What Role Does Hardware Design Have to Play in Cybersecurity? Srini Devadas Massachuse0s Ins2tute of Technology

Size: px
Start display at page:

Download "What Role Does Hardware Design Have to Play in Cybersecurity? Srini Devadas Massachuse0s Ins2tute of Technology"

Transcription

1 What Role Does Hardware Design Have to Play in Cybersecurity? Srini Devadas Massachuse0s Ins2tute of Technology

2 Agenda Cyber threats today Defensive strategies Role of hardware design Research direc=ons and open problems

3 AKacks on Individuals Ransomware Worm enters system through downloaded file. Payload encrypts user s hard drive and deletes the original files user cannot decipher his/her own files Pay $500 in Bitcoin to get your files back! anonymous-ransomware/ MIT COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE LABORATORY

4 AKacks on Services Target in million: The number of credit and debit cards thieves stole. 70 million: The number of records stolen that included the name, address, address and phone number of Target shoppers. 46: % drop in profits in the 4th quarter of 2013, compared to million: Estimated cost for reissuing 21.8 million cards million: The income that hackers likely generated from the sale of 2 million cards stolen and sold at $26 per card. 0: Number of customer cards with AVAILABLE hardware security technology that would have been able to stop the bad guys from stealing. MIT COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE LABORATORY

5 AKacks on Infrastructure The Stuxnet Cyberphysical AKack A 500 Kbyte computer worm that infected the sotware of at least 14 industrial sites in Iran including a nuclear facility Goal was to cause fast- spinning centrifuges to tear themselves apart Stuxnet was tracked down by Kaspersky Labs but not before it did some damage MIT COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE LABORATORY

6 AKacks on Infrastructure The Stuxnet Cyberphysical AKack MIT COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE LABORATORY

7 Cybersecurity and Threats Cybersecurity is a property of computer systems similar to performance and energy AKackers take a holis=c view by akacking any component or interface of system Diverse threat models dictate different desirable security proper=es Viruses and worms: Bug- free programs Denial- of- Service akacks: Redundant resources Cyberphysical akacks: Tamper- resistant hardware MIT COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE LABORATORY

8 Current Approaches are Limited Computer systems are so complex that it is impossible to design them without vulnerabili=es. Therefore, the best we can do is to: Focus on exis=ng compu=ng systems and their akacks to discover flaws Design mechanisms into these systems to protect against these akacks Manage risk and administer systems well Unfortunately, new flaws are always discovered We need to do beker than this Patch & Pray, Perimeter Protec=on mindset MIT COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE LABORATORY

9 Security property cannot be ar=culated well when isolated to a component or layer à need a systems- wide, architectural viewpoint New theore=cal and prac=cal founda=ons of secure compu=ng that integrate security in the design process à security by default à Holis=c View of Cybersecurity Remove program error as a source of vulnerability Need researchers from diverse disciplines, e.g., systems and applica=on sotware designers, architects and digital system designers to tackle the problem MIT COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE LABORATORY

10 Three Defenses Preven=on: Increasing the difficulty of akacks Resilience: Allowing a system to remain func=onal despite akacks Detec=on and Recovery: Allowing systems to more quickly detect and recover from akacks to fully func=onal state. MIT COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE LABORATORY

11 The Obvious Role of Hardware in Cybersecurity Can implement security func=onality in hardware, e.g., Encryp=on Message authen=ca=on Network packet inspec=on Etc. to improve performance and lower energy

12 Preven=on Protec=on Against Physical AKack

13 Tradi=onal Device Authen=ca=on Each IC needs to be unique Embed a unique secret key SK in on- chip non- vola=le memory Use cryptography to authen=cate an IC Cryptographic opera=ons can address other problems such as protec=ng IP or secure communica=on IC with a secret key Sends a random number Sign the number with a secret key à Only the IC s key can generate a valid signature IC s Public Key

14 BUT How to generate and store secret keys on ICs in a secure and inexpensive way? Adversaries may physically extract secret keys from non- vola=le memory Trusted party must embed and test secret keys in a secure loca=on What if cryptography is NOT available? Extremely resource (power) constrained systems such as passive RFIDs Commodity ICs such as FPGAs Invasive probing Non-invasive measurement

15 Physical Unclonable Func=ons (PUFs) Extract secrets from a complex physical system Because of random process varia=ons, no two Integrated Circuits even with the same layouts are iden=cal Varia=on is inherent in fabrica=on process Hard to remove or predict Delay- Based Silicon PUF concept (2002) Generate keys from unique delay features of chips Challenge" n-bits" Response" m-bits" Combinatorial Circuit"

16 Why PUFs? (Challenge) PUF n Response PUF can enable secure, low- cost authen=ca=on w/o crypto Use PUF as a func=on: challenge response Only an authen=c IC can produce a correct response for a challenge Inexpensive: no special fabrica=on technique PUF can generate a unique secret key / ID Physically secure: vola=le secrets, no need for trusted programming Can integrate key genera=on into a secure processor

17 An Arbiter- Based Silicon PUF n-bit! Challenge! Rising Edge! " D Q G 01 1 if top! path is! faster,! else 0! Response! Compare two paths with an iden=cal delay in design Random process varia=on determines which path is faster An arbiter outputs 1- bit digital response Mul=ple bits can be obtained by either duplicate the circuit or use different challenges Each challenge selects a unique pair of delay paths

18 Arbiter Experiments PUF Response: Average Code Distances 128 (2x64) bit, RFID MUX PUF Rev.Ax1 M3 vs. Rev.Ax8 +25 C Millions stage Rev.Ax1 Rev.Ax1 Rev.Ax8 Rev.Ax stage Code distance [Bits] 18

19 Arbiter is not a PUF (clonable!) Introduced in 2003 paper, shown in same paper to be suscep=ble to a machine learning model- building akack 100% Rev.A PUF Model/Data Correlation Levels 90% Model output match level to 16,384 bits of real Rev.A PUF data (teaching set included) 80% 70% 60% 50% 40% 30% 20% 10% 0% Need to add nonlinearity to circuit Number of challenges (= single response bits) taught CFMin CFAvg CFMax

20 XOR Arbiter PUF Can process and combine outputs of mul=ple PUFs Simplest version: XOR opera=on n-bit! Challenge! PUF Circuit PUF Circuit PUF Circuit PUF Circuit XOR of k PUFs each with n stages

21 XOR Arbiter PUF Security Machine learning complexity appears to grow as O(n k+1 ) for k- way XOR over n- stage PUFs Size of circuit grows as O(nk) N = 64, k = 6 is on the edge of being broken Can go up to k = 8 with reasonable noise levels

22 8- way XOR experiments PUF Response: Average Code Distances 128 (2x64) bit, RFID MUX PUF Rev.B vs. (synthesized) +25 C Millions Rev.B Rev.B Rev.Bx2 Rev.Bx way XOR 8-way XOR Code distance [Bits] 22

23 Current Limita=ons of PUFs PUF- based authen=ca=on not cryptographically secure, i.e., not reducible to established hard problems Combined machine learning and side channel akacks have broken many candidates New candidates con=nually being proposed Key genera=on needs helper data Many more bits than key bits Proofs of no leakage from helper data make some untested assump=ons

24 Resilience Under AKack Encrypted Computa=on

25 Trusted Compu=ng Base The trusted compu=ng base (TCB) is the set of sotware and hardware components that need to be trusted by a user In TPM- based systems, the TPM akests the veracity of several millions of lines of (buggy) OS code The TPM does not provide real security In the cloud, the TCB is > 20M lines of code from tens of sotware vendors No wonder we have so many security breaks!

26 Applica=on: Secure Cloud Compu=ng I want to delegate processing of my data, without giving away access to it. Separa=ng processing from access via encryp=on: I will encrypt my data before sending it to the cloud They will apply their processing on the encrypted data, send me processed (s=ll encrypted) result I will decrypt the result and get my answer Computation Under Encryption

27 An Analogy: Alice s Jewelry Store Courtesy: C. Gentry Alice s workers need to assemble raw materials into jewelry But Alice is worried about thet How can the workers process the raw materials without having access to them?

28 An Analogy: Alice s Jewelry Store Courtesy: C. Gentry Alice puts materials in locked glove box For which only she has the key Workers assemble jewelry in the box Alice unlocks box to get results

29 The Analogy Encrypt: puvng things inside the box Alice does this using her key c i ß Enc(m i ) Decrypt: Taking things out of the box Only Alice can do it, requires the key m* ß Dec(c*) Process: Assembling the jewelry Anyone can do it, compu=ng on ciphertext c* ß Process(c 1,,c n ) m* = Dec(c*) the ring, made from raw material m i

30 Encrypted Computa=on Encrypted computa=on can thus be achieved using Fully Homomorphic Encryp=on (FHE) without trus2ng anything on the server side Server does not need to store a secret key Unfortunately, FHE overheads are about 10 8 to 10 9 for straight- line code and overheads grow if there is complex control in the program Only usable for simple computa=ons What About Hardware Approaches?

31 Tamper Resistant Hardware Tamper resistant hardware The secure processor is trusted, shares secret key with client. Private informa=on stored in the hardware is not accessible through external means. examples: XOM, Aegis, TPM, TPM + TXT, etc.

32 Tamper Resistant Hardware Limita=ons Just trus=ng the tamper resistance of the chip is not enough! I/O channels of the secure processor can be monitored by sotware and leak informa=on Examples: address channel, I/O =ming channel Main Memory

33 Leakage through Address Channel for i = 1 to N if (x == 0) sum += A[i] else sum += A[0] Address sequence: 0x00, 0x01, 0x02 Address sequence: 0x00, 0x00, 0x00 The value of x is leaked through the access pakern Sensi=ve data exposed by observing the addresses!

34 A Typical Computer TCB Software! Running on hardware! (Ring 3)! TRUSTED! Privelege! App! App! Secure App! TRUSTED! OS Kernel (Ring 0)! Hypervisor (Ring 0, VMX root)! BIOS (SMM)! DRAM! Main! board! DRAM Ctrl.! CPU!! Thread! L3 $! Chipset! L1 $! L2 $! Disk! Network!

35 Intel SGX to reduce TCB (Ring 3) " App" TRUSTED! Enclave" SGX protects a small codebase! Doesn t trust OS! Protected app = Enclave! Privelege! OS Kernel (Ring 0) " Hypervisor (VMX root) " BIOS (SMM)" Provides a trusted environment:! - app integrity! - protects data! TCB is the Intel CPU no off-chip interfaces to secure! DRAM" DRAM Ctrl." TRUSTED! CPU" " L1 $" Thread" L2 $" L3 $" Main" board" Chipset" Disk" Network"

36 Cache Timing AKack (Modern x86 CPU: 4-way set associative L1, L2$, 64B lines)! Simultaneous multithreading (hypertheading!)! A spy, sharing physical core with victim:! - malloc enough data to blow the $! - For each $ line, read to populate all 4 ways! - Use RDTSC to time reads, log results:! - Fast: no evictions occurred.! - Slow: eviction! Victim loaded.! - Slower: writeback! victim stored!! Physical" Memory" L1 or L2 $" Victim owns at most one line in set" S sets" 4 ways"

37 Memory Access PaKern Leakage Assume a malicious OS, own scheduling!!mount the same attack as before.! We can do even better!!!orchestrate page mappings!!!cache partitioning!!!kernel data separate from attack!!very low noise!! Kernel data structures" Cache timing attack" on enclave, as before" RAM" Allocation" for" snooping" Kernel" data" structures" Enclave data"

38 Ascend Security Goal Protect against all sotware- based and some hardware- based akacks when running untrusted sotware An adversary cannot learn a user s private informa=on by observing the pin traffic of Ascend. Main Memory

39 Ascend Processor: Eliminate leakage over chip pins

40 Two Interac=ve Protocol Data transfer only happens twice Time=0 Input data fed into Ascend (stored in ORAM) Time=T Output data returned to the user.

41 Oblivious RAM Time = 0 Public Input (from the server) Enc(Private input) (from the user) Ascend L1$ CPU ORAM Interface A E S Periodic Access Main Memory (4GB ORAM) L2$ AES Time = T Enc( final result )

42 Oblivious RAM Oblivious RAM (ORAM) [1] ORAM allows a client to conceal its access pakern to the remote storage by con=nuously shuffling and re- encryp=ng data as they are accessed. Any two access sequences of same length are computa=onally indis=nguishable. ORAM does not protect =ming channel, i.e., when accesses are made can s=ll leak informa=on. [1] O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. J. ACM, 1996.

43 Naïve Oblivious RAM Naïve ORAM Each access touches all the N data blocks in main memory Blocks are read, re- encrypted using probabilis=c encryp=on and wriken back Dummy blocks are filled to obfuscate memory footprint. O(N) overhead unacceptable

44 Path ORAM Path ORAM is organized as a binary tree. L levels Each node contains Z data blocks (cache lines) off-chip on-chip ORAM Interface Trusted Coprocessor Binary Tree Unoccupied nodes are filled with dummy blocks Dummy and real blocks are indis=nguishable ater encryp=on

45 Path Oblivious RAM Path ORAM* Each access only touches O(log(N)) data blocks. The most prac=cal ORAM scheme for hardware Compute- bound applica2ons: < 2X overhead Memory- bound applica2ons: 5-10X overhead Neither server nor applica2on soqware is trusted. * Path ORAM: An Extremely Simple Oblivious RAM Protocol, Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas, CCS, 2013.

46 Current Limita=ons of Ascend Batch computa=on model The channel between the user and Ascend is only used at beginning and end of computa=on. No interac=on during computa=on User input/output, network, disk, etc. Oblivious RAM Network Disk

47 Detec=on and Recovery Integrity of Computa=on

48 AKacks on Integrity Some=mes one is only concerned with obtaining correct results, not privacy leakage Integrity of storage (malicious errors) implies reliability of storage (random errors) Solu=on: Cryptographic hash func=ons Reliability and integrity of computa=on is a harder problem Errors can have catastrophic effects Many possible akacks on computa=on 48

49 Redundant Computa=ons Redundancy in the form of retries or parallel computa=ons is key to recovery Challenge is to keep overheads manageable à hardware can help Key idea: Hardware computes confidence informa=on for each computa=on Confidence low on data from an external source, high on data from trusted sources 49

50 Informa=on Flow Tracking Tracking Confidence Architect a processor to track the flow of informa=on through the code This can be done in sotware albeit with greater overhead Worked well for buffer overflow akacks Tracking calculus becomes more complicated under more sophis=cated akacks Abort computa=on or retry when confidence falls below threshold 50

51 Some Open Problems

52 Public- Model Physical Unclonable Func=ons Concept proposed by Koushanfar, Potkonjak Simula=ng the public model takes much longer than evalua=ng the system Give me response to challenge Correct response within time T

53 Hardware Trojans Suppose the manufacturer of the chip is not trusted How can we protect against a malicious manufacturer?

54 Securing Interac=on Under Untrusted SoTware Securing interac=ons with memory is easy Encryp=on, integrity verifica=on, ORAM What about keyboards, displays, network, and other I/O devices? How to authen=cate a keypress? How to authen=cate what is being shown on a display? 54

55 Summary SoTware dominates cybersecurity conversa=ons Several cybersecurity challenges are best handled through appropriate hardware design, since sotware IS the problem! 55

Meeting Cybersecurity Challenges through Innovative Computer System Design. Srini Devadas MIT

Meeting Cybersecurity Challenges through Innovative Computer System Design. Srini Devadas MIT Meeting Cybersecurity Challenges through Innovative Computer System Design Srini Devadas MIT Attackers routinely compromise computer systems Attackers routinely compromise computer systems Attackers routinely

More information

Hardware enhanced Security in Cloud Compu8ng. Cloud Compu8ng (Public IaaS)

Hardware enhanced Security in Cloud Compu8ng. Cloud Compu8ng (Public IaaS) Hardware enhanced Security in Cloud Compu8ng Ruby B. Lee Princeton University ARO workshop on Cloud Security, March 11, 2013 Cloud Compu8ng (Public IaaS) End Users Cloud Provider Guest VMs Cloud Customer

More information

CIT 668: System Architecture

CIT 668: System Architecture CIT 668: System Architecture Cloud Security Topics 1. The Same Old Security Problems 2. Virtualization Security 3. New Security Issues and Threat Model 4. Data Security 5. Amazon Cloud Security Data Loss

More information

Certifying Program Execution with Secure Processors

Certifying Program Execution with Secure Processors Certifying Program Execution with Secure Processors Benjie Chen Robert Morris MIT Laboratory for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects

More information

CHASE Survey on 6 Most Important Topics in Hardware Security

CHASE Survey on 6 Most Important Topics in Hardware Security University of Connecticut CHASE Survey on 6 Most Important Topics in Hardware Security Prepared By Prof. M. Tehranipoor Charles H. Knapp Associate Professor in Engineering Innovation Topics! Counterfeit

More information

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal

More information

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones Network Security Security in Compu5ng, Chapter 7 Topics l Network AAacks l Reconnaissance l AAacks l Spoofing l Web Site Vulnerabili5es l Denial of Service l Network Defences l Firewalls l Demilitarised

More information

UNCLASSIFIED Version 1.0 May 2012

UNCLASSIFIED Version 1.0 May 2012 Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

Some Security Challenges of Cloud Compu6ng. Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo

Some Security Challenges of Cloud Compu6ng. Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo Some Security Challenges of Cloud Compu6ng Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo Cloud Compu6ng: the Next Big Thing Tremendous momentum ahead: Prediction

More information

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution 1 Lecture Embedded System Security Dynamic Root of Trust and Execution Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2014 Dynamic Root

More information

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal

More information

benefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al

benefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al 1/06/15 Benefits of virtualiza/on Virtualiza/on Which of the following is not a poten/al benefit of virtualiza/on? A. cost effec/ve B. applica/on migra/on is easy C. improve applica/on performance D. run

More information

Reviving smart card analysis

Reviving smart card analysis Reviving smart card analysis Christopher Tarnovsky Karsten Nohl chris@flylogic.net nohl@srlabs.de Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for

More information

Ascend: An Architecture for Performing Secure Computation on Encrypted Data. Christopher W. Fletcher

Ascend: An Architecture for Performing Secure Computation on Encrypted Data. Christopher W. Fletcher Ascend: An Architecture for Performing Secure Computation on Encrypted Data by Christopher W. Fletcher B.S. in Electrical Engineering and Computer Science, University of California, Berkeley, 2010 Submitted

More information

Security testing the Internet-of-things

Security testing the Internet-of-things Security testing the Internet-of-things Lindholmen Software Development Day 2014-10-16 Emilie Lundin Barse Informa(on Security Consultant, Combitech emilie.barse@combitech.se Contents State of security

More information

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security

More information

Secure Cloud Storage and Computing Using Reconfigurable Hardware

Secure Cloud Storage and Computing Using Reconfigurable Hardware Secure Cloud Storage and Computing Using Reconfigurable Hardware Victor Costan, Brandon Cho, Srini Devadas Motivation Computing is more cost-efficient in public clouds but what about security? Cloud Applications

More information

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design. Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute

More information

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Side Channel Analysis and Embedded Systems Impact and Countermeasures Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side

More information

Raccoon: Closing Side-Channels through Obfuscated Execution

Raccoon: Closing Side-Channels through Obfuscated Execution Raccoon: Closing Side-Channels through Obfuscated Execution by Ashay Rane, Calvin Lin, Mohit Tiwari Presentation by Arjun Khurana and Timothy Wong Outline Background Raccoon Design Evaluation Conclusion

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

Map- reduce, Hadoop and The communica3on bo5leneck. Yoav Freund UCSD / Computer Science and Engineering

Map- reduce, Hadoop and The communica3on bo5leneck. Yoav Freund UCSD / Computer Science and Engineering Map- reduce, Hadoop and The communica3on bo5leneck Yoav Freund UCSD / Computer Science and Engineering Plan of the talk Why is Hadoop so popular? HDFS Map Reduce Word Count example using Hadoop streaming

More information

Onion ORAM: Constant Bandwidth ORAM with Server Computation Chris Fletcher

Onion ORAM: Constant Bandwidth ORAM with Server Computation Chris Fletcher Onion ORAM: Constant Bandwidth ORAM with Server Computation Chris Fletcher Joint work with: Ling Ren, Marten van Dijk, Srini Devadas Current art and where to go next State of the art schemes Bandwidth:

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor? Mr. Jacob Torrey February 26, 2014 Dartmouth College 153 Brooks Road, Rome, NY 315.336.3306 http://ainfosec.com @JacobTorrey

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography

More information

The Reduced Address Space (RAS) for Application Memory Authentication

The Reduced Address Space (RAS) for Application Memory Authentication The Reduced Address Space (RAS) for Application Memory Authentication David Champagne, Reouven Elbaz and Ruby B. Lee Princeton University, USA Introduction Background: TPM, XOM, AEGIS, SP, SecureBlue want

More information

Guideline for stresstest Page 1 of 6. Stress test

Guideline for stresstest Page 1 of 6. Stress test Guideline for stresstest Page 1 of 6 Stress test Objective: Show unacceptable problems with high parallel load. Crash, wrong processing, slow processing. Test Procedure: Run test cases with maximum number

More information

Windows Server Virtualization & The Windows Hypervisor

Windows Server Virtualization & The Windows Hypervisor Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick

More information

Trus%ng your Cloud Provider s System

Trus%ng your Cloud Provider s System Trus%ng your Cloud Provider s System Retaining Control over Private Virtual Machines Hosted by a Cloud Provider Using Mandatory Access Control, Trusted Boot and A>esta?on Vorarlberg University of Applied

More information

Associate Prof. Dr. Victor Onomza Waziri

Associate Prof. Dr. Victor Onomza Waziri BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,

More information

Are Cache Attacks on Public Clouds Practical?

Are Cache Attacks on Public Clouds Practical? Are Cache Attacks on Public Clouds Practical? Thomas Eisenbarth Joint work with Gorka Irazoqui, Mehmet Sinan Inci, Berk Gulmezoglu and Berk Sunar WPI - 10/19/2015 Outline Cloud Computing and Isolation

More information

Resilience improving features of MPLS, IPv6 and DNSSEC

Resilience improving features of MPLS, IPv6 and DNSSEC Resilience improving features of MPLS, IPv6 and DNSSEC So?ris Ioannidis Ins%tute of Computer Science (ICS) Founda%on for Research and Technology Hellas (FORTH) Crete, Greece MPLS, IPv6 and DNSSEC MPLS

More information

Rogue Programs. Rogue Programs - Topics. Security in Compu4ng - Chapter 3. l Rogue programs can be classified by the way they propagate

Rogue Programs. Rogue Programs - Topics. Security in Compu4ng - Chapter 3. l Rogue programs can be classified by the way they propagate Rogue Programs Security in Compu4ng - Chapter 3 Rogue Programs - Topics l Rogue programs can be classified by the way they propagate l Virus l Trojan l Worm l Or how they are ac4vated l Time Bomb l Logic

More information

Mobile Weblink Security

Mobile Weblink Security Name Maryam Al- Naemi Date 11/01/2013 Subject ITGS higher level Title How safe is the informa@on we store on our smartphones? Area of impact Home & Leisure Social & Ethical Issue Security Ar:cle Smartphone

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Princeton University Computer Science COS 432: Information Security (Fall 2013)

Princeton University Computer Science COS 432: Information Security (Fall 2013) Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable

More information

PALO ALTO SAFE APPLICATION ENABLEMENT

PALO ALTO SAFE APPLICATION ENABLEMENT PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa jsherlow@paloaltonetworks.com @jsherlow Palo Alto Networks at a Glance Corporate Highlights

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

How To Manage A Mobile Device Management At Harvard

How To Manage A Mobile Device Management At Harvard Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS Objec&ves Our hope is that this conversa0on will get people thinking about mobile

More information

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer

More information

Homomorphic encryption and emerging technologies COSC412

Homomorphic encryption and emerging technologies COSC412 Homomorphic encryption and emerging technologies COSC412 Learning objectives Describe useful work that can be done on encrypted data Appreciate the overall way in which an example homomorphic encryption

More information

Windows Phone 8 Security Overview

Windows Phone 8 Security Overview Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.

More information

LBSEC. http://www.liveboxcloud.com

LBSEC. http://www.liveboxcloud.com 2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee

More information

CSE543 Computer and Network Security Module: Cloud Computing

CSE543 Computer and Network Security Module: Cloud Computing CSE543 Computer and Network Security Module: Computing Professor Trent Jaeger 1 Computing Is Here Systems and Internet Infrastructure Security (SIIS) Laboratory 2 Computing Is Here Systems and Internet

More information

Analyzing the Security Schemes of Various Cloud Storage Services

Analyzing the Security Schemes of Various Cloud Storage Services Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services

More information

Aircloak Analytics: Anonymized User Data without Data Loss

Aircloak Analytics: Anonymized User Data without Data Loss Aircloak Analytics: Anonymized User Data without Data Loss An Aircloak White Paper Companies need to protect the user data they store for business analytics. Traditional data protection, however, is costly

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

Towards Trustworthy Architectures for Secure Cloud Servers and End-User Devices

Towards Trustworthy Architectures for Secure Cloud Servers and End-User Devices Towards Trustworthy Architectures for Secure Cloud Servers and End-User Devices Jakub Szefer and Prof. Ruby B. Lee Princeton University http://palms.princeton.edu/ 2013-03-11 ARO Invitational Workshop

More information

Cloud, and Digital Iden1ty Management (DIM) Exis1ng DIMs and their Limita1ons Our Goals World of Group Signatures SPICE!

Cloud, and Digital Iden1ty Management (DIM) Exis1ng DIMs and their Limita1ons Our Goals World of Group Signatures SPICE! Cloud, and Digital Iden1ty Management (DIM) Exis1ng DIMs and their Limita1ons Our Goals World of Group Signatures SPICE! Simple Showcase 2 Cloud compu1ng has been envisioned as the next- genera1on architecture

More information

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future Mobility in the Modern Factory Discussion of Mobile Adop7on for the Factories of the Future Talking Points History Lesson The Reasons for Going Mobile Mobile Infrastructure Mobile Device Security BYOD

More information

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Application Intrusion Detection

Application Intrusion Detection Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction

More information

Security Protocols: SSH. Michael E. Locasto University of Calgary

Security Protocols: SSH. Michael E. Locasto University of Calgary Security Protocols: SSH Michael E. Locasto University of Calgary Agenda Philosophy: data protec?on on the network Discussion of SSH SSH history Authen?ca?on Mechanisms SSH2 design overview / architecture

More information

Agenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.

Agenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance. Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

The Seven Habits of State-of-the-Art Mobile App Security

The Seven Habits of State-of-the-Art Mobile App Security #mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is

More information

Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013

Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013 Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013 Legal Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR

More information

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes!

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes! SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes! Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou! Center for Secure Information Systems! George Mason University!

More information

PUF Physical Unclonable Functions

PUF Physical Unclonable Functions Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication

More information

Center of Academic Excellence Cyber Operations Program 2013 Application

Center of Academic Excellence Cyber Operations Program 2013 Application Center of Academic Excellence Cyber Operations Program 2013 Application Name of Institution: Mailing Address of Institution: Date: Institution s President s Name and Official Email Address: Department

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

COSC 472 Network Security

COSC 472 Network Security COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html

More information

Security of Cloud Storage: - Deduplication vs. Privacy

Security of Cloud Storage: - Deduplication vs. Privacy Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt

More information

Firewalls and Classical Network Security

Firewalls and Classical Network Security Firewalls and Classical Network Security Real stories from the news SERVER- SIDE ATTACKS A Story from the News A program infected thousands of computers Vic:m computers were mostly in one country Reported

More information

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends

More information

VDI Solutions - Advantages of Virtual Desktop Infrastructure

VDI Solutions - Advantages of Virtual Desktop Infrastructure VDI s Fatal Flaw V3 Solves the Latency Bottleneck A V3 Systems White Paper Table of Contents Executive Summary... 2 Section 1: Traditional VDI vs. V3 Systems VDI... 3 1a) Components of a Traditional VDI

More information

M-Shield mobile security technology

M-Shield mobile security technology Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a

More information

Software Execution Protection in the Cloud

Software Execution Protection in the Cloud Software Execution Protection in the Cloud Miguel Correia 1st European Workshop on Dependable Cloud Computing Sibiu, Romania, May 8 th 2012 Motivation clouds fail 2 1 Motivation accidental arbitrary faults

More information

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Enhancing Organizational Security Through the Use of Virtual Smart Cards Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company

More information

A Survey and Analysis of Solutions to the. Oblivious Memory Access Problem. Erin Elizabeth Chapman

A Survey and Analysis of Solutions to the. Oblivious Memory Access Problem. Erin Elizabeth Chapman A Survey and Analysis of Solutions to the Oblivious Memory Access Problem by Erin Elizabeth Chapman A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in

More information

A Survey on Virtual Machine Security

A Survey on Virtual Machine Security A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology jreubens@cc.hut.fi Abstract Virtualization plays a major role in helping the organizations to reduce the operational

More information

That Point of Sale is a PoS

That Point of Sale is a PoS SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach

More information

Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM

Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute

More information

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. Yehuda Lindell Bar-Ilan University GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte Shay Gueron Haifa Univ. and Intel Yehuda Lindell Bar-Ilan University Appeared at ACM CCS 2015 How to Encrypt with

More information

The Value of Physical Memory for Incident Response

The Value of Physical Memory for Incident Response The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

IBM Crypto Server Management General Information Manual

IBM Crypto Server Management General Information Manual CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.

More information

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging

Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.

More information

White Paper: Multi-Factor Authentication Platform

White Paper: Multi-Factor Authentication Platform White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all

More information

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006 CSE331: Introduction to Networks and Security Lecture 1 Fall 2006 Basic Course Information Steve Zdancewic lecturer Web: http://www.cis.upenn.edu/~stevez E-mail: stevez@cis.upenn.edu Office hours: Tues.

More information

IoT Security Concerns and Renesas Synergy Solutions

IoT Security Concerns and Renesas Synergy Solutions IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas

More information

Rethinking Cyber Security in the Age of the Breach

Rethinking Cyber Security in the Age of the Breach Global Cloud Networking Advanced Managed Security Cloud Unified Communications Rethinking Cyber Security in the Age of the Breach Craig D Abreo, CISSP VP Security Operations Copyright 2015 Masergy Communica8ons,

More information

Security Goals Services

Security Goals Services 1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Splunk and Big Data for Insider Threats

Splunk and Big Data for Insider Threats Copyright 2014 Splunk Inc. Splunk and Big Data for Insider Threats Mark Seward Sr. Director, Public Sector Company Company (NASDAQ: SPLK)! Founded 2004, first sohware release in 2006! HQ: San Francisco

More information

Digital Rights Management Demonstrator

Digital Rights Management Demonstrator Digital Rights Management Demonstrator Requirements, Analysis, and Design Authors: Andre Osterhues, Marko Wolf Institute: Ruhr-University Bochum Date: March 2, 2007 Abstract: This document describes a

More information

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Number 1/2013, pp. 72 77 NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA Laurenţiu BURDUŞEL Politehnica

More information

Secure Storage. Lost Laptops

Secure Storage. Lost Laptops Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include

More information