14
Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Embed Size (px)

Citation preview

Page 1: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Information Systems and Internet Security (ISIS) Lab

Research overview and some recent projects

Nasir MemonPolytechnic Institute of NYU

Page 2: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

ISIS - Highlights

8 faculty members in program More than a dozen Ph.D. students

More than a dozen specialized courses in security

More than over $10 million in funding over the last 3 years

Host of NSA/NSF Cyber Corps Program (SFS) NSA Center of Excellence in IA Education, NSA Center of Excellence in IA research

One of the premier cyber security programs in US

Cyber Corps Group - 2006

Page 3: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

ISIS - Research AreasH

ardware for Secure Systems Trusted hardware, hardware obfuscation, Gigabit IDS/IPS, DDoS defense.

Multimedia Security Image forensics, digital watermarking, steganography and steganalysis

Software Security Static analysis, software obfuscation

Host Security Disk forensics, secure virtualization

Network Security Infection detection, Ad-hoc networks, network forensics.

Cyber Corps Group - 2005

Page 4: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Secure Device Pairing

Fundamental Security Objective: How to bootstrap secure communication between Alice’s and Bob’s

devices when they have no prior context

no common trusted CA or TTP

Examples:

Pairing a bluetooth cell phone with a headset

Pairing a WiFi laptop with an access point

Solution Idea:make use of a physical channel between devices

with least involvement from Alice and Bob

Out-Of-Band (OOB): Audio, Visual or Tactile

Faculty: NiteshSaxena; Funded by NSF

Page 5: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Research Challenges

OOB channels are low-bandwidth

Devices may be constrained in terms of interfaces, e.g., access points, headsets

implanted wireless devices

User is constrained - Usability

Multiple devices Sensor network initialization

Group formation

Ohh! I cannot even pair my

socks!

Page 6: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Other Ongoing Projects

RFID Security and Privacy

Mobile Phone Assisted Usable Password Authentication

Fault-Tolerant User-Centric Security Services (with Yevgeniy Dodis)

Privacy of Web Search

Inference of Private Attributes on Facebook (with Keith Ross)

More info: http://cis.poly.edu/~nsaxena/research.html

Page 7: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Media Forensics

Page 8: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Media Forgery Detection

Many aspects to the problem

Scanner-Model

Media Forensics

Identification of Synthetic media

Media Source Identification

Camera-Model

Source-Model

Identification

Individual Source

Identification

Scanner

Camera

Page 9: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Contributions

CFA DetectorLens ProcessingFilters

Color InterpolationColor InterpolationGamma CorrectionGamma Correction

White Point CorrectionWhite Point CorrectionColor ConversionColor Conversion

CompressionCompression

Developed novel techniques to collect, attribute and authenticate image (video) evidence.

Funded by NSA, NIJ, AFOSR

Camera Imaging Pipeline

Page 10: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Trusted and Secure Hardware (Trusted and Secure Hardware (towards building hardware towards building hardware root of trust)root of trust)

RameshKarri ([email protected]) ECE Department

Ph. D. students

A. Kanuparthi and R. Guo: Trusted Platform Modules

J. Rajendran: Hardware Trojans

J. Li: Circuit Obfuscation

K. Rosenfeld: Secure Testing

J. Quan: Hardware Sidechannels

Supported by: Air Force Research Labs, NSF, Army, Cisco Systems

Page 11: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Embedded Devices – Trust?Embedded Devices – Trust?

Page 12: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

Approach – Trusted Platform Modules Approach – Trusted Platform Modules (TPM)(TPM)

RNG

RSA key gen.

SHA-1

Signature engine

Crypto Processor Non-volatile memory

Endorsement key

Storage root key

Volatile memory

PCRs

Attestation keys

Storage keys

Page 13: Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU

TPM: ongoing researchTPM: ongoing research

High performance vs Low cost vs Low Power vs Application Specific

Prototypes successfully tested on different application scenarios Redesign smart grid elements (smart meters, grid sensor

platforms and grid control elements) Deployment in pilot studies will uncover practical kinks…