TRUST Center Activities Stephen B. Wicker Cornell University TRUST 2nd Year Site Review, March 19th, 2007 Center Activities Focus on creative, collaborative events designed to stimulate and disseminate TRUST research – – – – – Faculty/Student Workshops PhD Student Exchanges Collaborative Publications Collaboration with Government Agencies AFOSR Treasury DHS International Collaboration Industrial Collaboration Distinguished External Advisory Board (DEAB) Center Activities TRUST NSF Site Review, March 19th, 2007 2 Example Workshops Participation from faculty, students, industry, and government. Sensor Networking – – – Electronic Medical Records – – Technology Security Issues Privacy Issues Secure/Privacy-Aware Transport Multi-Level Access Computer Security – – Trustworthy Interfaces Securing E-Commerce Center Activities TRUST NSF Site Review, March 19th, 2007 3 Sensor Networking Workshops Secure Sensor Networks - CMU, May 9 - 10 , 2006 – – Sponsored by TRUST, NSF, ARO Organizers: – Participants: – Adrian Perrig (TRUST/CMU) Karl Levitt (NSF) Radha Poovendran (University of Washington) Cliff Wang (ARO) Yongdae Kim (UMN), Richard Han (University of Colorado, Boulder), Gene Tsudik (UC Irvine), Wade Trappe (Rutgers), Sencun Zhu (Penn State), Jack Stankovic (University of Virginia), Wenliang (Kevin) Du (SUNY Syracuse), Peng Ning (NC State), Steve Wicker (Cornell), Virgil D. Gligor (University of Maryland, College Park), Kevin Fu (UMass Amherst), Yanyong Zhang (Rutgers), Wesley Snyder (Cont, ARL/ARO) Topics – Data Privacy in Ad hoc Networks – WSN Architecture – WSN Attacks and Security – WSN Data Routing/Aggregation Center Activities TRUST NSF Site Review, March 19th, 2007 4 J J Cross Disciplinary Symposium at UC Berkeley, 3-4 November 2006 – – Sponsored by TRUST, Samuelson Law, Technology, and Public Policy Clinic, Boalt School of Law, CITRIS Participants include TRUST faculty; faculty in law, engineering, literature, history, sociology, and geography; ACLU Center Activities TRUST NSF Site Review, March 19th, 2007 5 Sample Talks The Document People: Privacy, Identity, and Continuous Personal Experience Capture – Ian Kerr and Jane Bailey - University of Ottawa Public Privacy: Surveillance of Public Places and the Right to Anonymity – Christopher Slobogin - University of Florida From Citizen to Subject: The Perils of Privacy – Margaret Kohn - University of Florida, Gainesville The Dover Ban: Wartime Control over Images of Public and Private Deaths – Brian Gran - Case Western Reserve University Privacy, Visibility, and Exposure – Julie E. Cohen - Georgetown University Law Center In Defense of Public Places – Deirdre Mulligan - UC Berkeley Visual Privacy in the Collaborative Cyber-infrastructure Environment – Ruzena Bajcsy, UC Berkeley, Katherine Mezur, Mills College Unblinking in Mobile Learning – Alice M. Agogino - UC Berkeley Comments, and Privacy Concerns in New Technologies – Stephen Wicker, Cornell University Center Activities TRUST NSF Site Review, March 19th, 2007 6 Patient Monitoring Workshops Vanderbilt Medical Center and ISIS, September 12, 2006, Nashville – Privacy and Confidentiality Workshop Vanderbilt Center for Better Health, September 13-14, 2006, Nashville – TRUST Participants: Cornell, Stanford, Vanderbilt-ISIS, Biweekly Modeling Working Group meetings – Participants: Vanderbilt Medical School, Cornell, Stanford, Vanderbilt-ISIS, Participants: ISIS, Vanderbilt Medical School, Vanderbilt Medical Center Weekly Stanford-Vanderbilt Telecon Center Activities TRUST NSF Site Review, March 19th, 2007 7 Patient Monitoring Working Meeting Berkeley, Dec 15th, 2006 Participants – Berkeley, Cornell, Vanderbilt, Illinois Faculty and PhD students Discussion Items – – – Uniform and/or interoperable sensor platform Integrated experiment scenario Medical industry collaboration for system deployment and experiment Center Activities TRUST NSF Site Review, March 19th, 2007 8 Patient Monitoring - Results Medical sensor devices and platforms – Berkeley: Several types of medical sensors including accelerometer, ECG, etc. – Vanderbilt: video sensors and Mica2 motes – Cornell: sensors with various communication interfaces Integrated experiment scenario – Body movement sensor triggers the operation of video sensor based on privacy policies better situation awareness policy-driven video delivery Industry and medical center collaboration. – System Deployment and Experiment in Vanderbilt Home Care Services, Inc. - agreement now in place McKendree Village Research issues – Privacy and security in video sensor networks (Berkeley, Cornell Vanderbilt,) – Signal processing and pattern recognition in medical data (Berkeley) – Communication interference between IEEE 802.15.4 and IEEE 802.11 (Cornell, Vanderbilt) OUTCOME: 2007 CyberTRUST Proposal (Illinois, Berkeley, Cornell, Vanderbilt) Center Activities TRUST NSF Site Review, March 19th, 2007 9 Electronic Medical Records Workshop Berkeley April 28th, 2006: – TRUST with UCB School of Public Health, Cal Regional Health Information Office (RHIO), Cornell, and Vanderbilt Medical School Program focii – – – – – EMR Implementation requirements Privacy and Security in EMR David Brailer, key note on Federal mandate Legal and Policy Issues Research Issues Center Activities TRUST NSF Site Review, March 19th, 2007 10 Computer Security Workshops Trustworthy Interfaces for Passwords and Personal Information II - Stanford University, June 19, 2006 Statement of Purpose – – – Users still typically provide personal information and credentials such as passwords the same way they did 30 years ago: through a text interface that they assume they can trust. Purpose: Find an effective solution by bringing together the designers of the cryptographic protocols with the implementers of the user interfaces. Workshop for industry and West Coast Electronic Crime Taskforce Center Activities TRUST NSF Site Review, March 19th, 2007 11 TIPPI 2 Workshop Sample Talks: – Site to User Authentication - Real World End User Results Louie Gasparini, RSA Security – Evolution of The Threat and its Impact on Requirements David Jevans, APWG – Security Skins: The Design and Evaluation of Unspoofable, Embedded Security Indicators Rachna Dhamija, Harvard University – Context-Aware Phishing Attacks and Client-Side Defenses Collin Jackson, Stanford University – Web Wallet: Preventing Phishing Attacks by Revealing User Intention Rob Miller, MIT – Securing The Web Browser: Keeping The Phish In The Sea George Staikos, Staikos – Microsoft InfoCard: Design and Implementation Bill Barnes, Microsoft Corp. – Google Safe Browsing Niels Provos, Google – Outbound Authentication on the Users Terms Phillip Hallam-Baker, Verisign – A "Wholistic" View of Client-Side Anti-Phishing Technologies Zulfikar Ramzan, Symantec Corp. – Graphical Password with Integrated Trustworthy Interface Patricia Lareau, Passfaces – Bharosa Authenticator: Securing OTP Data Over a Compromised Computer Arun Kothonath, Bharosa Center Activities TRUST NSF Site Review, March 19th, 2007 12 Collaboration with US Government Agencies TRUST/AFOSR – – – – – A new spinoff TRUST-related center focused on the needs of Air Force and other military vendors as the GIG/NCES rollout occurs Operating as a PRET with funding of about $1M per year. Emphasis is on mid-term to long-term opportunities, collaboration Includes about 10 TRUST researchers Ongoing dialog with Air Force to help them develop research agendas around the TRUST issues raised by the GIG and NCES. Active dialog in the OIM area; we expect to see them using our technologies in a series of pilot projects in 2007 Center Activities TRUST NSF Site Review, March 19th, 2007 13 Collaboration with US Government Agencies NSF – Helped NSF plan and articulate their need embedded and real-time systems agenda DHS – – DHS has established a center of excellence at SRI which is partnered with TRUST (the PI at SRI Lincoln is a former student of John Mitchell’s). DHS-Cybersecurity Center and TRUST participants have held numerous tech transfer forums for the financial sector including Schwab, Bank of America, Symmantec, Oracle, Sun, … and numerous start ups (usually every 3-4 months). Rodriguez (former USSS) has been the facilitator Center Activities TRUST NSF Site Review, March 19th, 2007 14 Further DHS TRUST Activities Phishing, Spyware and Identity Theft work started with initial seed funding from NSF (PM Maughan) DETER testbed funded with joint NSF/DHS funding. DHS is transitioning the research testbed into an Operational Testbed named DECCOR starting July 2006. Participation in DHS Identity Theft Technology Council John Mitchell (TRUST Stanford) - Member US Secret Service Electronic Crimes Task Force, organizing committee for their quarterly meetings, speaker at last meeting Center Activities TRUST NSF Site Review, March 19th, 2007 15 DHS and TRUST Education TRUST education technology is transitioned under the U.S. Department of Homeland Security (DHS) Competitive Training Grant Program (CTGP). – The Adaptive Cyber-Security Training (ACT) Online will train information assurance personnel – to identify potential sources of threats, to institute the most effective deterrents and to respond and recover to attack . Larry Howard, Vanderbilt-ISIS leads the Vanderbilt team in the project including the University of Memphis and Sparta Inc. Center Activities TRUST NSF Site Review, March 19th, 2007 16 International Collaboration One of TRUST’s central goals: dissemination – – Thrust: international collaboration Focus: small number leading international groups First major collaboration Taiwan – – Authorized by Taiwan legislature Personal attention from Taiwan Minister of State Center Activities TRUST NSF Site Review, March 19th, 2007 17 Taiwan Collaboration About Taiwan – – – – – Internet users14.6 million Broadband users 10.5 million Population 22.7 million In top three Asian software industry and web services industry (with Japan & South Korea) Has a high incident of security incidents Large fraction appear to originate from China Center Activities TRUST NSF Site Review, March 19th, 2007 18 Taiwan groups iCAST: Umbrella for International Collaboration in Advanced Science and Technology Major members – STAG: Science and Technology Advisory Group – – NSC: National Science Council (Taiwan’s NSF) III: Institute for Information Industry – – Public/Private eloectronics industry coordinating group TWISC: Taiwan Information Security Center – Public/Private software industry coordinating group ITRI: Industrial Technology Research Institute – Executive Branch group Personally directed by a Minister-level staff member Modeled on TRUST Major infrastructure groups (telecoms) Government groups (law enforcement, public safety, etc) Center Activities TRUST NSF Site Review, March 19th, 2007 19 Main Thrusts at iCAST-CMU Banks/Streets/etc. Industry/ Government Software Verification Surveillance Remote Mobile Authentication Phones Intrusion Detection Computer Emergency Response Team Coordination Center (CERT/CC) Hackers Strongly tied with Taiwan, and will remain dynamic… Center Activities TRUST NSF Site Review, March 19th, 2007 20 CMU/TRUST Involvement Funded by Taiwan National Science Council NSC) at $1M/year Current Team Members – – – Adrian Perrig, Mike Reiter, Ed Clarke, Peter Lee, Raj Rajkumar, Hui Zhang CERT/CC, training courses Don McGillen, logistics Tsuhan Chen, Director Center Activities TRUST NSF Site Review, March 19th, 2007 21 Other International Efforts Professor Ruth Breu, Dr. Michael Hafner, University of Innsbruck, Austria – – – model-based methods for privacy and security in service architectures; Clinical Information Systems Meetings: Sztipanovits, Breu, Hafner: February 5, 2007, Rome, IT; Ledeczi, Breu, Hafner: February 26, 2007, Innsbruck, Austria Integrated Risk Reduction of Informationbased Infrastructure Systems (IRRIIS) EU Integrative Project. Center Activities TRUST NSF Site Review, March 19th, 2007 22 Industrial Collaboration TRUST Industrial Advisory Board, Berkeley, April 25th, 2006 Partners include IBM, HP, Symmantec, Microsoft, Cisco, Intel,Telecom-Italia, Infineon, United Technologies, BT. Summer Computer Security Course at Stanford for Industry professionals (profs: D. Boneh and J. Mitchell) July 17-20th,2006 Stanford Security Forum for Industry affiliates http://forum.stanford.edu/events/workshop/security Center Activities TRUST NSF Site Review, March 19th, 2007 23 Further Collaboration Robert Wood Johnson Foundation awarded a planning grant to industry and academic institutions for new health design ideas. – Oak Ridge National Laboratory: project design for secure sensor networks. – Vanderbilt-TRUST/ISIS is collaborating with the Vanderbilt Medical School in one of these projects focusing on safe medication of children. Dr. Akos Ledeczi and ISIS-Vanderbilt graduate student interns help in feasibility studies. ESCHER companies (Boeing, Raytheon, General Motors) receive updates on TRUST progress in the area of embedded systems security. Center Activities TRUST NSF Site Review, March 19th, 2007 24 Further Collaboration (TRUST Faculty - Examples) Collaboration with RSA on porting PwdHash to their SecurID product Collaboration with former PayPal employee on web server timing attacks Collaboration with Microsoft on Extended Validation Certificate brower Collaboration with Tata Consultancy Services (TCS) on data privacy Collaboration with VMWare on use of virtualization for recovery from security attacks Interaction with Coverity Inc; used their donated tools for code analysisstudy of web server security Center Activities TRUST NSF Site Review, March 19th, 2007 25 Further Collaboration (TRUST Faculty - Examples) Working with Cisco to help develop more stable, scalable platform options for their large Internet routes (the product division, not the research division). Working with several companies to demonstrate better technologies for building large datacenters, mirror file systems over high-speed but high-latency links, build highly responsive services. – Raytheon, Infosys, Apache consortium (both branches – Red Hat and also WSO2), Intel, MSN (MSFT) Consulted for “the largest Wall Street brokerage” on redesign of an in-house stock market platform that carries out trades for almost 1/3 of the domestic market (their own traffic but also that of their clients, who can trade through their system). Center Activities TRUST NSF Site Review, March 19th, 2007 26 Technology Transition Plans PwdHash: RSA Security (www.pwdhash.com) – – SpyBlock deployment: – – – Available at http://getspyblock.com/ Relevant companies: Mocha5, VMWare Dialog with companies concerned with transaction gen SafeHistory: Microsoft, Mozilla. – Initial integration completed this quarter Hope to convince IE team to embed natively in IE Available at www.safehistory.com Vanderbilt Home Care Services – Deployment of patient monitoring technologies Center Activities TRUST NSF Site Review, March 19th, 2007 27 Center Activities TRUST NSF Site Review, March 19th, 2007 28 Events Associated with Outreach (more in Prof. Bajcsy’s talk) Information Assurance Capacity Building Program at CMU July 5-21, 2006 TRUST Summer Institute for Women “Women’s Institute for Summer Enrichment (WISE)”, July 5 – 11, 2006 TRUST-SUPERB and SIPHER run from June 21st to August 5th for undergraduate research CURIS projects at Stanford: summer work with undergraduates on research related to TRUST Cornell-Smith Research Exchange in Secure Sensor Nets, Fall 2006, Spring 2007 Center Activities TRUST NSF Site Review, March 19th, 2007 29