Computer Sciences Dept.

Computer Security and Cryptography Reading Group
June 2004 List

Date &
Location
Reading
Wednesday, June 2, 2004
5331 CS 11:30 AM - 12:30 PM
N. Weaver, S. Staniford, V. Paxson
ICSI / Nevis Networks / ICSI & LBNL
Very Fast Containment of Scanning Worms
Published in USENIX Security'04

URL: http://www.icsi.berkeley.edu/~nweaver/containment/

Computer worms -- malicious, self-propagating programs -- represent a significant threat to large networks. One possible defense, containment, seeks to limit a worm's spread by isolating it in a small subsection of the network. In this work we develop containment algorithms suitable for deployment in high-speed, low-cost network hardware. We show that these techniques can stop a scanning host after fewer than 10 scans with a very low false-positive rate. We also augment this approach by devising mechanisms for cooperation that enable multiple containment devices to more effectively detect and respond to an emerging infection. Finally, we discuss ways that a worm can attempt to bypass containment techniques in general, and ours in particular.

Wednesday, June 9, 2004
5331 CS 11:30 AM - 12:30 PM
J. Ligatti, L. Bauer, D. Walker
Princeton
Edit Automata: Enforcement Mechanisms for Run-time Security Policies
Submitted for publication

URL: http://www.ece.cmu.edu/~lbauer/papers/editauto.pdf

We analyze the space of security policies that can be enforced by monitoring and modifying programs at run time. Our program monitors, called edit automata, are abstract machines that examine the sequence of application program actions and transform the sequence when it deviates from a specified policy. Edit automata have a rich set of transformational powers: They may terminate the application, thereby truncating the program action stream; they may suppress undesired or dangerous actions without necessarily terminating the program; and they may also insert additional actions into the event stream.

After providing a formal definition of edit automata, we develop a rigorous framework for reasoning about them and their cousins: truncation automata (which can only terminate applications), suppression automata (which can terminate applications and suppress individual actions), and insertion automata (which can terminate and insert). We give a set-theoretic characterization of the policies each sort of automaton can enforce and we provide examples of policies that can be enforced by one sort of automaton but not another.

Wednesday, June 16, 2004
5331 CS 11:30 AM - 12:30 PM
F. B. Schneider
Cornell
Enforceable Security Policies
Published in TISSEC, February 2000

URL: http://doi.acm.org/10.1145/353323.353382

A precise characterization is given for the class of security policies enforceable with mechanisms that work by monitoring system execution, and automata are introduced for specifying exactly that class of security policies. Techniques to enforce security policies specified by such automata are also discussed.

Wednesday, June 23, 2004
5331 CS 11:30 AM - 12:30 PM
D. Szajda, B. Lawson, J. Owen
Richmod U., VA
Hardening functions for large-scale distributed computations
Published in Oakland'03

URL: http://oncampus.richmond.edu/~dszajda/research/papers/sp03_szajda_d.pdf

The past few years have seen the development of distributed computing platforms designed to utilize the spare processor cycles of a large number of personal computers attached to the Internet in an effort to generate levels of computing power normally achieved only with expensive supercomputers. Such large scale distributed computations running in untrusted environments raise a number of security concerns, including the potential for intentional or unintentional corruption of computations, and for participants to claim credit for computing that has not been completed. This paper presents two strategies for hardening selected applications that utilize such distributed computations. Specifically, we show that carefully seeding certain tasks with precomputed data can significantly increase resistance to cheating (claiming credit for work not computed) and incorrect results. Similar results are obtained for sequential tasks through a strategy of sharing the computation of N tasks among K>N nodes. In each case, the associated cost is significantly less than the cost of assigning tasks redundantly.

Wednesday, June 30, 2004
5331 CS 11:30 AM - 12:30 PM
P. Golle, I. Mironov
Stanford
Uncheatable Distributed Computations
RSA Conference 2001, Cryptographer's track

URL: http://crypto.stanford.edu/~pgolle/papers/distr.html

Computationally expensive tasks that can be parallelized are most efficiently completed by distributing the computation among a large number of processors. The growth of the Internet has made it possible to invite the participation of just about any computer in such distributed computations. This introduces the potential for cheating by untrusted participants. In a commercial setting where participants get paid for their contribution, there is incentive for dishonest participants to claim credit for work they have not done. In this paper, we propose security schemes that defend against this threat with very little overhead. Our weaker scheme discourages cheating by ensuring that it does not pay off, while our stronger schemes let participants prove that they have done (almost) all the work they were assigned with high probability.


< Back to the Sec & Crypto reading group page
Created and maintained by Mihai Christodorescu (http://www.cs.wisc.edu/~mihai)
Created: Wed Aug 13 10:30:10 CDT 2003
Last modified: Fri Jul 02 10:08:55 2004
 
Computer Science | UW Home