34 results on '"Pratyusa K. Manadhata"'
Search Results
2. Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers.
- Author
-
Amro Awad, Pratyusa K. Manadhata, Stuart Haber, Yan Solihin, and William G. Horne
- Published
- 2016
- Full Text
- View/download PDF
3. A novel algorithm for pattern matching with back references.
- Author
-
Liu Yang, Vinod Ganapathy, Pratyusa K. Manadhata, and Ye Wu
- Published
- 2015
- Full Text
- View/download PDF
4. Detecting Malicious Domains via Graph Inference.
- Author
-
Pratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, and William G. Horne
- Published
- 2014
- Full Text
- View/download PDF
5. Efficient Submatch Extraction for Practical Regular Expressions.
- Author
-
Stuart Haber, William G. Horne, Pratyusa K. Manadhata, Miranda Mowbray, and Prasad Rao
- Published
- 2013
- Full Text
- View/download PDF
6. Game Theoretic Approaches to Attack Surface Shifting.
- Author
-
Pratyusa K. Manadhata
- Published
- 2013
- Full Text
- View/download PDF
7. Fast submatch extraction using OBDDs.
- Author
-
Liu Yang, Pratyusa K. Manadhata, William G. Horne, Prasad Rao, and Vinod Ganapathy
- Published
- 2012
- Full Text
- View/download PDF
8. Authenticating a mobile device's location using voice signatures.
- Author
-
Jack Brassil, Ravi Netravali, Stuart Haber, Pratyusa K. Manadhata, and Prasad Rao
- Published
- 2012
- Full Text
- View/download PDF
9. Verifying the Location of a Mobile Device User.
- Author
-
Jack Brassil and Pratyusa K. Manadhata
- Published
- 2012
- Full Text
- View/download PDF
10. Text Classification for Data Loss Prevention.
- Author
-
Michael Hart, Pratyusa K. Manadhata, and Rob Johnson 0001
- Published
- 2011
- Full Text
- View/download PDF
11. A Formal Model for a System's Attack Surface.
- Author
-
Pratyusa K. Manadhata and Jeannette M. Wing
- Published
- 2011
- Full Text
- View/download PDF
12. Report: Measuring the Attack Surfaces of Enterprise Software.
- Author
-
Pratyusa K. Manadhata, Yücel Karabulut, and Jeannette M. Wing
- Published
- 2009
- Full Text
- View/download PDF
13. Measuring the attack surfaces of two FTP daemons.
- Author
-
Pratyusa K. Manadhata, Jeannette M. Wing, Mark Flynn, and Miles McQueen
- Published
- 2006
- Full Text
- View/download PDF
14. Machine Learning for Enterprise Security.
- Author
-
Pratyusa K. Manadhata
- Published
- 2015
- Full Text
- View/download PDF
15. Big data for security: challenges, opportunities, and examples.
- Author
-
Pratyusa K. Manadhata
- Published
- 2012
- Full Text
- View/download PDF
16. Silent Shredder
- Author
-
Yan Solihin, William G. Horne, Pratyusa K. Manadhata, Amro Awad, and Stuart Haber
- Subjects
Instructions per cycle ,Computer science ,Initialization ,02 engineering and technology ,computer.software_genre ,Encryption ,01 natural sciences ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,General Environmental Science ,010302 applied physics ,business.industry ,Reading (computer) ,Process (computing) ,020207 software engineering ,General Medicine ,Computer Graphics and Computer-Aided Design ,020202 computer hardware & architecture ,Phase-change memory ,Operating system ,General Earth and Planetary Sciences ,Cache ,business ,computer ,Software ,Dram - Abstract
As non-volatile memory (NVM) technologies are expected to replace DRAM in the near future, new challenges have emerged. For example, NVMs have slow and power-consuming writes, and limited write endurance. In addition, NVMs have a data remanence vulnerability, i.e., they retain data for a long time after being powered off. NVM encryption alleviates the vulnerability, but exacerbates the limited endurance by increasing the number of writes to memory. We observe that, in current systems, a large percentage of main memory writes result from data shredding in operating systems, a process of zeroing out physical pages before mapping them to new processes, in order to protect previous processes' data. In this paper, we propose Silent Shredder, which repurposes initialization vectors used in standard counter mode encryption to completely eliminate the data shredding writes. Silent Shredder also speeds up reading shredded cache lines, and hence reduces power consumption and improves overall performance. To evaluate our design, we run three PowerGraph applications and 26 multi-programmed workloads from the SPEC 2006 suite, on a gem5-based full system simulator. Silent Shredder eliminates an average of 48.6% of the writes in the initialization and graph construction phases. It speeds up main memory reads by 3.3 times, and improves the number of instructions per cycle (IPC) by 6.4% on average. Finally, we discuss several use cases, including virtual machines' data isolation and user-level large data initialization, where Silent Shredder can be used effectively at no extra cost.
- Published
- 2016
17. eyeDNS: Monitoring a University Campus Network
- Author
-
Matthew R. French, Eugene Y. Vassermann, Dalton A. Hahn, Chandan Chowdhury, Alexandru G. Bardas, and Pratyusa K. Manadhata
- Subjects
021110 strategic, defence & security studies ,Intranet ,Computer science ,Network packet ,business.industry ,Domain Name System ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,0211 other engineering and technologies ,020206 networking & telecommunications ,02 engineering and technology ,law.invention ,law ,Server ,Internet Protocol ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,business ,Computer network - Abstract
The Domain Name System (DNS) is responsible for mapping human readable domain names to internet protocol (IP) addresses. DNS is a ubiquitous part of internet and intranet communication, making it a convenient and comprehensive source for data to infer network health, performance, and security. A victim of its own success, monitoring real-time DNS traffic is a challenge due to sheer volume: huge amounts of DNS packets flow through a typical enterprise in a single day. In this paper, we describe eyeDNS, a scalable and extensible system for near real-time aggregation, storage, analysis, and visualization of DNS traffic collected by a hardware back-end. We report on eyeDNS's deployment and data collection on a large public university's network over a timeframe of 15 months. Moreover, we leveraged data from the following 6 months to validate findings made during the initial timeframe. With fast query response, aggregation, and visualization of DNS data, eyeDNS helped identify instances of anomalous network use, malware-specific behaviors, and scamming activities. eyeDNS is currently being used by the university's security personnel and has demonstrated its effectiveness in extracting trends and outliers from large volumes of DNS data collected from a diverse environment, where even commercial tools struggle to provide timely and actionable analysis.
- Published
- 2018
18. Traffic Signature-Based Mobile Device Location Authentication
- Author
-
Ravi Netravali, Jack Brassil, and Pratyusa K. Manadhata
- Subjects
Authentication ,Computer Networks and Communications ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mobile computing ,Signature (logic) ,Global Positioning System ,Femtocell ,Mobile telephony ,Electrical and Electronic Engineering ,business ,Mobile device ,Software ,Computer network - Abstract
Spontaneous and robust mobile device location authentication can be realized by supplementing existing 802.11x access points (AP) with small cells. We show that by transferring network traffic to a mobile computing device associated with a femtocell while remotely monitoring its ingress traffic activity, any internet-connected sender can verify the cooperating receiver’s location. We describe a prototype non-cryptographic location authentication system we constructed, and explain how to design both voice and data transmissions with distinct, discernible traffic signatures. Using both analytical modeling and empirical results from our implementation, we demonstrate that these signatures can be reliably detected even in the presence of heavy cross-traffic introduced by other femtocell users.
- Published
- 2014
19. The Operational Role of Security Information and Event Management Systems
- Author
-
Pratyusa K. Manadhata, Loai Zomlot, and Sandeep N. Bhatt
- Subjects
Forensic science ,Identification (information) ,Computer Networks and Communications ,Computer science ,Electrical and Electronic Engineering ,Computer security ,computer.software_genre ,Law ,Security information and event management ,computer ,Unit (housing) ,Security operations center - Abstract
An integral part of an enterprise computer security incident response team (CSIRT), the security operations center (SOC) is a centralized unit tasked with real-time monitoring and identification of security incidents. Security information and event management (SIEM) systems are an important tool used in SOCs; they collect security events from many diverse sources in enterprise networks, normalize the events to a common format, store the normalized events for forensic analysis, and correlate the events to identify malicious activities in real time. In this article, the authors discuss the critical role SIEM systems play SOCs, highlight the current operational challenges in effectively using SIEM systems, and describe future technical challenges that SIEM systems must overcome to remain relevant.
- Published
- 2014
20. Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks
- Author
-
Milind Tambe, Pratyusa K. Manadhata, Sara Mc Carthy, and Arunesh Sinha
- Subjects
Computer science ,Domain Name System ,Distributed computing ,Partially observable Markov decision process ,02 engineering and technology ,Network topology ,Domain (software engineering) ,020204 information systems ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,State (computer science) ,Abstraction (linguistics) - Abstract
We address the challenge of detecting and addressing advanced persistent threats APTs in a computer network, focusing in particular on the challenge of detecting data exfiltration over Domain Name System DNS queries, where existing detection sensors are imperfect and lead to noisy observations about the network's security state. Data exfiltration over DNS queries involves unauthorized transfer of sensitive data from an organization to a remote adversary through a DNS data tunnel to a malicious web domain. Given the noisy sensors, previous work has illustrated that standard approaches fail to satisfactorily rise to the challenge of detecting exfiltration attempts. Instead, we propose a decision-theoretic technique that sequentially plans to accumulate evidence under uncertainty while taking into account the cost of deploying such sensors. More specifically, we provide a fast scalable POMDP formulation to address the challenge, where the efficiency of the formulation is based on two key contributions: i we use a virtually distributed POMDP VD-POMDP formulation, motivated by previous work in distributed POMDPs with sparse interactions, where individual policies for different sub-POMDPs are planned separately but their sparse interactions are only resolved at execution time to determine the joint actions to perform; ii we allow for abstraction in planning for speedups, and then use a fast MILP to implement the abstraction while resolving any interactions. This allows us to determine optimal sensing strategies, leveraging information from many noisy detectors, and subject to constraints imposed by network topology, forwarding rules and performance costs on the frequency, scope and efficiency of sensing we can perform.
- Published
- 2016
21. A novel algorithm for pattern matching with back references
- Author
-
Pratyusa K. Manadhata, Liu Yang, Ye Wu, and Vinod Ganapathy
- Subjects
Finite-state machine ,Theoretical computer science ,Network packet ,Computer science ,Network security ,business.industry ,Deep packet inspection ,Intrusion detection system ,Pattern matching ,Regular expression ,Perl ,business ,computer ,Algorithm ,computer.programming_language - Abstract
Modern network security applications, such as network-based intrusion detection systems (NIDS) and firewalls, routinely employ deep packet inspection to identify malicious traffic. In deep packet inspection, the contents of network traffic are matched against patterns of malicious traffic to identify attack-carrying packets. The pattern matching algorithms employed for deep packet inspection must be fast, as the algorithms are often implemented on middle-boxes residing on high-speed gigabits per second links. The majority of patterns employed in network security applications are regular languages. However, regular language-based patterns have limited expressive power and are not capable of describing some complex features in network payload. Back reference is an important feature provided by many pattern matching tools, e.g., PCRE, the regular expression libraries of Java, Perl, and Python. Back references are used to identify repeated patterns in input strings. Patterns containing back-references are non-regular languages. Very little work has been done to improve the time-efficiency of back reference-based pattern matching. The de facto algorithm to implement back reference is recursive backtracking, but it is vulnerable to algorithmic complexity attacks. In this paper, we present a novel approach to implement back references. The basic idea of our approach is to transform a back reference problem to a conditional submatch problem, and represent it with a Non-deterministic Finite Automata (NFA)-like machine subject to some constraints. Our experimental results show that our approach resists known algorithmic complexity attacks, and is faster than PCRE by up to three orders of magnitude for certain types of patterns.
- Published
- 2015
22. An Attack Surface Metric
- Author
-
Pratyusa K. Manadhata and Jeannette M. Wing
- Subjects
Java ,Computer science ,Application software ,computer.software_genre ,Software development process ,Software ,Enterprise system ,Software sizing ,Software system ,Software verification and validation ,Software measurement ,Software design description ,Risk management ,computer.programming_language ,business.industry ,Software development ,Attack surface ,Software metric ,Software quality ,Software framework ,Software security assurance ,Software deployment ,Software construction ,Package development process ,Avionics software ,Backporting ,Software engineering ,business ,computer - Abstract
Measurement of software security is a long-standing challenge to the research community. At the same time, practical security metrics and measurements are essential for secure software development. Hence, the need for metrics is more pressing now due to a growing demand for secure software. In this paper, we propose using a software system's attack surface measurement as an indicator of the system's security. We formalize the notion of a system's attack surface and introduce an attack surface metric to measure the attack surface in a systematic manner. Our measurement method is agnostic to a software system's implementation language and is applicable to systems of all sizes; we demonstrate our method by measuring the attack surfaces of small desktop applications and large enterprise systems implemented in C and Java. We conducted three exploratory empirical studies to validate our method. Software developers can mitigate their software's security risk by measuring and reducing their software's attack surfaces. Our attack surface reduction approach complements the software industry's traditional code quality improvement approach for security risk mitigation and is useful in multiple phases of the software development lifecycle. Our collaboration with SAP demonstrates the use of our metric in the software development process.
- Published
- 2011
23. Big Data Analytics for Security
- Author
-
Alvaro A. Cardenas, Pratyusa K. Manadhata, and Sreeranga P. Rajan
- Subjects
Network forensics ,Cloud computing security ,Computer Networks and Communications ,business.industry ,Computer science ,Big data ,Digital forensics ,Information security ,Network monitoring ,Intrusion detection system ,Computer security ,computer.software_genre ,Asset (computer security) ,Security information and event management ,Forensic science ,Security service ,Software security assurance ,Network Access Control ,Security through obscurity ,Electrical and Electronic Engineering ,business ,Law ,computer ,Vulnerability (computing) - Abstract
Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate and contain sophisticated attackers.
- Published
- 2013
24. Detecting Malicious Domains via Graph Inference
- Author
-
Prasad Rao, Pratyusa K. Manadhata, William G. Horne, and Sandeep Yadav
- Subjects
Ground truth ,business.industry ,Computer science ,Big data ,Enterprise information security architecture ,Terabyte ,Machine learning ,computer.software_genre ,Belief propagation ,Graph inference ,Malware ,Graph (abstract data type) ,Artificial intelligence ,Data mining ,business ,computer - Abstract
Enterprises routinely collect terabytes of security relevant data, e.g., network logs and application logs, for several reasons such as cheaper storage, forensic analysis, and regulatory compliance. Analyzing these big data sets to identify actionable security information and hence to improve enterprise security, however, is a relatively unexplored area. In this paper, we introduce a system to detect malicious domains accessed by an enterprise’s hosts from the enterprise’s HTTP proxy logs. Specifically, we model the detection problem as a graph inference problemwe construct a host-domain graph from proxy logs, seed the graph with minimal ground truth information, and then use belief propagation to estimate the marginal probability of a domain being malicious. Our experiments on data collected at a global enterprise show that our approach scales well, achieves high detection rates with low false positive rates, and identifies previously unknown malicious domains when compared with state-of-the-art systems. Since malware infections inside an enterprise spread primarily via malware domain accesses, our approach can be used to detect and prevent malware infections.
- Published
- 2014
25. Fast submatch extraction using OBDDs
- Author
-
Prasad Rao, William G. Horne, Pratyusa K. Manadhata, Liu Yang, and Vinod Ganapathy
- Subjects
Theoretical computer science ,Finite-state machine ,Computer science ,Backtracking ,Binary decision diagram ,String searching algorithm ,Intrusion detection system ,Regular expression ,Pattern matching ,Security information and event management - Abstract
Network-based intrusion detection systems (NIDS) commonly use pattern languages to identify packets of interest. Similarly, security information and event management (SIEM) systems rely on pattern languages for real-time analysis of security alerts and event logs. Both NIDS and SIEM systems use pattern languages extended from regular expressions. One such extension, the submatch construct, allows the extraction of substrings from a string matching a pattern. Existing solutions for submatch extraction are based on non-deterministic finite automata (NFAs) or recursive backtracking. NFA-based algorithms are time-inefficient. Recursive backtracking algorithms perform poorly on pathological inputs generated by algorithmic complexity attacks. We propose a new approach for submatch extraction that uses ordered binary decision diagrams (OBDDs) to represent and operate pattern matching. Our evaluation using patterns from the Snort HTTP rule set and a commercial SIEM system shows that our approach achieves its ideal performance when patterns are combined. In the best case, our approach is faster than RE2 and PCRE by one to two orders of magnitude.
- Published
- 2012
26. Big data for security
- Author
-
Pratyusa K. Manadhata
- Subjects
Identification (information) ,Data collection ,Analytics ,business.industry ,Computer science ,Big data ,Enterprise private network ,Enterprise information security architecture ,Enterprise information system ,business ,Enterprise data management ,Data science - Abstract
This is the age of big data. Enterprises collect large amounts of data about their operations and analyze the data to improve all aspects of their businesses. Big data for security, i.e., the analysis of very large enterprise data sets to identify actionable security information and hence to improve enterprise security, however, is a relatively unexplored area. Enterprises routinely collect terabytes of security relevant data, e.g., network logs and application logs, for several reasons such as availability of cheap storage and need for regulatory compliance and post hoc forensic analysis. But we face a situation where more is less; the more data we collect, the less is our ability to derive actionable information from the data. Our research group is trying to move toward a scenario where more is more; we aim to design and implement algorithms and systems to identify security relevant information from large enterprise datasets. The more data we collect, the more value we derive from the data. Our approach opens up new opportunities by combining data from multiple sources in an enterprise and from multiple enterprises. We, however, face many challenges, e.g., legal, privacy, and technical issues regarding scalable data collection and storage and scalable analytics platforms for security. Our group is currently focusing on several big data problems. In this talk, we will briefly describe the problems and then focus on one example - scalable and reliable identification of infected hosts in an enterprise network and of malicious domains visited by the enterprise's hosts. We model the identification problem as an inference problem over very large graphs derived from enterprise datasets. We will describe our experience of applying the inference approach to datasets collected from multiple enterprises worldwide.
- Published
- 2012
27. Authenticating a mobile device's location using voice signatures
- Author
-
Stuart Haber, Jack Brassil, Pratyusa K. Manadhata, Ravi Netravali, and Prasad Rao
- Subjects
Authentication ,business.product_category ,business.industry ,Computer science ,Computer security ,computer.software_genre ,Wireless access point ,Server ,Global Positioning System ,Femtocell ,Message authentication code ,Mobile telephony ,business ,Mobile device ,computer ,Computer network - Abstract
Providers of location-based services seek new methods to authenticate the location of their clients. We propose a novel infrastructure-based solution that provides spontaneous and transaction-oriented mobile device location authentication via an integrated 802.11× wireless access point and 3G femtocell access system. By simply making a voice call while remotely monitoring femtocell activity, a calling party can verify a (co-operating) called party's location even when the participants have no pre-existing relationship. We show how such a traffic signature can be reliably detected even in the presence of heavy cross-traffic introduced by other femtocell users. We describe how the verification proceeds without revealing details of the authentication - or even the parties involved - to the location provider.
- Published
- 2012
28. Game Theoretic Approaches to Attack Surface Shifting
- Author
-
Pratyusa K. Manadhata
- Subjects
Reduction (complexity) ,Set (abstract data type) ,Wing ,business.industry ,Computer science ,Distributed computing ,Metric (mathematics) ,Stochastic game ,Software system ,Artificial intelligence ,Attack surface ,business ,Subgame perfect equilibrium - Abstract
A software system’s attack surface is the set of ways in which the system can be attacked. In our prior work, we introduced an attack surface measurement and reduction method to mitigate a software system’s security risk (Manadhata, An attack surface metric, Ph.D. thesis, Carnegie Mellon University, 2008; Manadhata and Wing, IEEE Trans. Softw. Eng. 37:371–386, 2011). In this paper, we explore the use of attack surface shifting in the moving target defense approach. We formalize the notion of shifting the attack surface and introduce a method to quantify the shift. We cast the moving target defense approach as a security-usability trade-off and introduce a two-player stochastic game model to determine an optimal moving target defense strategy. A system’s defender can use our game theoretic approach to optimally shift and reduce the system’s attack surface.
- Published
- 2012
29. Securing a femtocell-based location service
- Author
-
Pratyusa K. Manadhata and Jack Brassil
- Subjects
Authentication ,Spoofing attack ,Positioning system ,business.industry ,Computer science ,Hybrid positioning system ,Denial-of-service attack ,Computer security ,computer.software_genre ,Location-based service ,Femtocell ,business ,computer ,Mobile device ,Computer network - Abstract
Mobile device users are increasingly incented to falsify their locations to retain location privacy while capturing economic benefits such as location-based retail discounts. Location spoofing is easily achieved with several widely-used location services that rely on smartphone applications to convey GPS coordinates, IP addresses, or WiFi Positioning System radio environment data. In earlier work we introduced a network infrastructure-based system that provides spontaneous, rapid, and robust mobile device location authentication by supplementing existing 802.11x APs with off-the-shelf femtocells. The proposed system has the property of leveraging mobile operator infrastructure, without requiring operator participation in either providing or authenticating location. In this paper we present a security analysis of the location authentication system. We assess its resistance to DoS attacks, identify various approaches for a mobile user to deceive a location verifier with and without the assistance of a colluder, and explore the tradeoffs between cost and complexity in mounting such attacks. Finally, we identify a collection of system modifications and countermeasures to anticipated attacks designed to decrease location authentication system vulnerabilities and increase privacy protection.
- Published
- 2012
30. Text Classification for Data Loss Prevention
- Author
-
Rob Johnson, Michael Hart, and Pratyusa K. Manadhata
- Subjects
False discovery rate ,Support vector machine ,Statistical classification ,Computer science ,Hash function ,False positive rate ,False alarm ,Data loss ,Computer security ,computer.software_genre ,computer ,Classifier (UML) - Abstract
Businesses, governments, and individuals leak confidential information, both accidentally and maliciously, at tremendous cost in money, privacy, national security, and reputation. Several security software vendors now offer "data loss prevention" (DLP) solutions that use simple algorithms, such as keyword lists and hashing, which are too coarse to capture the features what makes sensitive documents secret. In this paper, we present automatic text classification algorithms for classifying enterprise documents as either sensitive or non-sensitive. We also introduce a novel training strategy, supplement and adjust, to create a classifier that has a low false discovery rate, even when presented with documents unrelated to the enterprise. We evaluated our algorithm on several corpora that we assembled from confidential documents published on WikiLeaks and other archives. Our classifier had a false negative rate of less than 3.0% and a false discovery rate of less than 1.0% on all our tests (i.e, in a real deployment, the classifier can identify more than 97% of information leaks while raising at most 1 false alarm every 100th time).
- Published
- 2011
31. Report: Measuring the Attack Surfaces of Enterprise Software
- Author
-
Yuecel Karabulut, Pratyusa K. Manadhata, and Jeannette M. Wing
- Subjects
Database ,business.industry ,Computer science ,Software development ,Attack surface ,computer.software_genre ,Software quality ,Software security assurance ,Software sizing ,Software construction ,Backporting ,Software verification and validation ,business ,Software engineering ,computer - Abstract
Software vendors are increasingly concerned about mitigating the security risk of their software. Code quality improvement is a traditional approach to mitigate security risk; measuring and reducing the attack surface of software is a complementary approach. In this paper, we apply a method for measuring attack surfaces to enterprise software written in Java . We implement a tool as an Eclipse plugin to measure an SAP software system's attack surface in an automated manner. We demonstrate the feasibility of our approach by measuring the attack surfaces of three versions of an SAP software system. We envision our measurement method and tool to be useful to software developers for improving software security and quality.
- Published
- 2009
32. An Approach to Measuring a System's Attack Surface
- Author
-
Roy A. Maxion, Jeannette M. Wing, Pratyusa K. Manadhata, and Kymie M. C. Tan
- Subjects
Computer science ,business.industry ,Attack surface ,Computer security ,computer.software_genre ,Software metric ,Software development process ,Software ,Software security assurance ,Server ,Metric (mathematics) ,Software system ,business ,computer - Abstract
Practical software security measurements and metrics are critical to the improvement of software security. We propose a metric to determine whether one software system is more secure than another similar system with respect to their attack surface. We use a system's attack surface measurement as an indicator of the system's security; the larger the attack surface, the more insecure the system. We measure a system's attack surface in terms of three kinds of resources used in attacks on the system: methods, channels, and data. We demonstrate the use of our attack surface metric by measuring the attack surfaces of two open source IMAP servers and two FTP daemons. We validated the attack surface metric by conducting an expert user survey and by performing statistical analysis of Microsoft Security Bulletins. Our metric can be used as a tool by software developers in the software development process and by software consumers in their decision making process.
- Published
- 2007
33. Results of SEI Independent Research and Development Projects FY 2006
- Author
-
Alberts, Christopher J., Anderson, William B., Bass, Len, Bass, Matthew, Boxer, Philip, Brownsword, Lisa, Chaki, Sagar, Feiler, Peter H., Fisher, David, Forrester, Eileen C., Garcia-Miller, Suzanne, Greenhouse, Aaron, Jorgen Hansson, Herbsleb, James, Ivers, James, Lee, Peter, Linger, Richard C., Longstaff, Thomas A., Pratyusa K. Manadhata, B. Craig Meyers, D. Michael Phillips, Sledge, Carol A., Smith, James, Wallnau, Kurt C., Walton, Gwendolyn H., Wing, Jeannette, and Zeilberger, Noam
- Subjects
FOS: Computer and information sciences ,80309 Software Engineering - Abstract
Each year, the Software Engineering Institute (SEI) undertakes several independent research and development (IRAD) projects. These projects serve to (1) support feasibility studies investigating whether further work by the SEI would be of potential benefit and (2) support further exploratory work to determine whether there is sufficient value in eventually funding the feasibility study work as an SEI initiative. Projects are chosen based on their potential to mature and/or transition software engineering practices, develop information that will help in deciding whether further work is worth funding, and set new directions for SEI work. This report describes the IRAD projects that were conducted during fiscal year 2006 (October 2005 through September 2006).
- Published
- 2007
- Full Text
- View/download PDF
34. Measuring a System's Attack Surface
- Author
-
Jeannette M. Wing and Pratyusa K. Manadhata
- Subjects
Timing attack ,Attack model ,Length extension attack ,Pre-play attack ,Computer science ,Application layer DDoS attack ,Attack surface ,Reflection attack ,Computer security ,computer.software_genre ,Ciphertext-only attack ,computer - Abstract
We propose a metric to determine whether one version of a system is relatively more secure thananother with respect to the system’s attack surface. Intuitively, the more exposed the attack surface,the more likely the system could be successfully attacked, and hence the more insecure it is. Wedefine an attack surface in terms of the system’s actions that are externally visible to its usersand the system’s resources that each action accesses or modifies. To apply our metric in practice,rather than consider all possible system resources, we narrow our focus on a “relevant” subset ofresource types, which we call attack classes; these reflect the types of system resources that aremore likely to be targets of attack. We assign payoffs to attack classes to represent likelihoods ofattack; resources in an attack class with a high payoff value are more likely to be targets or enablersof an attack than resources in an attack class with a low payoff value. We outline a method toidentify attack classes and to measure a system’s attack surface. We demonstrate and validate ourmethod by measuring the relative attack surface of four different versions of the Linux operatingsystem.Keywords: Security metrics, attack, attack class, attack surface, threat modeling
- Published
- 2004
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.