SlideShare uma empresa Scribd logo
1 de 68
Baixar para ler offline
The Rising Tide Lifts All
Boats: The Advancement of
Science in Cybersecurity
Laurie Williams
North Carolina State University
#metoosecurity
Intervening in the last hour of an official
campaign, this operation clearly seeks to
destabilize democracy…
We cannot tolerate that the vital interests
of democracy are thus endangered.
- Macron campaign statement
Attackers Unceasing
Cybersecurity is all of our
responsibility..
#metoosecurity
A game of cat and mouse …
Why the Science of Security?
— “… nagging perception that too much of the
research is opportunistic, lacks rigor, has weak
methodology, and fails to produce material
advances on underlying hard problems.”
(NSA BAA Industry Day, 2013)
2011 Release
2014 Re-release
The three missions of the
Science of Security Lablets
— Build a science of security community
— Advance research methods in the
context of cybersecurity to build a
sound science of security
— “Solve” hard security problems
through the application of scientific
research
Through diversity of opinion,
creativity and unity is born.
Focus areas
/
Through collaboration and
unity, we can accelerate
change on a larger scale.
Competition-free zone
Lablet (4)National Security Agency
NCSU
UIUC
CMU
NSAUMD
Science of Security Lablets
Lablet (4)National Security Agency Sub-Lablet (26)
UNL
CU
DC
PENN
PITT
NAVY
UVA
GWU
RICEUTSA
UTA
UA
UNCC
NCSU
VT
USC
UC
UCBERKELEY
ICSI
UIUC IU
IIT
PU
WSU
CMU
GMU
UNC UMD
RIT
NSA
Science of Security Lablets & Sub-Lablets
NEWCASTLE (UK)
NDSU
UNL
CU
RSA
CCT
DC
BC
SC
MITLL
POTSDAM
MIT
SIEMENS
RUTGERS
AT&T
PENN
ARL
PSU
PITT
NAVY
UVA
GWU
HPHC
NLM-NIH
NU
UMICH
VERISIGN
RPI
UALBANY
UCFRICEUTSA
UTA
TX A&M
UA AUBURN
GT
UNCC
NCSU
VU
VT
UNM AFRL
USC
UC
LLNL
HP
SU
FUJITSU
GOOGLE
UCBERKELEY
ICSI
SYMANTEC
L&C
UW
INL
UIUC IU
IIT
UW-MADISON NWU
PU
WSU
CMU
GMU
UNC UMD
UH MANOA
PC
RIT
NSA
Lablet (4)National Security Agency Sub-Lablet (26) Collaborator (64)SURE (4)
Science of Security Lablets, Sub-Lablets, and
Collaborators NEWCASTLE (UK)
UOFW
UVIC
IMDEA
NOVA
UP
UPV
EPFL USI
UWAR
LEEDS
LU
KENT
OXFORD
NEWCASTLE (UK)
UDS
JWGU
MPI-SWS
UiO
KTH
IUT
THU
BUAA
SMU
UNIMELB
ANU
VUW
ULISBOA
Science of Security International Sub-Lablets and
Collaborators
Sub-Lablet (26) Collaborator (64)
The three missions of the
Science of Security Lablets
— Build a science of security community
— Advance research methods in the
context of cybersecurity to build a
sound science of security
— “Solve” hard security problems
through the application of scientific
research
Those “pesky” and ever-
present tough questions
Where’s the
beef . . . .
science?
Tough questions lead to
great(er) insight.
“The quality of your answers is in direct
proportion to the quality of your questions.”
--Albert Einstein
It’s so easy to fall back to
“engineering-ish” research.
Principles, Theories, Laws,
Hypotheses … Science
May be just a “subtle change”
Stand on the
shoulders of giants.
Software
Engineering
Type of result
Accepted
(ICSE
2002)
Accepted
(ICSE
2016)
Analysis … …
Evaluation … …
Experience 8 (19%) 4 (4%)
Example 16 (37%) 1 (1%)
Persuasion 0 (0%) 1 (1%)
Underspecified … …
No validation mentioned 6 (14%) 0 (0%)
Types of Validation
Type of result
Accepted
(ICSE
2002)
Accepted
(ICSE
2016)
Analysis … …
Evaluation … …
Experience 8 (19%) 4 (4%)
Example 16 (37%) 1 (1%)
Persuasion 0 (0%) 1 (1%)
Underspecified … …
No validation mentioned 6 (14%) 0 (0%)
Types of Validation
Type of result
Accepted
(ICSE
2002)
Accepted
(ICSE
2016)
Analysis … …
Evaluation … …
Experience 8 (19%) 4 (4%)
Example 16 (37%) 1 (1%)
Persuasion 0 (0%) 1 (1%)
Underspecified … …
No validation mentioned 6 (14%) 0 (0%)
Types of Validation
Type of result
Accepted
(ICSE
2002)
Accepted
(ICSE
2016)
Analysis … …
Evaluation … …
Experience 8 (19%) 4 (4%)
Example 16 (37%) 1 (1%)
Persuasion 0 (0%) 1 (1%)
Underspecified … …
No validation mentioned 6 (14%) 0 (0%)
Types of Validation
Science of Security Copycats
— Guidelines
— Seminars
— Research plan reviews
— Workshops
— Conference (Hot SoS)
The Rising Tide: Leading by
Example
Cybersecurity is all of our
responsibility..
#metoosecurity
1. Introduce yourself to someone you don’t know.
2. Provide one way that you can bring security into your
research and/or teaching.
Two minutes …. GO!
The three missions of the
Science of Security Lablets
— Build a science of security community
— Advance research methods in the
context of cybersecurity to build a
sound science of security
— “Solve” hard security problems
through the application of scientific
research
Through focus,
progress is made.
1. Thing 1
2. Thing 2
3. Thing 3
4. Thing 4
5. Thing 5
6. Thing 6
7. Thing 7
8. Thing 8
Do This!
DON’T DO THIS!
You wouldn’t do it anyway.
Science of Security Focus
1. Scalability and composability
2. Policy-governed secure collaboration
3. Encryption algorithms
4. Predictive security metrics
5. Intrusion Detection
6. Resilient architectures
7. Human behavior
Do This!
DON’T DO THIS!
Hard Problem 1: Scalability
and Composability
Challenge
— Develop methods to enable the construction
of secure systems with known security
properties.
Component and
Configuration Change
Hard Problem 2: Policy-Governed
Secure Collaboration
Challenge
— Develop methods to express and enforce
normative requirements and policies for
handling data with differing usage needs and
among users in different authority domains
Implied security and privacy
requirements
Templates
Repository
Supervised
Machine Learning
Hard Problem 3: Predictive
Security Metrics
Challenge
— Develop security metrics and models
capable of predicting whether or confirming
that a given cyber system preserves a given
set of security properties (deterministically or
probabilistically), in a given context.
Leveraging stack traces
from crash dumps
Risk-based attack surface
approximation
Windows: 48% of all binaries crash, 95% of vulnerable binaries crash.
Firefox: 16% of all files crash, 74% of vulnerable files crash.
Fedora: 8% of all packages crash, 60% of vulnerable packages crash.
Hard Problem 4: Resilient
Architectures
Challenge
— Develop means to design and analyze
system architectures that deliver required
service in the face of compromised
components
Synthesizing Network
Security Configurations
Resiliency Configurations Synthesis
Resiliency
Requirements
Topology
i.e., links, hosts
connectivity
Mission
e.g., connectivity requirements
Resiliency Configurations
-Isolation patterns
-Security device placements
-OS/Service/Software to be installed
Business Constraints
e.g., budget, usability constraint
Diversity Model
Isolation Model
Host Info
i.e., service/software
requirements
Impact Model
Attack Graph
Model
Design Specifications
- Resiliency metrics
- Usability
- Deployment/Cost
Hard Problem 5: Human
Behavior
Develop models of human behavior (of both
users and adversaries) that enable the design,
modeling, and analysis of systems with
specified security properties
/
Phishing: Personality &
Persuasion
LinkedIn Passwords
As Seen at NC State
Protect users from
themselves … easily!
My Intentions
Security Collaborative Research
Science Life
#metoosecurity
Making the world
a better place
Making the world
a better place
Making the world
a better place … by making
ALL software more secure
#metoosecurity
— #metoosecurity When deploying rapidly, we need
processes to make sure we are not pushing out
vulnerabilities
Slide photos -1— http://www.foxbusiness.com/markets/2017/07/13/verizon-customer-information-exposed-in-
data-breach.html
— http://www.tomandjerryonline.com/images/TrapHappy1.jpg
— http://www.leftlion.co.uk/articles.cfm/title/the-three-musketeers/id/1539
— http://www.dailymail.co.uk/tvshowbiz/article-1085791/Free-DVD-The-Four-Musketeers-todays-
Mail-Sunday.html
— https://www.reddit.com/r/pics/comments/1aw3f3/pathway/;
http://www.bbc.co.uk/bristol/content/image_galleries/tunnel_gallery.shtml
— http://www.thomthom.net/gallery/everything/tunnel-vision/
— http://davemeehan.com/cycling/ojos-negros-tunnel-vision
— http://www.techsangam.com/wp33/wp-content/uploads/2011/05/1221_jargon-boil-the-
ocean_485x340_forbes_com.jpg
— https://upload.wikimedia.org/wikipedia/en/3/33/Silicon_valley_title.png
— http://www.hindustantimes.com/india-news/tirupati-temple-andhra-pradesh-secretariat-hit-by-
wannacry-ransomware-attack/story-UJorivWJKEe2CL2tTaDusK.html
— https://www.popxo.com/2016/12/stereotypes-about-introverts-and-extroverts-broken/
— http://www.troll.me/images/pissed-off-obama/you-better-watch-yourself-thumb.jpg
Slide photos - 2
— https://bizpsycho.files.wordpress.com/2015/05/colored_puzzle_connection_1600_wht_9893.png
— https://scottmccown.wordpress.com/category/competition/
— https://www.linkedin.com/pulse/standing-shoulders-giants-6-apis-instant-saas-success-nick-boucart
— http://thebsblog.com/2015/10/09/oops-wrong-diagnosis/#prettyPhoto/0/
— http://www.findmemes.com/eye-roll-memes
— http://user47329.vs.easily.co.uk/wp-content/uploads/2014/08/Science-v-Engineering-Wordpress3.jpg
— http://memegenerator.net/instance/59256035
— http://www.pxleyes.com/photoshop-contest/20606/makeover.html
— http://lorettalovehuffblog.com/
— http://itnewscast.com/book/export/html/62241
— http://www.jenningswire.com/book-coaches/searching-for-the-needle-in-the-haystack/
— https://www.bing.com/images/search?view=detailV2&ccid=Y%2bfsSC%2b6&id=00072BAC4D3C77EC
F8E4AFFA13CCBFE0EC8E8A12&thid=OIP.Y-fsSC-6cSVEL_8ECb-
wlgEsC7&q=capability+brown++bridges&simid=608050771047878264&selectedIndex=7&ajaxhist=0
Slide photos - 3
— http://1000awesomethings.com/2011/02/23/302-grandma-hair
— http://garysreflections.blogspot.com/2011/02/chinese-hackers-now-hitting-major.html
— http://www.my-programming.com/2011/10/how-to-become-a-programmer/
— http://www.govconexecutive.com/2011/02/executive-spotlight-joseph-cormier-of-gtec
— https://cdn.psychologytoday.com/sites/default/files/field_blog_entry_images/ext.jpg
— http://www.keywordsblogger.com/wp-content/uploads/2009/05/persuading.jpg
— http://www.zdnet.com/pictures/biggest-hacks-security-data-breaches-2016
— http://www.zdnet.com/article/these-are-the-worst-passwords-from-the-linkedin-hack/
— https://www.iii.com/sites/default/files/imce/Elizabeth_Image_for_Blog_July_2015.png
— https://www.magzter.com/news/488/1242/032017/er0pk
— http://www.youngwebbuilder.com/how-to-get-listed-on-justtweetit-directory/
— https://alisonhinksyoga.wordpress.com/2013/09/09/a-rising-tide-lifts-all-boats/
http://thecybersaviours.com/intrusion-detection-system-ids

Mais conteúdo relacionado

Mais procurados

2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
2b3d
 
Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Coursera Cybersecurity 2015
Coursera Cybersecurity 2015
Arpit Singh
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 

Mais procurados (20)

Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree ProgramsCybersecurity Curricula Guidelines for Post-Secondary Degree Programs
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Insider threatsystemdynamics 2
Insider threatsystemdynamics 2Insider threatsystemdynamics 2
Insider threatsystemdynamics 2
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...
 
Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
 
Cyb 690 security architecture scoring guide performance level
Cyb  690 security architecture scoring guide performance level Cyb  690 security architecture scoring guide performance level
Cyb 690 security architecture scoring guide performance level
 
NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...
NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...
NTXISSACSC3 - Collin College's Security Management Practices Capstone Course ...
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rig
 
PhD Welcome Day 2014
PhD Welcome Day 2014PhD Welcome Day 2014
PhD Welcome Day 2014
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Coursera Cybersecurity 2015
Coursera Cybersecurity 2015
 
Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Coursera Cybersecurity 2015
Coursera Cybersecurity 2015
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
Threat landscape 4.0
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0
 
Cloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New EntrantsCloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New Entrants
 

Semelhante a The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity

Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
ChantellPantoja184
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
Zsolt Nemeth
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
audeleypearl
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
dr_edw777
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestration
Chadni Islam
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
phanleson
 

Semelhante a The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity (20)

The Rising Tide Raises All Boats: The Advancement of Science of Cybersecurity
The Rising Tide Raises All Boats:  The Advancement of Science of CybersecurityThe Rising Tide Raises All Boats:  The Advancement of Science of Cybersecurity
The Rising Tide Raises All Boats: The Advancement of Science of Cybersecurity
 
Mirror mirrror
Mirror mirrrorMirror mirrror
Mirror mirrror
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
Below are various theories and models that have been used and can
Below are various theories and models that have been used and can Below are various theories and models that have been used and can
Below are various theories and models that have been used and can
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
 
information security management
information security managementinformation security management
information security management
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
malicious-use-of-ai.pptx
malicious-use-of-ai.pptxmalicious-use-of-ai.pptx
malicious-use-of-ai.pptx
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Self-Learning Systems for Cyber Security
Self-Learning Systems for Cyber SecuritySelf-Learning Systems for Cyber Security
Self-Learning Systems for Cyber Security
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestration
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
 
IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 

Último

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 

Último (20)

%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 

The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity

  • 1. The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity Laurie Williams North Carolina State University #metoosecurity
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Intervening in the last hour of an official campaign, this operation clearly seeks to destabilize democracy… We cannot tolerate that the vital interests of democracy are thus endangered. - Macron campaign statement
  • 8. Attackers Unceasing Cybersecurity is all of our responsibility.. #metoosecurity
  • 9. A game of cat and mouse …
  • 10. Why the Science of Security? — “… nagging perception that too much of the research is opportunistic, lacks rigor, has weak methodology, and fails to produce material advances on underlying hard problems.” (NSA BAA Industry Day, 2013)
  • 13. The three missions of the Science of Security Lablets — Build a science of security community — Advance research methods in the context of cybersecurity to build a sound science of security — “Solve” hard security problems through the application of scientific research
  • 14. Through diversity of opinion, creativity and unity is born.
  • 16.
  • 17.
  • 18. Through collaboration and unity, we can accelerate change on a larger scale.
  • 20. Lablet (4)National Security Agency NCSU UIUC CMU NSAUMD Science of Security Lablets
  • 21. Lablet (4)National Security Agency Sub-Lablet (26) UNL CU DC PENN PITT NAVY UVA GWU RICEUTSA UTA UA UNCC NCSU VT USC UC UCBERKELEY ICSI UIUC IU IIT PU WSU CMU GMU UNC UMD RIT NSA Science of Security Lablets & Sub-Lablets NEWCASTLE (UK)
  • 22. NDSU UNL CU RSA CCT DC BC SC MITLL POTSDAM MIT SIEMENS RUTGERS AT&T PENN ARL PSU PITT NAVY UVA GWU HPHC NLM-NIH NU UMICH VERISIGN RPI UALBANY UCFRICEUTSA UTA TX A&M UA AUBURN GT UNCC NCSU VU VT UNM AFRL USC UC LLNL HP SU FUJITSU GOOGLE UCBERKELEY ICSI SYMANTEC L&C UW INL UIUC IU IIT UW-MADISON NWU PU WSU CMU GMU UNC UMD UH MANOA PC RIT NSA Lablet (4)National Security Agency Sub-Lablet (26) Collaborator (64)SURE (4) Science of Security Lablets, Sub-Lablets, and Collaborators NEWCASTLE (UK)
  • 24.
  • 25. The three missions of the Science of Security Lablets — Build a science of security community — Advance research methods in the context of cybersecurity to build a sound science of security — “Solve” hard security problems through the application of scientific research
  • 26.
  • 27. Those “pesky” and ever- present tough questions Where’s the beef . . . . science?
  • 28. Tough questions lead to great(er) insight. “The quality of your answers is in direct proportion to the quality of your questions.” --Albert Einstein
  • 29. It’s so easy to fall back to “engineering-ish” research.
  • 31. May be just a “subtle change”
  • 32. Stand on the shoulders of giants. Software Engineering
  • 33. Type of result Accepted (ICSE 2002) Accepted (ICSE 2016) Analysis … … Evaluation … … Experience 8 (19%) 4 (4%) Example 16 (37%) 1 (1%) Persuasion 0 (0%) 1 (1%) Underspecified … … No validation mentioned 6 (14%) 0 (0%) Types of Validation
  • 34. Type of result Accepted (ICSE 2002) Accepted (ICSE 2016) Analysis … … Evaluation … … Experience 8 (19%) 4 (4%) Example 16 (37%) 1 (1%) Persuasion 0 (0%) 1 (1%) Underspecified … … No validation mentioned 6 (14%) 0 (0%) Types of Validation
  • 35. Type of result Accepted (ICSE 2002) Accepted (ICSE 2016) Analysis … … Evaluation … … Experience 8 (19%) 4 (4%) Example 16 (37%) 1 (1%) Persuasion 0 (0%) 1 (1%) Underspecified … … No validation mentioned 6 (14%) 0 (0%) Types of Validation
  • 36. Type of result Accepted (ICSE 2002) Accepted (ICSE 2016) Analysis … … Evaluation … … Experience 8 (19%) 4 (4%) Example 16 (37%) 1 (1%) Persuasion 0 (0%) 1 (1%) Underspecified … … No validation mentioned 6 (14%) 0 (0%) Types of Validation
  • 37. Science of Security Copycats — Guidelines — Seminars — Research plan reviews — Workshops — Conference (Hot SoS)
  • 38. The Rising Tide: Leading by Example
  • 39. Cybersecurity is all of our responsibility.. #metoosecurity 1. Introduce yourself to someone you don’t know. 2. Provide one way that you can bring security into your research and/or teaching. Two minutes …. GO!
  • 40. The three missions of the Science of Security Lablets — Build a science of security community — Advance research methods in the context of cybersecurity to build a sound science of security — “Solve” hard security problems through the application of scientific research
  • 41. Through focus, progress is made. 1. Thing 1 2. Thing 2 3. Thing 3 4. Thing 4 5. Thing 5 6. Thing 6 7. Thing 7 8. Thing 8 Do This! DON’T DO THIS! You wouldn’t do it anyway.
  • 42. Science of Security Focus 1. Scalability and composability 2. Policy-governed secure collaboration 3. Encryption algorithms 4. Predictive security metrics 5. Intrusion Detection 6. Resilient architectures 7. Human behavior Do This! DON’T DO THIS!
  • 43. Hard Problem 1: Scalability and Composability Challenge — Develop methods to enable the construction of secure systems with known security properties.
  • 45. Hard Problem 2: Policy-Governed Secure Collaboration Challenge — Develop methods to express and enforce normative requirements and policies for handling data with differing usage needs and among users in different authority domains
  • 46. Implied security and privacy requirements Templates Repository Supervised Machine Learning
  • 47. Hard Problem 3: Predictive Security Metrics Challenge — Develop security metrics and models capable of predicting whether or confirming that a given cyber system preserves a given set of security properties (deterministically or probabilistically), in a given context.
  • 49. Risk-based attack surface approximation Windows: 48% of all binaries crash, 95% of vulnerable binaries crash. Firefox: 16% of all files crash, 74% of vulnerable files crash. Fedora: 8% of all packages crash, 60% of vulnerable packages crash.
  • 50. Hard Problem 4: Resilient Architectures Challenge — Develop means to design and analyze system architectures that deliver required service in the face of compromised components
  • 51. Synthesizing Network Security Configurations Resiliency Configurations Synthesis Resiliency Requirements Topology i.e., links, hosts connectivity Mission e.g., connectivity requirements Resiliency Configurations -Isolation patterns -Security device placements -OS/Service/Software to be installed Business Constraints e.g., budget, usability constraint Diversity Model Isolation Model Host Info i.e., service/software requirements Impact Model Attack Graph Model Design Specifications - Resiliency metrics - Usability - Deployment/Cost
  • 52. Hard Problem 5: Human Behavior Develop models of human behavior (of both users and adversaries) that enable the design, modeling, and analysis of systems with specified security properties /
  • 54.
  • 55.
  • 56.
  • 58.
  • 59. As Seen at NC State
  • 61. My Intentions Security Collaborative Research Science Life #metoosecurity
  • 62. Making the world a better place
  • 63. Making the world a better place
  • 64. Making the world a better place … by making ALL software more secure
  • 65. #metoosecurity — #metoosecurity When deploying rapidly, we need processes to make sure we are not pushing out vulnerabilities
  • 66. Slide photos -1— http://www.foxbusiness.com/markets/2017/07/13/verizon-customer-information-exposed-in- data-breach.html — http://www.tomandjerryonline.com/images/TrapHappy1.jpg — http://www.leftlion.co.uk/articles.cfm/title/the-three-musketeers/id/1539 — http://www.dailymail.co.uk/tvshowbiz/article-1085791/Free-DVD-The-Four-Musketeers-todays- Mail-Sunday.html — https://www.reddit.com/r/pics/comments/1aw3f3/pathway/; http://www.bbc.co.uk/bristol/content/image_galleries/tunnel_gallery.shtml — http://www.thomthom.net/gallery/everything/tunnel-vision/ — http://davemeehan.com/cycling/ojos-negros-tunnel-vision — http://www.techsangam.com/wp33/wp-content/uploads/2011/05/1221_jargon-boil-the- ocean_485x340_forbes_com.jpg — https://upload.wikimedia.org/wikipedia/en/3/33/Silicon_valley_title.png — http://www.hindustantimes.com/india-news/tirupati-temple-andhra-pradesh-secretariat-hit-by- wannacry-ransomware-attack/story-UJorivWJKEe2CL2tTaDusK.html — https://www.popxo.com/2016/12/stereotypes-about-introverts-and-extroverts-broken/ — http://www.troll.me/images/pissed-off-obama/you-better-watch-yourself-thumb.jpg
  • 67. Slide photos - 2 — https://bizpsycho.files.wordpress.com/2015/05/colored_puzzle_connection_1600_wht_9893.png — https://scottmccown.wordpress.com/category/competition/ — https://www.linkedin.com/pulse/standing-shoulders-giants-6-apis-instant-saas-success-nick-boucart — http://thebsblog.com/2015/10/09/oops-wrong-diagnosis/#prettyPhoto/0/ — http://www.findmemes.com/eye-roll-memes — http://user47329.vs.easily.co.uk/wp-content/uploads/2014/08/Science-v-Engineering-Wordpress3.jpg — http://memegenerator.net/instance/59256035 — http://www.pxleyes.com/photoshop-contest/20606/makeover.html — http://lorettalovehuffblog.com/ — http://itnewscast.com/book/export/html/62241 — http://www.jenningswire.com/book-coaches/searching-for-the-needle-in-the-haystack/ — https://www.bing.com/images/search?view=detailV2&ccid=Y%2bfsSC%2b6&id=00072BAC4D3C77EC F8E4AFFA13CCBFE0EC8E8A12&thid=OIP.Y-fsSC-6cSVEL_8ECb- wlgEsC7&q=capability+brown++bridges&simid=608050771047878264&selectedIndex=7&ajaxhist=0
  • 68. Slide photos - 3 — http://1000awesomethings.com/2011/02/23/302-grandma-hair — http://garysreflections.blogspot.com/2011/02/chinese-hackers-now-hitting-major.html — http://www.my-programming.com/2011/10/how-to-become-a-programmer/ — http://www.govconexecutive.com/2011/02/executive-spotlight-joseph-cormier-of-gtec — https://cdn.psychologytoday.com/sites/default/files/field_blog_entry_images/ext.jpg — http://www.keywordsblogger.com/wp-content/uploads/2009/05/persuading.jpg — http://www.zdnet.com/pictures/biggest-hacks-security-data-breaches-2016 — http://www.zdnet.com/article/these-are-the-worst-passwords-from-the-linkedin-hack/ — https://www.iii.com/sites/default/files/imce/Elizabeth_Image_for_Blog_July_2015.png — https://www.magzter.com/news/488/1242/032017/er0pk — http://www.youngwebbuilder.com/how-to-get-listed-on-justtweetit-directory/ — https://alisonhinksyoga.wordpress.com/2013/09/09/a-rising-tide-lifts-all-boats/ http://thecybersaviours.com/intrusion-detection-system-ids