Integrity Through Mediated Interfaces PI Meeting August 19, 2002 Bob Balzer, Marcelo Tallis Legend: Turquoise Changes from.

Slides:



Advertisements
Similar presentations
Our Corporate Mission Quality Systems Management, Inc. (QSMI)
Advertisements

Semantically Grounded Briefings Bob Balzer, Neil Goldman, Marcelo Tallis Teknowledge
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Success status, page 1 Collaborative learning for security and repair in application communities MIT & Determina AC PI meeting July 10, 2007 Milestones.
S E C U R E C O M P U T I N G Intrusion Tolerant Server Infrastructure Dick O’Brien, Tammy Kappel, Clint Bitzer OASIS PI Meeting March 14, 2002.
Test Organization and Management
1 Engineering a Distributed Intrusion Tolerant Database System Using COTS Components Peng Liu University of Maryland Baltimore County Feb 2001.
Integrity Through Mediated Interfaces PI Meeting: Feb 22-23, 2000 Bob Balzer Information Sciences Institute Legend: Changes from previous.
Security Overview for Microsoft Infrastructures Fred Baumhardt and James Noyce Infrastructure Solutions and Security Solutions Teams Microsoft Security.
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
CSI-E Computer Security Investigator – Enterprise.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Enterprise Wrappers OASIS PI Meeting July 24, 2001 Bob Balzer Neil
Figures – Chapter 14. Figure 14.1 System layers where security may be compromised.
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
RST Labs Effectively Constraining Active Scripting on the Win32 Platform Anup K. Ghosh Reliable Software Technologies
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Class 5 Architecture-Based Self-Healing Systems David Garlan Carnegie Mellon University.
Architecture and Design of Customer Support System using Microsoft.NET technologies Nikolay Pavlov Asen Rahnev.
Testing, Monitoring, and Control of Internet Services Aditya P. Mathur Purdue University Friday, April 15, Washington State University, Pullman,
1 IA&S IA&S Roadmap and ITS Direction Dr. Jay Lala ITS Program Manager 23 February, 2000.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 2 Securing Network Server and User Workstations.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
S E C U R E C O M P U T I N G Not For Public Release 1 Intrusion Tolerant Server Infrastructure Dick O’Brien OASIS PI Meeting July 25, 2001.
Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Legend: Turquoise Changes from July99.
Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute
You are Here! Navigating SharePoint 1. Sharon Weaver 15 years designing, developing, and managing software 10 years SharePoint experience Six Sigma Black.
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
Information Security: Model, Process and Outputs Presentation to PRIA WG November 10, 2006.
Integrity Through Mediated Interfaces PI Meeting: July 19-21, 2000 Bob Balzer Teknowledge Legend: Turquoise Changes from July 99.
Enterprise Wrappers OASIS PI Meeting August 19, 2002 Bob Balzer Neil Legend: Green Changes from February 02 PI meeting.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Integrity Through Mediated Interfaces PI Meeting July 24, 2001 Bob Balzer, Marcelo Tallis Legend: Turquoise Changes from July99.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Virtualized Execution Realizing Network Infrastructures Enhancing Reliability Application Communities PI Meeting Arlington, VA July 10, 2007.
T Project Review RoadMappers I2 Iteration
Enterprise Wrappers OASIS PI Meeting March 12, 2002 Bob Balzer Neil Goldman Mahindra
Enterprise Wrappers OASIS PI Meeting Feb. 15, 2001 Mark Feldman Lee ftp://ftp.tislabs.com/pub/wrappers.
Detecting & Preventing Misuse of Privilege PI Meeting 1/27/05 Bob Balzer (Teknowledge) Howie Shrobe (MIT) Updates since Kickoff.
CounterMeasures™ Risk Analysis and Management May 2005.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
BI Performance Management. Business Issues Too much information: Create confusions Multiple version of Truth: Lack of Trusted information: Incomplete,
1 ECM APPLICATIONS AND SOLUTIONS - PART 1 MODULE 8 ECM SPECIALIST COURSE 1 Copyright AIIM.
Enterprise Enterprise Wrappers for Information Assurance DARPA/SPAWAR Contract N66001-C-8023 Mark Feldman, Wayne Salamon, Steve Kiernan, John Axisa NAI.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Architecture Review 10/11/2004
SQL Server PowerPivot for IT Pros
InGenius Connector Enterprise Microsoft Dynamics CRM
Secure Software Confidentiality Integrity Data Security Authentication
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Security Engineering.
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Mark Feldman, Lee Badger, Steve Kiernan, Larry Spector,
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Intel Active Management Technology
Objectives. Objectives Objectives Content Configure Microsoft Azure monitor.
Presentation transcript:

Integrity Through Mediated Interfaces PI Meeting August 19, 2002 Bob Balzer, Marcelo Tallis Legend: Turquoise Changes from Feb. 02 PI meeting

Technical Objectives Wrap Data with Integrity Marks –Insure its Integrity –Record its processing history –Reconstruct it from this history if it is corrupted by program bugs by malicious attacks Demo these capabilities on major COTS product –Microsoft Office Suite (PowerPoint & Word only) –Also demo on a mission critical military system PowerPoint and Word

Wrap Program –Detect access of integrity marked data & decode it M M M M MediationCocoon Environment = Operating System External Programs Program Change Monitor –Monitor User Interface to detect change actions Translate GUI actions into application specific modifications Technical Approach –Detect update of integrity marked data Re-encode & re-integrity mark the updated data Repair any subsequent Corruption from History Build on existing research infrastructure

MS Word Data Integrity Technical Approach To Attribution Time Lever shows document development –User selects range of interest –Move Forwards through Operations Log –Move Backwards through Undo Stack Operations Log

Completed (except for integration of generic mechanisms from PowerPoint Data Integrity) GUI Monitor tied to change history Data Integrity Current Status MS Word Data Integrity –Completed MS PowerPoint Data Integrity –Generic Data Integrity Architecture Shape creation/deletion Shape move/resize/recolor/rotate Connector attachment/detachment Group/ungroup Problems (requiring unique development) –Single Process Debug/Demo Architecture –Typed Text (different low-level implementation) –Dangling Connectors (incomplete COM model) DemoDemo

Data Integrity Future Plans Complete Coverage of PowerPoint Operations Integrate generic mechanisms from PowerPoint Integrity Manager back into Word Deploy Word and PowerPoint Integrity Managers

Safe Attachments M M M M Wrapper Safety Rules k Attachment Handler Spawn Wrapper encapsulates each spawned process Safe Attachments M M M M Wrapper Safety Rules j Attachment Handler Each opened attachment spawns new process Spawn Safe Attachments M M M M Wrapper Safety Rules i Attachment Client Safe Attachments Deployment Bundled with ADF as OPX Hardened Client MARFORPAC Usability Test 2/02 FBE-Juliet Red Team Experiment 8/02

Deployment/Red-Team Results MARFORPAC Usability Test (2/02) –No field usage problems (no attacks) –Assessed as unmaintainable Not configurable by Marine Sysadmins Alerts not understandable by Marine personnel Hardened Client II Red-Team Experiment (5/02) –Test new ByPass Protection mechanism All attacks on or to disable ByPass Protector failed Attack on unprotected wrapper data succeeded –This vulnerability disclosed to Red-Team prior to experiment FBE-Juliet Red-Team Experiment (8/02) –Test Safe against malicious attachments All attacks on Safe failed –Safe field portable to OfficeXP  New rule system & GUI  Autonomic responses Response Demo

Safe Plans Integration with Enterprise Wrappers –Offboard Policy Manager –Offboard Alert Dissemination –Dynamic Policies Pilot Deployments –Within Military and Federal Government Development of Contained Execution Compartments –No persistent effects from opening attachments –Only new document versions from editors Integration with autonomic attack detector (SBIR) Hardening & Independent Assessment (OPX) Broader Coverage (all user processes) (OPX)