Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU.
Post on 11-Jan-2016
213 Views
Preview:
Transcript
Information Systems and Internet Security (ISIS) Lab
Research overview and some recent projects
Nasir MemonPolytechnic Institute of NYU
ISIS - Highlights
8 faculty members in program More than a dozen Ph.D. students
More than a dozen specialized courses in security
More than over $10 million in funding over the last 3 years
Host of NSA/NSF Cyber Corps Program (SFS) NSA Center of Excellence in IA Education, NSA Center of Excellence in IA research
One of the premier cyber security programs in US
Cyber Corps Group - 2006
ISIS - Research AreasH
ardware for Secure Systems Trusted hardware, hardware obfuscation, Gigabit IDS/IPS, DDoS defense.
Multimedia Security Image forensics, digital watermarking, steganography and steganalysis
Software Security Static analysis, software obfuscation
Host Security Disk forensics, secure virtualization
Network Security Infection detection, Ad-hoc networks, network forensics.
Cyber Corps Group - 2005
Secure Device Pairing
Fundamental Security Objective: How to bootstrap secure communication between Alice’s and Bob’s
devices when they have no prior context
no common trusted CA or TTP
Examples:
Pairing a bluetooth cell phone with a headset
Pairing a WiFi laptop with an access point
Solution Idea:make use of a physical channel between devices
with least involvement from Alice and Bob
Out-Of-Band (OOB): Audio, Visual or Tactile
Faculty: NiteshSaxena; Funded by NSF
Research Challenges
OOB channels are low-bandwidth
Devices may be constrained in terms of interfaces, e.g., access points, headsets
implanted wireless devices
User is constrained - Usability
Multiple devices Sensor network initialization
Group formation
Ohh! I cannot even pair my
socks!
Other Ongoing Projects
RFID Security and Privacy
Mobile Phone Assisted Usable Password Authentication
Fault-Tolerant User-Centric Security Services (with Yevgeniy Dodis)
Privacy of Web Search
Inference of Private Attributes on Facebook (with Keith Ross)
More info: http://cis.poly.edu/~nsaxena/research.html
Media Forensics
Media Forgery Detection
Many aspects to the problem
Scanner-Model
Media Forensics
Identification of Synthetic media
Media Source Identification
Camera-Model
Source-Model
Identification
Individual Source
Identification
Scanner
Camera
Contributions
CFA DetectorLens ProcessingFilters
Color InterpolationColor InterpolationGamma CorrectionGamma Correction
White Point CorrectionWhite Point CorrectionColor ConversionColor Conversion
CompressionCompression
Developed novel techniques to collect, attribute and authenticate image (video) evidence.
Funded by NSA, NIJ, AFOSR
Camera Imaging Pipeline
Trusted and Secure Hardware (Trusted and Secure Hardware (towards building hardware towards building hardware root of trust)root of trust)
RameshKarri (rkarri@poly.edu) ECE Department
Ph. D. students
A. Kanuparthi and R. Guo: Trusted Platform Modules
J. Rajendran: Hardware Trojans
J. Li: Circuit Obfuscation
K. Rosenfeld: Secure Testing
J. Quan: Hardware Sidechannels
Supported by: Air Force Research Labs, NSF, Army, Cisco Systems
Embedded Devices – Trust?Embedded Devices – Trust?
Approach – Trusted Platform Modules Approach – Trusted Platform Modules (TPM)(TPM)
RNG
RSA key gen.
SHA-1
Signature engine
Crypto Processor Non-volatile memory
Endorsement key
Storage root key
Volatile memory
PCRs
Attestation keys
Storage keys
TPM: ongoing researchTPM: ongoing research
High performance vs Low cost vs Low Power vs Application Specific
Prototypes successfully tested on different application scenarios Redesign smart grid elements (smart meters, grid sensor
platforms and grid control elements) Deployment in pilot studies will uncover practical kinks…
top related