SlideShare ist ein Scribd-Unternehmen logo
1 von 39
INFORMATION OPERATIONS
                                                                                &
                                                                             SECURITY

                                                                                                           5 MAR 2012


                                                                                                DR. ROBERT HERKLOTZ
                                                                                                  PROGRAM MANAGER
                                                                                                            AFOSR/RSL
         Integrity  Service  Excellence                                                 Air Force Research Laboratory


13 July 2012        DISTRIBUTION A: Approved for public release; distribution is unlimited.
2012 AFOSR SPRING REVIEW

NAME: DR. ROBERT HERKLOTZ

BRIEF DESCRIPTION OF PORTFOLIO:
Fund science that will enable the AF and DOD to dominate
cyberspace: Science to develop secure information systems for our
warfighters and to deny the enemy such systems.

LIST SUB-AREAS IN PORTFOLIO:
1: SOS-Science of Security
2: Secure Humans
3: Secure Networks
4: Secure Hardware
5: Covert Channels
6: Execute on Insecure Systems
7: Secure Data
8: Secure Systems-Security Policy

           DISTRIBUTION A: Approved for public release; distribution is unlimited.
Information Operations and Security 61102F
                                                          Cyber Security
               MOTIVATION                                                                       PICTURE

• Cyber Security basic research has the
  potential to change the current balance                                                   Attacks
  that favors the attackers
• Discovery and development of a Science
  of Cyber Security (SOS) should be
  vigorously pursued                                                                      Defenses
                                                                                                      Policies
• Develop methods to execute mission
  while under attack

            TECHNICAL IDEAS                                                                     PAYOFF
• Science   of Security: formally model                                       • Inherently secure software and hardware
 relationships between attacks, defenses                                        systems can be deployed in the future
 and policies and invent good metrics                                         • Covert channels can be anticipated and
• Develop a theory of Covert Channels                                           denied or used
• Pursue methods to execute mission                                on         • Insecure, distributed systems can be
 insecure components                                                            used to execute the mission


                DISTRIBUTION A: Approved for public release; distribution is unlimited.                          Level 3
SOS Laws: Analysis and
                    Synthesis
• Science:
   – Laws or theories that are predictive
• Analysis: Given an artifact, predict its
  properties…
   – Qualitative properties: What it does?
   – Quantiative properties: How well?
• Synthesis: Compose artifacts with given
  properties to obtain a new one with
  predictable properties.


       DISTRIBUTION A: Approved for public release; distribution is unlimited.
SOS: Laws about What?

                                                  • Features:
  Attacks
                                                     • Classes of policies
                                                     • Classes of attacks
Defenses
                      Policies
                                                     • Classes of defenses
                                                  • Relationships (= SoS)
                                                     • Defense class D enforces policy
                                                                  class P despite attacks from class A.




           DISTRIBUTION A: Approved for public release; distribution is unlimited.
AFOSR MURI Project                                                              Sept 23, 2011
       Science of Cyber Security: Modeling,
         Composition, and Measurement


 Anupam Datta (CMU)
 Joe Halpern (Cornell)
 John Mitchell (Stanford, PI)
 Andrew Myers (Cornell)
 Andre Scedrov (U Penn)
 Fred Schneider (Cornell)
 David Wagner (UC Berkeley)
 Jeannette Wing (CMU)
 Ittai Abraham (Microsoft Research, unfunded collaborator)



Stanford, Berkeley, Carnegie-Mellon, Cornell, U Penn



        DISTRIBUTION A: Approved for public release; distribution is unlimited.
SOS MURI Goals
• Scientific objective
   – Advance the science base for trustworthiness by
     developing concepts, relationships, and laws with predictive
     value.
• Technical approach
   – Security modeling: characterize system, threats, and
     desired properties. Leverage game-theoretic concepts to
     model incentives for the defender and attacker.
   – Composition: develop principles for explaining when
     security schemes compose, and how to achieve
     compositionality.
   – Security Measurement: goals include determining relative
     strengths of defense mechanisms, evaluating design
     improvements, and calculating whether additional
     mechanism is warranted based on attacker and defender
     incentives
          DISTRIBUTION A: Approved for public release; distribution is unlimited.
Science Base for
Evaluation and Characterization of
  System Trustworthiness-SOS
             Metrics

                           Fred B. Schneider
        Department of Computer Science
               Cornell University
               Ithaca, New York




   DISTRIBUTION A: Approved for public release; distribution is unlimited.
Kinds of Analysis Laws

• Analysis: Given an artifact, predict its
  properties…
  – Qualitative properties: What it does.
  – Quantitative properties: How well it works.

• Synthesis: Compose artifacts with given
  properties to obtain a new one with
  predictable properties.




       DISTRIBUTION A: Approved for public release; distribution is unlimited.
The Promise of Security Metrics

• Users: Purchasing decisions
  – Which system is the better value?

• Builders: Engineering trade-offs
  – Select among different designs?

• Researchers: Evaluating new ideas
  – Basis for declaring success!




Fred B. Schneider, Cornell
          DISTRIBUTION A: Approved for public release; distribution is unlimited.
Definition: Security Metric

“μ is a security metric” should mean…
  – μ: Systems  Vals, where:
     • < is a partial order on Vals
       … so theory applies to more “metrics”. E.g.,
            μ(S) = {all attacks that compromise S}
     • μ(S) is efficiently computable
     • x<y is efficiently computable

Intent: < reflects “actual security”, so
      μ(S)< μ(S’) means S is less secure than S’



    Fred B. Schneider, Cornell
           DISTRIBUTION A: Approved for public release; distribution is unlimited.
Properties of Security Metrics


Define: S«S’ – S is “less secure than” S’
Soundness of μ: (Useful for users)
  μ(S)< μ(S’)                          implies                            S«S’
Completeness of μ: (Useful for engineers)
  S«S’            implies                            μ(S)< μ(S’)




         DISTRIBUTION A: Approved for public release; distribution is unlimited.
S«S’: The Fine Print

If S«S’ holds then …
 S, S’ must implement “same” specification:
  – Specification defines an interface.
    • All interactions with the system involve actions in this interface.
      E.g., Includes side-channels.
  – Specification describes expected effects of actions
    at the interface.
 An attack is an input that causes the
 specification to be violated.



         DISTRIBUTION A: Approved for public release; distribution is unlimited.
The $64,000 Question!

For what classes of specifications do there exist
  sound (and complete?) security metrics?

Conjecture:
  – Expressive specs IMPLY security metric μ must be
    undecidable or μ incomplete.
  – Security metric μ decidable and soundness IMPLY
    F expressiveness is bounded by static type
    checking.



       DISTRIBUTION A: Approved for public release; distribution is unlimited.
Non-Intrusive Media Forensics
             Framework




                       K. J. Ray Liu and Min Wu
Department of Electrical and Computer Engineering
University of Maryland, College Park




         DISTRIBUTION A: Approved for public release; distribution is unlimited.
Digital Multimedia Anti-Forensics

• Very little consideration has been given to anti-forensic
  operations
   – Designed to remove/falsify
     intrinsic fingerprints
   – Create undetectable forgeries

• The study of anti-forensics is                                                      critical
   – Identifies weaknesses in existing
     forensic techniques
   – Important for the development of
     tools to detect the use of anti-forensic
     operations



            DISTRIBUTION A: Approved for public release; distribution is unlimited.
ENF: A Ubiquitous and Natural
                       Fingerprint
• ENF: Electrical Network Frequency
   –       60 Hz in North America, 50 Hz elsewhere (50/60 Hz in Japan)
   –       Electro-magnetic (EM) field from power grid interferes with electronic
           recording mechanisms (Sensors)

• ENF varies slightly from 50/ 60 Hz over time
   –       Deviations depends on regulations: ~ on the order of 0.05-0.1Hz
   –       Main trends are the same over the power grid [1]

• ENF can be “heard” and “seen”
   – Present in audio recordings near power sources
   – We showed luminance of indoor lightings fluctuates based on ENF
           • Captured by optical sensors: photo diode, CCD camera sensors, etc.
   –       Random deviations can be used as fingerprints for multimedia
           content:
           • Determine the time and place of recordings
           • Detect tampering in the multimedia content; bind video and audio
  [1] C.
       Grigoras. Applications of ENF criterion in forensics: Audio, video, computer and
  telecommunication analysis. Forensic Science International, 167(2-3):136 – 145, April 2007.
               DISTRIBUTION A: Approved for public release; distribution is unlimited.
Verify Time of Recording
                    600                                                                                                                                                          0.9
                                                                       -80
                                                                                                  500                                           -20
                    500                                                -90                                                                                                       0.8




                                                                                                                                                       Correlation coefficient
                                                                       -100                       400                                           -40                              0.7




                                                                              Time (in seconds)
Time (in seconds)




                    400
                                                                       -110                                                                                                      0.6
                                                                                                  300                                           -60
                    300
                                                                       -120                                                                                                      0.5

                    200                                                -130                       200
                                                                                                                                                -80                              0.4
                                                                       -140
                    100                                                                           100                                                                            0.3
                                                                                                                                                -100
                                                                       -150
                                                                                                                                                                                  -30   -20   -10          0       10   20   30
                           9.6     10                 10.4    10.8                                      49.5   50      50.5         51   51.5                                                       Time frame lag
                                  Frequency (in Hz)                                                             Frequency (in Hz)


                          Video ENF signal                                                              Power ENF signal                                                          Normalized correlation

                             ENF matching result demonstrating similar variations in the ENF signal
                             extracted from video and from power signal recorded in India

                          Aliasing Challenge with video: temporal sampling rate lower than ENF
                          Our recent results from US, China, and India power grids
                                Exploit signal processing to harvest from aliasing
                                Highest correlation between power ENF and video ENF signal corresponds to the
                                 time at which recording took place

                                                 DISTRIBUTION A: Approved for public release; distribution is unlimited.
Tampering Detection
     ENF matching result demonstrating the detection of
     video tampering based on the ENF traces
                                                                     ENF signal from Video
     Frequency (in Hz)




                         10.3
                         10.2
                         10.1                                           Inserted
                          10                                              clip
                                             160                 320            480           640   800   960
                                                                            Time (in seconds)
                                                                    Ground truth ENF signal
     Frequency (in Hz)




                         50.2
                         50.1
                          50
                         49.9
                                             160                 320            480           640   800
                                                                            Time (in seconds)

• Adding a clip between the original video leads to
  discontinuity in the ENF signal extracted from video
• Clip insertion can also be detected by comparing the
  video ENF signal with the power ENF signal at
  corresponding time      DISTRIBUTION A: Approved for public release; distribution is unlimited.
Forensic Binding of Audio and Visual
                     Tracks
• ENFs in audio and video tracks captured at the same
  time have high correlation




• Research questions ahead:
  (1) How to accurately estimate and match weak and noisy ENF?
  (2) Can ENF be removed? Tampered? (3) How to prevent anti-
  foreniscs on ENF? for public release; distribution is unlimited.
         DISTRIBUTION A: Approved
                                  ……
AFOSR INFORMATION OPERATIONS & SECURITY 2011 PI MEETING
                                                                                        19-23 SEPTEMBER 2011
                                                                                                ALINGTON, VA




                            High Performance Semantic
                                  Cloud Auditing




                                                  Keesook J. Han, Ph.D
                                                      Keesook.Han@rl.af.mil

                        Develop High Performance Semantic Cloud Auditing Technologies and Applications
                            that includes Comprehensive Cloud Auditing Data Capturing, Analysis and
                                       Rapid Response to Improve Cloud Quality of Services.

                       Approved for Public Release; Distribution Unlimited: 88ABW-2011-4496, 16-Aug 2011
                Approved for Public Release; Distribution is unlimited.
                    DISTRIBUTION A: Approved for public release; distribution Unlimited: 88ABW-2011-4496, 16-Aug 2011   Keesook.Han@rl.af.mil
INFORMATION INSTITUTE WORKSHOP on ASSURING THE CLOUD, 11 July 2011, GRIFISS Institute, Rome, NY                         POC: AFRL/RIGA Dr.
Cloud Research
                                                              Facilities

                  University of Texas at                                    Texas A&M                          University of
                      San Antonio                                           University                        South Carolina

                FlexFarm (Honeyfarm)&FlexCloud:                      Cisco Test Engineering Center         Router Testbed: Center for
                    Institute for Cyber Security                        Cisco Cloud Testing Lab        Information Assurance Engineering



                                                                            SUNY                         University of Illinois at
                 University of Texas at
                                                                     Binghamton University                Urbana Champaign
                        Dallas
                                                                                                        Coordinated Science Lab Assured
                 UTD Secure Cloud Repository:                         GPGPU Cluster: Real-Time
                                                                                                        Assured Cloud Computing Center
                     Hadoop File System                                Embedded Systems Lab



                                                                            Rochester                          University of
                     Tennessee State
                                                                     Institute of Technology                    Pittsburgh
                        University

                 Center of Excellence in Information               Networking, Security, and Systems         Swanson Institute for
               Systems and Engineering Management                        Administration Labs                  Technical Excellence




                University of Missouri                                           AFRL                     Georgia Institute of
                     Kansas City                                                  RI                         Technology

                 Networking & Multimedia                                  GPGPU Cluster:                 Foundations of Data and Visual
                       System Lab                                      CONDOR Supercomputer                    Analytics Center
                                                                         UNCLASSIFIED
                         Approved for Public Release; Distribution Unlimited: 88ABW-2011-4496, 16-Aug 2011
                       DISTRIBUTION A: Approved for public release; distribution is unlimited.                                             Keesook.Han@rl.af.mil
INFORMATION INSTITUTE WORKSHOP on ASSURING THE CLOUD, 11 July 2011, GRIFISS Institute, Rome, NY                                            POC: AFRL/RIGA Dr.
Conclusion

      Semantic Cloud Auditing:
        Develop Efficient Information Theoretic Metadata and Aggregation: Fast Information Exploitation of
        Massive Cloud Auditing Data for Rapid Response



      Semantic Cloud Auditing will benefit to the following projects:
       • Access Control: “Advanced Access Control for Assured Clouds”
       • Cloud Security: “Honeyfarm Data Capturing, Rapid Sharing and Exploitation of Malicious Traffic for Cloud
         Security”
       • Customized Hadoop: “Massive Cloud Auditing Using Data Mining on Hadoop”
       • Secure Hadoop: “Assured Information Storage and Sharing on Hadoop”
       • GPGPU Computing: “High Performance Processing of Cloud Auditing Data Using GPGPU Many-Core
         Parallelism”
       • SLA-based Cloud Service Workloads: “Dynamic Mapping of Cloud Resources to Meet Service Level
         Agreement (SLA)-based Cloud Service Workloads”
       • Traffic Control: “Router-Based Filtering and Rerouting to Traffic Control in Cloud Computing”
       • Outage Management: “Router-Initiated Network Outage Management for Multitenant Clouds”
       • File Transfer: “Bandwidth Intensive Multimedia Data Transfer for Smartphone-Friendly Cloud Services”



                      Approved for Public Release; Distribution Unlimited: 88ABW-2011-4496, 16-Aug 2011
                     DISTRIBUTION A: Approved for public release; distribution is unlimited.                 Keesook.Han@rl.af.mil
INFORMATION INSTITUTE WORKSHOP on ASSURING THE CLOUD, 11 July 2011, GRIFISS Institute, Rome, NY              POC: AFRL/RIGA Dr.
Detection of Covertly Embedded
 Hardware in Digital Systems

                      Douglas H. Summerville
              Associate Professor
     Electrical and Computer Engineering
  State University of New York at Binghamton



   DISTRIBUTION A: Approved for public release; distribution is unlimited.
Covertly Embedded Trojan

• Malicious circuit embedded in
  “implementation space” of its host
  – Neither functional nor parametric
• Trojan uses existing resources that are
  artifacts of the host’s implementation
• No alteration of functional characteristics of
  host, therefore not testable
• Can be combinational or sequential circuits



       DISTRIBUTION A: Approved for public release; distribution is unlimited.
The Embedding

• Covert Hardware alters the circuit’s behavior
  in the “don’t care” space
• In effect, two circuits co-exist in the same
  physical hardware
  – The original circuit, only exercised during normal
    operation
  – The malicious circuit, exercised by special trigger




       DISTRIBUTION A: Approved for public release; distribution is unlimited.
Motivating Assumption

• Assume general
  case is unsolvable
• In practice, standard
  design approaches
  generate a small
  fraction of possible
  implementations
• We focus on
  securing few
  practical cases

       DISTRIBUTION A: Approved for public release; distribution is unlimited.
Structural Circuit Analysis
• Can’t look at circuit’s function, so look at its
  structure
• Exploits how design approaches optimize for
  speed, area, power, etc. in deterministic ways
  – Contributing regularity to circuit structure
• Identify structural characteristics of circuits
  that
  – Result from standard design approaches
  – Are removed or altered by tampering
• Restrict optimization to solutions in that
  space
  – tradeoff
        DISTRIBUTION A: Approved for public release; distribution is unlimited.
Detecting Hidden Communications
            Protocols


                     R. R. Brooks
                     Associate Professor
                     Holcombe Department of Electrical
                     and Computer Engineering
                     Clemson University
                     Clemson, SC 29634-0915
                     Tel. 864-656-0920
                     Fax. 864-656-1347
                     email: rrb@acm.org

  DISTRIBUTION A: Approved for public release; distribution is unlimited.
Detection of Hidden Communications
                                                  Protocols
                                      Richard Brooks: rrb@acm.org, Clemson University


Objective
Detect use of tunneled communications
protocols and infer their current internal
state
 • Private communications often tunneled through
   virtual private networks (VPNs)
 • Mix networks tunnel connections for anonymity
 • Tunneling tools (ex. ssh, ssl, TOR) have timing
   vulnerabilities
 • Hidden Markov models (HMM) and probabilistic
   grammars will detect protocol use, infer network
   flows, partially decipher content



DoD Benefit:                                                                           Technical Approach:
• Detection of tunneled communications                                                    •    Collect inter-packet timing information from
                                                                                               tunneled sessions
  protocols
                                                                                          •    Zero-knowledge HMM model inference
• In some cases (ex. interactive ssh), partially                                          •    Determination of HMM statistical significance
                                                                                          •    Tracking HMM transitions driven by network flow
  decipher message contents
                                                                                               inter-packet timing data detects protocol use
• Determination of communications patterns                                                •    Viterbi algorithm finds maximum likelihood Markov
  in mix networks, such as TOR                                                                 state sequence
                                                                                          •    Two point-to-point connections with same Markov
• Detection of timing side channel attack                                                      state sequences (Viterbi paths) are likely data
  vulnerabilities in DoD networks                                                              source and sink

                      DISTRIBUTION A: Approved for public release; distribution is unlimited                                                       30
Active Defense:
Reactively Adaptive Malware:
    Attacks & Defenses

  Kevin W. Hamlen & Latifur Khan
   University of Texas at Dallas

 AFOSR Contract FA9550-10-1-0088
        September 2011

 DISTRIBUTION A: Approved for public release; distribution is unlimited.
Attacks Upon Signature-matchers

• Randomize features during                                                    decryptor
  propagation
  – Polymorphism
    • encrypt payload with randomly
      chosen key
  – Oligomorphism
    • randomly re-assemble decryptor                                           encrypted
  – Metamorphism                                                                payload
    • non-deterministically recompile
      decryptor and/or payload
• Weakness: Undirected
  mutation



     DISTRIBUTION A: Approved for public release; distribution is unlimited.
Reactively Adaptive MALware (RAMAL)


• Three challenges:
  1. Covertly harvest data about victim defenses
     (malware signature databases)
  2. Mine harvested data effectively
  3. Derive new mutation strategy from inferred
     model




      DISTRIBUTION A: Approved for public release; distribution is unlimited.
Hardware, Languages, & Architectures for
    Defense Against Hostile Operating Systems
                    (DHOSA)




V. Adve, UIUC
K.Asanović, UC Berkeley
D.Evans, UVA
S.King, UIUC
G.Morrisett, Harvard
R.Sekar, U Stony Brook
D.Song, UC Berkeley
D.Wagner (PI), UC Berkeley
                http://www.dhosa.org/
       DISTRIBUTION A: Approved for public release; distribution is unlimited.
The Approaches

 Advances that cut across traditional
 disciplines:
• new OS and software architectures
• new hardware architectures
• new policy enforcement techniques
• new techniques for trustworthiness
• new coding techniques




       DISTRIBUTION A: Approved for public release; distribution is unlimited.
Cryptographic
        SVA
                                                                                           secure
                                                                                         computation
                                              e.g., Enforce
     Binary translation                       properties
            and                                    on a
                                              malicious OS                              Data-centric
        emulation
                                                                                         security
                                                                                                        e.g., Enable
                                                                                                        complex
    Formal methods                                                                                      distributed
                                                                                                             systems, with
                                                                                                        resilience to
TRANSFORMATION                                                                         Secure browser   hostile OS’s
                                                                                         appliance

 Hardware support for
      isolation
                                              e.g., Prevent                            Secure servers
                                                    data
                                              exfiltration
      Dealing with                                                            WEB-BASED
   malicious hardware                                                         ARCHITECTURES

HARDWARE                                                                      SYSTEM ARCHITECTURES
              DISTRIBUTION A: Approved for public release; distribution is unlimited                                    36
Helix:
                    A Self-Regenerative Architecture
                                              for the
                             Incorruptible Enterprise
                                    MURI 2007 - 2012



                                         John Knight
                                    University of Virginia
                                            AFOSR PI Meeting
                                                   9/21/2011

9/21/2011   Helix MURI Project --                         37
Helix Team Members
•   University of Virginia
     –   John C. Knight (PI)                                       -                   Software engineering, dependability
     –   Jack W. Davidson                                          -                   Languages, security, virtual machine
     –   David Evans                                               -                   Security, applied cryptography
     –   Westley Weimer                                            -                   Program analysis
     –   Anh Nguyen-Tuong                                          -                   Security, grid computing
•   University of New Mexico
     –   Stephanie Forrest                                         -                   Biological inspired computing
     –   Jared Saia                                                -                   Computational & game theory
•   University of California at Davis
     –   Hao Chen                                                  -                   Security, Web applications
     –   Zhendong Su                                               -                   Program analysis, software engineering
     –   S. Felix Wu                                               -                   System fault tolerance
     –   Jeff Rowe                                                 -                   Operating systems
     –   Karl Levitt                                               -                   Security
•   University of California at Santa Barbara
     –   Frederic Chong                                                                -           Secure hardware, hardware acceleration
                                                                                       for program/system analysis



                    DISTRIBUTION A: Approved for public release; distribution is unlimited.
Research Highlights
• Security for mobile devices:                                           • Automated repairs via
   – Static analysis                                                       genetic programming:
     framework for detecting                                                – Demonstrated on
     information leaks                                                        assembly code
     (Android)                                                              – Proactive
                                                                              diversity/variant
• Security for web                                                            generation
  applications:
   – Static analysis to detect                                           • Hardware/architecture for
     access control                                                        security:
     vulnerabilities                                                        – Hardware description
                                                                              language (compiler
• Security for applications:                                                  released)
   – Detection of unsafe                                                    – Provably leak-free
     component loading                                                        hardware
                          See web site: http://helix.cs.virginia.edu
9/21/2011
            DISTRIBUTION A: Approved for public release; distribution is unlimited.

Weitere ähnliche Inhalte

Ähnlich wie Herklotz - Information Operations & Security - Spring Review 2012

Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.rNASAPMC
 
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...The Air Force Office of Scientific Research
 
USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury AFCEA International
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...DETER-Project
 
Fred størseth. new strains of society hidden, dynamic and emergent vulnerabil...
Fred størseth. new strains of society hidden, dynamic and emergent vulnerabil...Fred størseth. new strains of society hidden, dynamic and emergent vulnerabil...
Fred størseth. new strains of society hidden, dynamic and emergent vulnerabil...NordForsk
 
DevSecOps_Talk_Oracle_Sept2022.pdf
DevSecOps_Talk_Oracle_Sept2022.pdfDevSecOps_Talk_Oracle_Sept2022.pdf
DevSecOps_Talk_Oracle_Sept2022.pdfAli Babar
 
Education_Diversity_in_System_Safety_and_Human_Systems_Integration
Education_Diversity_in_System_Safety_and_Human_Systems_IntegrationEducation_Diversity_in_System_Safety_and_Human_Systems_Integration
Education_Diversity_in_System_Safety_and_Human_Systems_IntegrationBrandie Jackson
 
NSF Software @ ApacheConNA
NSF Software @ ApacheConNANSF Software @ ApacheConNA
NSF Software @ ApacheConNADaniel S. Katz
 
WSN Security Research Directions
WSN Security Research DirectionsWSN Security Research Directions
WSN Security Research DirectionsEmil Lupu
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectDETER-Project
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoonNASAPMC
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunk
 
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunk
 
Macro Trends, Architecture, and the Hidden Nature of Complexity (and what doe...
Macro Trends, Architecture, and the Hidden Nature of Complexity (and what doe...Macro Trends, Architecture, and the Hidden Nature of Complexity (and what doe...
Macro Trends, Architecture, and the Hidden Nature of Complexity (and what doe...David Meyer
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...DETER-Project
 

Ähnlich wie Herklotz - Information Operations & Security - Spring Review 2012 (20)

Odum.t.averbeck.r
Odum.t.averbeck.rOdum.t.averbeck.r
Odum.t.averbeck.r
 
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
Bonneau - Complex Networks Foundations of Information Systems - Spring Review...
 
USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury USSTRATCOM Cyber & Space 2011 Mark Maybury
USSTRATCOM Cyber & Space 2011 Mark Maybury
 
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
 
Fred størseth. new strains of society hidden, dynamic and emergent vulnerabil...
Fred størseth. new strains of society hidden, dynamic and emergent vulnerabil...Fred størseth. new strains of society hidden, dynamic and emergent vulnerabil...
Fred størseth. new strains of society hidden, dynamic and emergent vulnerabil...
 
DevSecOps_Talk_Oracle_Sept2022.pdf
DevSecOps_Talk_Oracle_Sept2022.pdfDevSecOps_Talk_Oracle_Sept2022.pdf
DevSecOps_Talk_Oracle_Sept2022.pdf
 
Education_Diversity_in_System_Safety_and_Human_Systems_Integration
Education_Diversity_in_System_Safety_and_Human_Systems_IntegrationEducation_Diversity_in_System_Safety_and_Human_Systems_Integration
Education_Diversity_in_System_Safety_and_Human_Systems_Integration
 
NSF Software @ ApacheConNA
NSF Software @ ApacheConNANSF Software @ ApacheConNA
NSF Software @ ApacheConNA
 
WSN Security Research Directions
WSN Security Research DirectionsWSN Security Research Directions
WSN Security Research Directions
 
The Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER ProjectThe Science of Cyber Security Experimentation: The DETER Project
The Science of Cyber Security Experimentation: The DETER Project
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoon
 
SplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for SecuritySplunkLive Auckland 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
 
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for SecuritySplunkLive Wellington 2015 - Splunk for Security
SplunkLive Wellington 2015 - Splunk for Security
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
 
Macro Trends, Architecture, and the Hidden Nature of Complexity (and what doe...
Macro Trends, Architecture, and the Hidden Nature of Complexity (and what doe...Macro Trends, Architecture, and the Hidden Nature of Complexity (and what doe...
Macro Trends, Architecture, and the Hidden Nature of Complexity (and what doe...
 
Fahroo - Dynamics & Control - Spring Review 2012
Fahroo - Dynamics & Control - Spring Review 2012Fahroo - Dynamics & Control - Spring Review 2012
Fahroo - Dynamics & Control - Spring Review 2012
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
ΕΛΙΣΜΕ 20181108 Νικήτας Νικητάκος «Επαναστατικές Τεχνολογίες στις Ε.Δ. και Νέ...
 

Mehr von The Air Force Office of Scientific Research

Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...The Air Force Office of Scientific Research
 

Mehr von The Air Force Office of Scientific Research (20)

Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013
Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013
Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013
 
Li - Energy Conversion and Combustion Sciences - Spring Review 2013
Li - Energy Conversion and Combustion Sciences - Spring Review 2013Li - Energy Conversion and Combustion Sciences - Spring Review 2013
Li - Energy Conversion and Combustion Sciences - Spring Review 2013
 
Birkan - Space Propulsion and Power - Spring Review 2013
Birkan - Space Propulsion and Power - Spring Review 2013Birkan - Space Propulsion and Power - Spring Review 2013
Birkan - Space Propulsion and Power - Spring Review 2013
 
Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013
Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013
Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013
 
Bradshaw - Sensory Information Systems - Spring Review 2013
Bradshaw - Sensory Information Systems - Spring Review 2013Bradshaw - Sensory Information Systems - Spring Review 2013
Bradshaw - Sensory Information Systems - Spring Review 2013
 
Bradshaw - Human Performance and Biosystems - Spring Review 2013
Bradshaw - Human Performance and Biosystems - Spring Review 2013Bradshaw - Human Performance and Biosystems - Spring Review 2013
Bradshaw - Human Performance and Biosystems - Spring Review 2013
 
Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013
Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013
Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013
 
DeLong - Natural Materials and Systems - Spring Review 2013
DeLong - Natural Materials and Systems - Spring Review 2013DeLong - Natural Materials and Systems - Spring Review 2013
DeLong - Natural Materials and Systems - Spring Review 2013
 
Harrison - Low Density Materials - Spring Review 2013
Harrison - Low Density Materials - Spring Review 2013Harrison - Low Density Materials - Spring Review 2013
Harrison - Low Density Materials - Spring Review 2013
 
Lee - Organic Materials Chemistry - Spring Review 2013
Lee - Organic Materials Chemistry - Spring Review 2013Lee - Organic Materials Chemistry - Spring Review 2013
Lee - Organic Materials Chemistry - Spring Review 2013
 
Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013
Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013
Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013
 
Weinstock - Quantum Electronic Solids - Spring Review 2013
Weinstock - Quantum Electronic Solids - Spring Review 2013Weinstock - Quantum Electronic Solids - Spring Review 2013
Weinstock - Quantum Electronic Solids - Spring Review 2013
 
Hwang - Adaptive Multimode Sensing - Spring Review 2013
Hwang - Adaptive Multimode Sensing - Spring Review 2013Hwang - Adaptive Multimode Sensing - Spring Review 2013
Hwang - Adaptive Multimode Sensing - Spring Review 2013
 
Hwang - GHz-THz Electronics - Spring Review 2013
Hwang - GHz-THz Electronics - Spring Review 2013Hwang - GHz-THz Electronics - Spring Review 2013
Hwang - GHz-THz Electronics - Spring Review 2013
 
Pomrenke - Photonics and Optoelectronics - Spring Review 2013
Pomrenke - Photonics and Optoelectronics - Spring Review 2013Pomrenke - Photonics and Optoelectronics - Spring Review 2013
Pomrenke - Photonics and Optoelectronics - Spring Review 2013
 
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
 
DeLong - Complex Materials and Devices - Spring Review 2013
DeLong - Complex Materials and Devices - Spring Review 2013DeLong - Complex Materials and Devices - Spring Review 2013
DeLong - Complex Materials and Devices - Spring Review 2013
 
Myung - Computational Cognition and Robust Decision Making - Spring Review 2013
Myung - Computational Cognition and Robust Decision Making - Spring Review 2013Myung - Computational Cognition and Robust Decision Making - Spring Review 2013
Myung - Computational Cognition and Robust Decision Making - Spring Review 2013
 
Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013
Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013
Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013
 
Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013
Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013
Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013
 

Kürzlich hochgeladen

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Kürzlich hochgeladen (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Herklotz - Information Operations & Security - Spring Review 2012

  • 1. INFORMATION OPERATIONS & SECURITY 5 MAR 2012 DR. ROBERT HERKLOTZ PROGRAM MANAGER AFOSR/RSL Integrity  Service  Excellence Air Force Research Laboratory 13 July 2012 DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 2. 2012 AFOSR SPRING REVIEW NAME: DR. ROBERT HERKLOTZ BRIEF DESCRIPTION OF PORTFOLIO: Fund science that will enable the AF and DOD to dominate cyberspace: Science to develop secure information systems for our warfighters and to deny the enemy such systems. LIST SUB-AREAS IN PORTFOLIO: 1: SOS-Science of Security 2: Secure Humans 3: Secure Networks 4: Secure Hardware 5: Covert Channels 6: Execute on Insecure Systems 7: Secure Data 8: Secure Systems-Security Policy DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 3. Information Operations and Security 61102F Cyber Security MOTIVATION PICTURE • Cyber Security basic research has the potential to change the current balance Attacks that favors the attackers • Discovery and development of a Science of Cyber Security (SOS) should be vigorously pursued Defenses Policies • Develop methods to execute mission while under attack TECHNICAL IDEAS PAYOFF • Science of Security: formally model • Inherently secure software and hardware relationships between attacks, defenses systems can be deployed in the future and policies and invent good metrics • Covert channels can be anticipated and • Develop a theory of Covert Channels denied or used • Pursue methods to execute mission on • Insecure, distributed systems can be insecure components used to execute the mission DISTRIBUTION A: Approved for public release; distribution is unlimited. Level 3
  • 4. SOS Laws: Analysis and Synthesis • Science: – Laws or theories that are predictive • Analysis: Given an artifact, predict its properties… – Qualitative properties: What it does? – Quantiative properties: How well? • Synthesis: Compose artifacts with given properties to obtain a new one with predictable properties. DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 5. SOS: Laws about What? • Features: Attacks • Classes of policies • Classes of attacks Defenses Policies • Classes of defenses • Relationships (= SoS) • Defense class D enforces policy class P despite attacks from class A. DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 6. AFOSR MURI Project Sept 23, 2011 Science of Cyber Security: Modeling, Composition, and Measurement Anupam Datta (CMU) Joe Halpern (Cornell) John Mitchell (Stanford, PI) Andrew Myers (Cornell) Andre Scedrov (U Penn) Fred Schneider (Cornell) David Wagner (UC Berkeley) Jeannette Wing (CMU) Ittai Abraham (Microsoft Research, unfunded collaborator) Stanford, Berkeley, Carnegie-Mellon, Cornell, U Penn DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 7. SOS MURI Goals • Scientific objective – Advance the science base for trustworthiness by developing concepts, relationships, and laws with predictive value. • Technical approach – Security modeling: characterize system, threats, and desired properties. Leverage game-theoretic concepts to model incentives for the defender and attacker. – Composition: develop principles for explaining when security schemes compose, and how to achieve compositionality. – Security Measurement: goals include determining relative strengths of defense mechanisms, evaluating design improvements, and calculating whether additional mechanism is warranted based on attacker and defender incentives DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 8. Science Base for Evaluation and Characterization of System Trustworthiness-SOS Metrics Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 9. Kinds of Analysis Laws • Analysis: Given an artifact, predict its properties… – Qualitative properties: What it does. – Quantitative properties: How well it works. • Synthesis: Compose artifacts with given properties to obtain a new one with predictable properties. DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 10. The Promise of Security Metrics • Users: Purchasing decisions – Which system is the better value? • Builders: Engineering trade-offs – Select among different designs? • Researchers: Evaluating new ideas – Basis for declaring success! Fred B. Schneider, Cornell DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 11. Definition: Security Metric “μ is a security metric” should mean… – μ: Systems  Vals, where: • < is a partial order on Vals … so theory applies to more “metrics”. E.g., μ(S) = {all attacks that compromise S} • μ(S) is efficiently computable • x<y is efficiently computable Intent: < reflects “actual security”, so μ(S)< μ(S’) means S is less secure than S’ Fred B. Schneider, Cornell DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 12. Properties of Security Metrics Define: S«S’ – S is “less secure than” S’ Soundness of μ: (Useful for users) μ(S)< μ(S’) implies S«S’ Completeness of μ: (Useful for engineers) S«S’ implies μ(S)< μ(S’) DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 13. S«S’: The Fine Print If S«S’ holds then … S, S’ must implement “same” specification: – Specification defines an interface. • All interactions with the system involve actions in this interface. E.g., Includes side-channels. – Specification describes expected effects of actions at the interface. An attack is an input that causes the specification to be violated. DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 14. The $64,000 Question! For what classes of specifications do there exist sound (and complete?) security metrics? Conjecture: – Expressive specs IMPLY security metric μ must be undecidable or μ incomplete. – Security metric μ decidable and soundness IMPLY F expressiveness is bounded by static type checking. DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 15. Non-Intrusive Media Forensics Framework K. J. Ray Liu and Min Wu Department of Electrical and Computer Engineering University of Maryland, College Park DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 16. Digital Multimedia Anti-Forensics • Very little consideration has been given to anti-forensic operations – Designed to remove/falsify intrinsic fingerprints – Create undetectable forgeries • The study of anti-forensics is critical – Identifies weaknesses in existing forensic techniques – Important for the development of tools to detect the use of anti-forensic operations DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 17. ENF: A Ubiquitous and Natural Fingerprint • ENF: Electrical Network Frequency – 60 Hz in North America, 50 Hz elsewhere (50/60 Hz in Japan) – Electro-magnetic (EM) field from power grid interferes with electronic recording mechanisms (Sensors) • ENF varies slightly from 50/ 60 Hz over time – Deviations depends on regulations: ~ on the order of 0.05-0.1Hz – Main trends are the same over the power grid [1] • ENF can be “heard” and “seen” – Present in audio recordings near power sources – We showed luminance of indoor lightings fluctuates based on ENF • Captured by optical sensors: photo diode, CCD camera sensors, etc. – Random deviations can be used as fingerprints for multimedia content: • Determine the time and place of recordings • Detect tampering in the multimedia content; bind video and audio [1] C. Grigoras. Applications of ENF criterion in forensics: Audio, video, computer and telecommunication analysis. Forensic Science International, 167(2-3):136 – 145, April 2007. DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 18. Verify Time of Recording 600 0.9 -80 500 -20 500 -90 0.8 Correlation coefficient -100 400 -40 0.7 Time (in seconds) Time (in seconds) 400 -110 0.6 300 -60 300 -120 0.5 200 -130 200 -80 0.4 -140 100 100 0.3 -100 -150 -30 -20 -10 0 10 20 30 9.6 10 10.4 10.8 49.5 50 50.5 51 51.5 Time frame lag Frequency (in Hz) Frequency (in Hz) Video ENF signal Power ENF signal Normalized correlation ENF matching result demonstrating similar variations in the ENF signal extracted from video and from power signal recorded in India  Aliasing Challenge with video: temporal sampling rate lower than ENF  Our recent results from US, China, and India power grids  Exploit signal processing to harvest from aliasing  Highest correlation between power ENF and video ENF signal corresponds to the time at which recording took place DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 19. Tampering Detection ENF matching result demonstrating the detection of video tampering based on the ENF traces ENF signal from Video Frequency (in Hz) 10.3 10.2 10.1 Inserted 10 clip 160 320 480 640 800 960 Time (in seconds) Ground truth ENF signal Frequency (in Hz) 50.2 50.1 50 49.9 160 320 480 640 800 Time (in seconds) • Adding a clip between the original video leads to discontinuity in the ENF signal extracted from video • Clip insertion can also be detected by comparing the video ENF signal with the power ENF signal at corresponding time DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 20. Forensic Binding of Audio and Visual Tracks • ENFs in audio and video tracks captured at the same time have high correlation • Research questions ahead: (1) How to accurately estimate and match weak and noisy ENF? (2) Can ENF be removed? Tampered? (3) How to prevent anti- foreniscs on ENF? for public release; distribution is unlimited. DISTRIBUTION A: Approved ……
  • 21. AFOSR INFORMATION OPERATIONS & SECURITY 2011 PI MEETING 19-23 SEPTEMBER 2011 ALINGTON, VA High Performance Semantic Cloud Auditing Keesook J. Han, Ph.D Keesook.Han@rl.af.mil Develop High Performance Semantic Cloud Auditing Technologies and Applications that includes Comprehensive Cloud Auditing Data Capturing, Analysis and Rapid Response to Improve Cloud Quality of Services. Approved for Public Release; Distribution Unlimited: 88ABW-2011-4496, 16-Aug 2011 Approved for Public Release; Distribution is unlimited. DISTRIBUTION A: Approved for public release; distribution Unlimited: 88ABW-2011-4496, 16-Aug 2011 Keesook.Han@rl.af.mil INFORMATION INSTITUTE WORKSHOP on ASSURING THE CLOUD, 11 July 2011, GRIFISS Institute, Rome, NY POC: AFRL/RIGA Dr.
  • 22. Cloud Research Facilities University of Texas at Texas A&M University of San Antonio University South Carolina FlexFarm (Honeyfarm)&FlexCloud: Cisco Test Engineering Center Router Testbed: Center for Institute for Cyber Security Cisco Cloud Testing Lab Information Assurance Engineering SUNY University of Illinois at University of Texas at Binghamton University Urbana Champaign Dallas Coordinated Science Lab Assured UTD Secure Cloud Repository: GPGPU Cluster: Real-Time Assured Cloud Computing Center Hadoop File System Embedded Systems Lab Rochester University of Tennessee State Institute of Technology Pittsburgh University Center of Excellence in Information Networking, Security, and Systems Swanson Institute for Systems and Engineering Management Administration Labs Technical Excellence University of Missouri AFRL Georgia Institute of Kansas City RI Technology Networking & Multimedia GPGPU Cluster: Foundations of Data and Visual System Lab CONDOR Supercomputer Analytics Center UNCLASSIFIED Approved for Public Release; Distribution Unlimited: 88ABW-2011-4496, 16-Aug 2011 DISTRIBUTION A: Approved for public release; distribution is unlimited. Keesook.Han@rl.af.mil INFORMATION INSTITUTE WORKSHOP on ASSURING THE CLOUD, 11 July 2011, GRIFISS Institute, Rome, NY POC: AFRL/RIGA Dr.
  • 23. Conclusion  Semantic Cloud Auditing: Develop Efficient Information Theoretic Metadata and Aggregation: Fast Information Exploitation of Massive Cloud Auditing Data for Rapid Response  Semantic Cloud Auditing will benefit to the following projects: • Access Control: “Advanced Access Control for Assured Clouds” • Cloud Security: “Honeyfarm Data Capturing, Rapid Sharing and Exploitation of Malicious Traffic for Cloud Security” • Customized Hadoop: “Massive Cloud Auditing Using Data Mining on Hadoop” • Secure Hadoop: “Assured Information Storage and Sharing on Hadoop” • GPGPU Computing: “High Performance Processing of Cloud Auditing Data Using GPGPU Many-Core Parallelism” • SLA-based Cloud Service Workloads: “Dynamic Mapping of Cloud Resources to Meet Service Level Agreement (SLA)-based Cloud Service Workloads” • Traffic Control: “Router-Based Filtering and Rerouting to Traffic Control in Cloud Computing” • Outage Management: “Router-Initiated Network Outage Management for Multitenant Clouds” • File Transfer: “Bandwidth Intensive Multimedia Data Transfer for Smartphone-Friendly Cloud Services” Approved for Public Release; Distribution Unlimited: 88ABW-2011-4496, 16-Aug 2011 DISTRIBUTION A: Approved for public release; distribution is unlimited. Keesook.Han@rl.af.mil INFORMATION INSTITUTE WORKSHOP on ASSURING THE CLOUD, 11 July 2011, GRIFISS Institute, Rome, NY POC: AFRL/RIGA Dr.
  • 24. Detection of Covertly Embedded Hardware in Digital Systems Douglas H. Summerville Associate Professor Electrical and Computer Engineering State University of New York at Binghamton DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 25. Covertly Embedded Trojan • Malicious circuit embedded in “implementation space” of its host – Neither functional nor parametric • Trojan uses existing resources that are artifacts of the host’s implementation • No alteration of functional characteristics of host, therefore not testable • Can be combinational or sequential circuits DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 26. The Embedding • Covert Hardware alters the circuit’s behavior in the “don’t care” space • In effect, two circuits co-exist in the same physical hardware – The original circuit, only exercised during normal operation – The malicious circuit, exercised by special trigger DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 27. Motivating Assumption • Assume general case is unsolvable • In practice, standard design approaches generate a small fraction of possible implementations • We focus on securing few practical cases DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 28. Structural Circuit Analysis • Can’t look at circuit’s function, so look at its structure • Exploits how design approaches optimize for speed, area, power, etc. in deterministic ways – Contributing regularity to circuit structure • Identify structural characteristics of circuits that – Result from standard design approaches – Are removed or altered by tampering • Restrict optimization to solutions in that space – tradeoff DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 29. Detecting Hidden Communications Protocols R. R. Brooks Associate Professor Holcombe Department of Electrical and Computer Engineering Clemson University Clemson, SC 29634-0915 Tel. 864-656-0920 Fax. 864-656-1347 email: rrb@acm.org DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 30. Detection of Hidden Communications Protocols Richard Brooks: rrb@acm.org, Clemson University Objective Detect use of tunneled communications protocols and infer their current internal state • Private communications often tunneled through virtual private networks (VPNs) • Mix networks tunnel connections for anonymity • Tunneling tools (ex. ssh, ssl, TOR) have timing vulnerabilities • Hidden Markov models (HMM) and probabilistic grammars will detect protocol use, infer network flows, partially decipher content DoD Benefit: Technical Approach: • Detection of tunneled communications • Collect inter-packet timing information from tunneled sessions protocols • Zero-knowledge HMM model inference • In some cases (ex. interactive ssh), partially • Determination of HMM statistical significance • Tracking HMM transitions driven by network flow decipher message contents inter-packet timing data detects protocol use • Determination of communications patterns • Viterbi algorithm finds maximum likelihood Markov in mix networks, such as TOR state sequence • Two point-to-point connections with same Markov • Detection of timing side channel attack state sequences (Viterbi paths) are likely data vulnerabilities in DoD networks source and sink DISTRIBUTION A: Approved for public release; distribution is unlimited 30
  • 31. Active Defense: Reactively Adaptive Malware: Attacks & Defenses Kevin W. Hamlen & Latifur Khan University of Texas at Dallas AFOSR Contract FA9550-10-1-0088 September 2011 DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 32. Attacks Upon Signature-matchers • Randomize features during decryptor propagation – Polymorphism • encrypt payload with randomly chosen key – Oligomorphism • randomly re-assemble decryptor encrypted – Metamorphism payload • non-deterministically recompile decryptor and/or payload • Weakness: Undirected mutation DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 33. Reactively Adaptive MALware (RAMAL) • Three challenges: 1. Covertly harvest data about victim defenses (malware signature databases) 2. Mine harvested data effectively 3. Derive new mutation strategy from inferred model DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 34. Hardware, Languages, & Architectures for Defense Against Hostile Operating Systems (DHOSA) V. Adve, UIUC K.Asanović, UC Berkeley D.Evans, UVA S.King, UIUC G.Morrisett, Harvard R.Sekar, U Stony Brook D.Song, UC Berkeley D.Wagner (PI), UC Berkeley http://www.dhosa.org/ DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 35. The Approaches Advances that cut across traditional disciplines: • new OS and software architectures • new hardware architectures • new policy enforcement techniques • new techniques for trustworthiness • new coding techniques DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 36. Cryptographic SVA secure computation e.g., Enforce Binary translation properties and on a malicious OS Data-centric emulation security e.g., Enable complex Formal methods distributed systems, with resilience to TRANSFORMATION Secure browser hostile OS’s appliance Hardware support for isolation e.g., Prevent Secure servers data exfiltration Dealing with WEB-BASED malicious hardware ARCHITECTURES HARDWARE SYSTEM ARCHITECTURES DISTRIBUTION A: Approved for public release; distribution is unlimited 36
  • 37. Helix: A Self-Regenerative Architecture for the Incorruptible Enterprise MURI 2007 - 2012 John Knight University of Virginia AFOSR PI Meeting 9/21/2011 9/21/2011 Helix MURI Project -- 37
  • 38. Helix Team Members • University of Virginia – John C. Knight (PI) - Software engineering, dependability – Jack W. Davidson - Languages, security, virtual machine – David Evans - Security, applied cryptography – Westley Weimer - Program analysis – Anh Nguyen-Tuong - Security, grid computing • University of New Mexico – Stephanie Forrest - Biological inspired computing – Jared Saia - Computational & game theory • University of California at Davis – Hao Chen - Security, Web applications – Zhendong Su - Program analysis, software engineering – S. Felix Wu - System fault tolerance – Jeff Rowe - Operating systems – Karl Levitt - Security • University of California at Santa Barbara – Frederic Chong - Secure hardware, hardware acceleration for program/system analysis DISTRIBUTION A: Approved for public release; distribution is unlimited.
  • 39. Research Highlights • Security for mobile devices: • Automated repairs via – Static analysis genetic programming: framework for detecting – Demonstrated on information leaks assembly code (Android) – Proactive diversity/variant • Security for web generation applications: – Static analysis to detect • Hardware/architecture for access control security: vulnerabilities – Hardware description language (compiler • Security for applications: released) – Detection of unsafe – Provably leak-free component loading hardware See web site: http://helix.cs.virginia.edu 9/21/2011 DISTRIBUTION A: Approved for public release; distribution is unlimited.

Hinweis der Redaktion

  1. Program title might be obscure: it means I fund research related to cyber security
  2. Approached in ad-hoc manner:Build a science of security to break the attack-patch-attack cycle: how to build inherently secure systems-NO FORMAL DEFINATION OF SECURITY1: SOS-Science of Security: Formal Methods, Advanced theorem proving, Static analysis, Dynamic analysis, Symbolic evaluation and constraint solving, Code-level specification/verification, Hyperproperties2: Secure Humans: Trust in cyberspace, Suspicion in cyberspace3: Secure Networks: Information flow, Root of trust, Secure clouds4: Secure Hardware: Combinational logic, Hardware wrappers 5: Covert Channels: Steganography theory, Steganalysis theory, Dynamic analysis, Binary translation6. Execute on Insecure Systems: Artificial, dynamic diversity, Fully homomorphic encryption, Statistical models, error virtualization and rescue points, Automated Program Repair with Genetic Programming7: Secure Data: policy specification language, Novel logics abstractions for security policy compliance8: Secure Systems: Theory for incentive-compatibility, Security Policy,  Obfuscation
  3. Areas of ResearchFormal Methods Advanced theorem proving Static analysis Dynamic analysis Symbolic evaluation and constraint solving Secure Software Code-level specification/verification Obfuscation Artificial, dynamic diversity Fully homomorphic encryption Statistical models, error virtualization and rescue points Automated Program Repair with Genetic Programming Binary translationSecure Hardware Combinational logic Secure Data Theory for incentive-compatibility Security Policy Policy specification language Novel logics abstractions for security policy compliance Science of SecurityHyperproperties Information flows/covert channels Develop a Science of Cyber SecurityVulnerable to fewer attacks Measurable cyber securityHarder and more costly to attackSecures high priority missions through attackRecover rapidly &amp; automatically from zero day attacks
  4. What is SOS?
  5. Image compression fingerprints are forensically importantTrace image’s compression historyProvide evidence of processingDetermine an image’s originIdentify image forgeriesForensic Linkage to Acquisition DeviceNatural Fingerprint from Power Grid
  6. What other phenomena produce signatures in sensor data???
  7. AFOSR, AFRL, DHS, NSF, DOD, CISCO, HPC
  8. Nearly every practical circuit has input or state values that are not part of the system specificationUndefined input values (e.g. 13th month)Undefined state values“Slack” resources for optimizationCircuit’s behavior is not defined for these values to allow optimization
  9. The combined host and covert circuit represents a valid implementation of the host circuitOne of many functionally equivalent ways to build the circuitAnother way to look at it: at least one (typically many) implementations already contain the malicious circuit
  10. Investigate properties of the unused state or output space resulting from given design techniquesWhy unused?Find invariants of circuits generated by that techniqueNarrow these to find a property that isBroken by tamperingStructural analysis of circuits is a promising approach for detection of covert circuit tampering (circuit implementation tampering)Can be performed at any design level where equations can be extractedDoesn’t rely on clean design to compare againstAllows freedom to use latest COTS technologyCan be integrated easily into existing tool chains Is a static technique
  11. Transitions:2011 NSF Career Award: Language-based Polymorphic Malware Security2011 U.S. Army grant: Adaptive Malware Detection over Evolving Malware Streams
  12. Signature updates are an inadequate defensemanual signature generation too slownoncomprehensive update coverage
  13. Signature databases are (usually) confidentialundisclosed, proprietary formatsencryptedanti-piracy software protectionsBut classification decisions are publicpublic APIs (e.g., IOfficeAntivirus on Windows)works on McAfee, AVG, Windows Defender, Norton, …run anti-malware in a sandboxquery public malware detection servicesopen-source signature db’s (e.g., ClamAV
  14. 6. Execute on Insecure SystemsCan we defend applications from buggy and even malicious host operating systems?OS’s contain ~50M lines of code SEI estimates 1-7 errors/1Kloc: ~10K bugs?Month of Apple bugs: 23 security relevant bugs found Reality: must assume OS will be compromisedOur goal: Survive a malicious OS, perhaps with degraded functionality or availability.
  15. Exploratory research – many potential paths (some in competition, but mostly synergistic).