. To mitigate this risk, we have created an architecture that supports self-service provisioning of non-persistent bastion containers that are unique to each user.

Showing Results

1-9 of 9