Abstract

Software security metrics are commonly considered as one critical component of science of security. We propose to investigate existing metrics and new security metrics to predict which code locations are likely to contain vulnerabilities. In particular, we will investigate security metrics to take into account of comprehensive factors such as software internal attributes, developers who develop the software, attackers who attack the software, and users who use the software. The project also investigates metrics to evaluate firewall security objectively.  The developed metrics including risk, usability and cost are used to automate the creation of security architecture and configurations.

TEAM

PIs: Tao Xie, Laurie Williams, & Ehab S. Al-Shaer (UNC-Charlotte)
Students: Jason King, Rahul Pandita, & Mahamed Alsaleh

Tao Xie
Developing a User Profile to Predict Phishing Susceptibility and Security Technology Acceptance
Lead PI:
Christopher Mayhorn
Co-Pi:
Abstract

Phishing has become a serious threat in the past several years, and combating it is increasingly important. Why do certain people get phished and others do not? In this project, we aim to identify the factors that cause people to be susceptible and resistant to phishing attacks. In doing so, we aim to deploy adaptive anti-phishing measures.

The objective of this project is to design empirical privacy metrics that are independent of existing privacy models to naturally reflect the privacy offered by anonymization. We propose to model privacy attacks as an inference process and develop an inference framework over anonymized data (independent of specific privacy objects and techniques for data anonymization) where machine-learning techniques can be integrated to implement various attacks. The privacy metrics is then defined as the accuracy of the inference of individuals’ sensitive attributes. Data utility is modeled as a data aggregation process and thus can be measured in terms of accuracy of aggregate query answering. Our hypothesis is that, given the above empirical privacy and utility metrics, differential privacy based anonymization techniques offers a better privacy/utility tradeoff, when appropriate parameters are set. In particular, it is possible to improve utility greatly while imposing limited impact on privacy.

TEAM

PIs: Chris Mayhorn & Emerson Murphy-Hill
Students: Kyung Wha Hong & Chris Kelly

Christopher Mayhorn
Attaining Least Privilege Through Automatic Partitioning of Hybrid Programs
Lead PI:
William Enck
Abstract

This project investigates the hard problem of resilient architectures from the standpoint of enabling new potential for incorporating privilege separation into computing systems. However, privilege separation alone is insufficient to achieve strong security guarantees. It must also include a security policy for separated components without impacting the functional requirements of the system. The general hypothesis of this project is that, legacy computing systems contain emergent properties that allow automatic software partitioning for privilege separation capable of supporting practical least privilege security policies.

Team

PIs: William Enck & Xiaohui (Helen) Gu
Students: Adwait Nadkami, Tsun-Hsuan (Anson) Ho, Ashwin Shashidharan

William Enck

C3E 2013 Weekly Planning Meeting

Submitted by Lisa Coote on

You have been invited to attend the C3E Weekly Planning Meeting on Friday August 2, 2013 from 12:30PM - 1:30PM. 

Conference Call-In Line:  1-605-475-4350

Access Code:  783 6212

To ensure the the CPS-VO's e-vite capability will work to our standards for C3E 2013, I have created a "test invition" for this week's C3E planning meeting. Please follow the instructions to either Accept or Decline the invitaiton for this week's meeting. Feedback is greatly appreciated!

Thank you!

CMU SoS 2013 Quarterly Lablet PI Meeting

Submitted by Anonymous on

The 2013 third quarter Science of Security quarterly Lablet meeting will be held at Carnegie Mellon University on Thursday, September 26th and Friday, September 27th. The meeting for both days will take place on the CMU Campus in the Gates-Hillman Center room 4405.

The first day will feature open workshop sessions, focused on two topics: (1) Addressing usability and security challenges through design and empirical methods, (2) Addressing challenges of scale through composable modeling and analysis.

 

Subscribe to