Information Systems and Internet Security (ISIS) Lab Some Recent
Download
Report
Transcript Information Systems and Internet Security (ISIS) Lab Some Recent
Information Systems and Internet Security (ISIS) Lab
Research overview and some recent projects
Nasir Memon
Polytechnic Institute of NYU
ISIS - Highlights
8 faculty members in program
More than a dozen Ph.D. students
More than a dozen specialized courses in security
More than over $10 million in funding over the last 3 years
Host of NSA/NSF Cyber Corps Program (SFS)
Cyber Corps Group - 2006
NSA Center of Excellence in IA Education, NSA Center of Excellence in IA research
One of the premier cyber security programs in US
ISIS - Research Areas
Hardware for Secure Systems
Trusted hardware, hardware obfuscation, Gigabit IDS/IPS, DDoS defense.
Multimedia Security
Image forensics, digital watermarking, steganography and steganalysis
Software Security
Static analysis, software obfuscation
Host Security
Disk forensics, secure virtualization
Network Security
Infection detection, Ad-hoc networks, network forensics.
Cyber Corps Group - 2005
Secure Device Pairing
Faculty: NiteshSaxena; Funded by NSF
Out-Of-Band (OOB): Audio,
Visual or Tactile
Fundamental SecuritySolution
Objective:
How to bootstrap secure
Examples:
Idea:
communication between Alice’s and Bob’s devices when
make
use of
a physical
channel
between
devices
Pairing
a bluetooth
cell
phone
with
a
headset
they have
with
least
involvement
froman
Alice
and point
Bob
Pairing
a WiFi
with
access
nolaptop
prior context
no common trusted CA or TTP
Research Challenges
OOB channels are low-bandwidth
Devices may be constrained in terms of interfaces, e.g.,
access points, headsets
implanted wireless devices
User is constrained - Usability
Multiple devices
Sensor network initialization
Group formation
Ohh! I cannot
even pair my
socks!
Other Ongoing Projects
RFID Security and Privacy
Mobile Phone Assisted Usable Password Authentication
Fault-Tolerant User-Centric Security Services (with Yevgeniy Dodis)
Privacy of Web Search
Inference of Private Attributes on Facebook (with Keith Ross)
More info: http://cis.poly.edu/~nsaxena/research.html
Media Forensics
Many aspects to the problem
Media
Forensics
Media Source
Identification
Identification of
Synthetic media
SourceModel
Identification
CameraModel
ScannerModel
Individual
Source
Identification
Media Forgery
Detection
Camera
Scanner
Contributions
Developed novel techniques to collect, attribute and authenticate
image (video) evidence.
Funded by NSA, NIJ, AFOSR
Lens
CFA
Filters
Detector
Processing
Color Interpolation
Gamma Correction
White Point Correction
Color Conversion
Compression
Camera Imaging
Pipeline
Trusted and Secure Hardware (towards building hardware root of
trust)
RameshKarri ([email protected]) ECE Department
Ph. D. students
A. Kanuparthi and R. Guo: Trusted Platform Modules
J. Rajendran: Hardware Trojans
J. Li: Circuit Obfuscation
K. Rosenfeld: Secure Testing
J. Quan: Hardware Sidechannels
Supported by: Air Force Research Labs, NSF, Army, Cisco Systems
Embedded Devices – Trust?
Approach – Trusted Platform Modules (TPM)
Crypto Processor
Non-volatile memory
Endorsement key
RNG
Storage root key
RSA key gen.
SHA-1
Signature engine
Volatile memory
PCRs
Attestation keys
Storage keys
Supports: Remote attestation, data sealing, and binding
Remote Attestation Proving to you (the challenger) that I (the
attester)
run legitimate programs
TPM: ongoing research
High performance vs Low cost vs Low Power vs Application Specific
Prototypes successfully tested on different application scenarios
Redesign smart grid elements (smart meters, grid sensor platforms and
grid control elements)
Deployment in pilot studies will uncover practical kinks…
[email protected]