[en] The world is becoming an immense critical information infrastructure, with the fast and increasing entanglement of utilities, telecommunications, Internet, cloud, and the emerging IoT tissue. This may create enormous opportunities, but also brings about similarly extreme security and dependability risks. We predict an increase in very sophisticated targeted attacks, or advanced persistent threats (APT), and claim that this calls for expanding the frontier of security and dependability methods and techniques used in our current CII. Extreme threats require extreme defenses: we propose resilience as a unifying paradigm to endow systems with the capability of dynamically and automatically handling extreme adversary power, and sustaining perpetual and unattended operation. In this position paper, we present this vision and describe our methodology, as well as the assurance arguments we make for the ultra-resilient components and protocols they enable, illustrated with case studies in progress.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
VERISSIMO, Paulo ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
VOLP, Marcus ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
DECOUCHANT, Jérémie ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Rocha, Francisco; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Co-auteurs externes :
no
Langue du document :
Anglais
Titre :
Meeting the Challenges of Critical and Extreme Dependability and Security
Date de publication/diffusion :
2017
Nom de la manifestation :
22nd Pacific Rim International Symposium on Dependable Computing
Date de la manifestation :
22-01-2017 to 25-01-2017
Titre de l'ouvrage principal :
Proceedings of the 22nd Pacific Rim International Symposium on Dependable Computing
R. N. Charette, This car runs on code, http://spectrum. ieee. org/transportation/systems/this-car-runs-on-code, Accessed: 2016-06-10.
S. C. Misra and V. C. Bhavsar, "Relationships between selected software measures and latent bug-density: Guidelines for improving quality, " in Proceedings of the 2003 International Conference on Computational Science and Its Applications: PartI, ser. ICCSA'03, Montreal, Canada: Springer-Verlag, 2003, pp. 724-732.
S. H. Kan, Metrics and Models in Software Quality Engineering, 2nd. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc., 2002.
E. N. of Excellence ReSIST, Public deliverables.
A. Bessani, P. Sousa, M. Correia, N. F. Neves, and P. Verissimo, "The crutial way of critical infrastructure protection, " IEEE Security and Privacy, vol. 6, no. 6, pp. 44-51, Nov/Dec 2008., Dec. 2008.
A. Fawaz, R. Berthier, W. H. Sanders, and P. Pal, "Understanding the role of automated response actions in improving ami resiliency, " in Proceedings of the NIST Cybersecurity for Cyber-Physical Systems Workshop, Gaithersburg, Maryland, Apr. 2012, pp. 23-24.
B. Donohue, NSA director Rogers urges cyber-resiliency, https: / / threatpost . com / nsa-director-rogers-urges-cyber-resiliency/108292/, Accessed: 2016-10-6.
P. Verissimo, "Travelling through wormholes: A new look at distributed systems models, " SIGACT News, no. 37, pp. 66-81, 2006.
G. S. Veronese, M. Correia, A. N. Bessani, L. C. Lung, and P. Verissimo, "Efficient byzantine fault-tolerance, " IEEE Trans. Comput., vol. 62, no. 1, pp. 16-30, Jan. 2013.
R. Kapitza, J. Behl, C. Cachin, T. Distler, S. Kuhnle, S. V. Mohammadi, W. Schröder-Preikschat, and K. Stengel, "Cheapbft: Resource-efficient byzantine fault tolerance, " in Proceedings of the 7th ACM European Conference on Computer Systems, ser. EuroSys '12, Bern, Switzerland: ACM, 2012, pp. 295-308.
A. Bessani, J. Sousa, and E. E. P. Alchieri, "State machine replication for the masses with bft-smart, " in Proceedings of the 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, ser. DSN '14, Washington, DC, USA: IEEE Computer Society, 2014, pp. 355-362.
M. Castro and B. Liskov, "Practical byzantine fault tolerance, " in Proceedings of the Third Symposium on Operating Systems Design and Implementation, ser. OSDI '99, New Orleans, Louisiana, USA: USENIX Association, 1999, pp. 173-186.
P. Sousa, A. Bessani, M. Correia, N. F. Neves, and P. Verissimo, "Highly available intrusion-tolerant services with proactive-reactive recovery, " IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 4, pp. 452-465, Apr. 2010.
V. Costan and S. Devadas, "Intel SGX explained, " Massachusetts Institute of Technology, Tech. Rep., 2016, https://eprint. iacr. org/2016/086. pdf (Accessed: 2016-07-22).
O. S. Hofmann, S. Kim, A. M. Dunn, M. Z. Lee, and E. Witchel, "Inktag: Secure applications on an untrusted operating system, " in ASPLOS, 2013.
T. Alves and D. Felton, "TrustZone: Integrated hardware and software security, " ARM white paper, vol. 3, no. 4, pp. 18-24, 2004.
N. Weichbrodt, A. Kurmus, P. Pietzuch, and R. Kapitza, "Asyncshock: Exploting synchronisation bugs in intel SGX enclaves, " in Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS 2016), to appear, 2016.
Y. Xu, W. Cui, and M. Peinado, "Controlled-channel attacks: Deterministic side channels for untrusted operating systems, " in IEEE Symposium on Security and Privacy, 2015, pp. 640-656.
L. Sweeney, "Simple demographics often identify people uniquely, " Health (San Francisco), vol. 671, pp. 1-34, 2000.
M. Gymrek, A. L. McGuire, D. Golan, E. Halperin, and Y. Erlich, "Identifying personal genomes by surname inference, " Science, vol. 339, no. 6117, pp. 321-324, 2013.
A. Bessani, J. Brandt, M. Bux, V. Cogo, L. Dimitrova, J. Dowling, A. Gholami, K. Hakimzadeh, M. Hummel, M. Ismail, et al., "Biobankcloud: A platform for the secure storage, sharing, and processing of large biomedical data sets, " in Workshop on Data Management and Analytics for Medicine and Healthcare, 2015.
E. Ayday, J. L. Raisaro, U. Hengartner, A. Molyneaux, and J.-P. Hubaux, "Privacy-preserving processing of raw genomic data, " in Data Privacy Management and Autonomous Spontaneous Security, 2014, pp. 133-147.
V. V. Cogo, A. Bessani, F. M. Couto, and P. Verissimo, "A high-throughput method to detect privacy-sensitive human genomic data, " in ACM Workshop on Privacy in the Electronic Society, 2015.
A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, "Depsky: Dependable and secure storage in a cloud-of-clouds, " in Proceedings of the Sixth Conference on Computer Systems, 2011.
H. Li and R. Durbin, "Fast and accurate short read alignment with burrows-wheeler transform, " Bioinformatics, vol. 25, no. 14, pp. 1754-1760, 2009.
B. Langmead, C. Trapnell, M. Pop, S. L. Salzberg, et al., "Ultrafast and memory-efficient alignment of short dna sequences to the human genome, " Genome biol, vol. 10, no. 3, R25, 2009.
Y. Huang, D. Evans, J. Katz, and L. Malka, "Faster secure twoparty computation using garbled circuits., " in USENIX Security Symposium, vol. 201, 2011.
E. De Cristofaro, S. Faber, and G. Tsudik, "Secure genomic testing with size-and position-hiding private substring matching, " in Proc. of the 12th ACM Workshop on Privacy in the Electronic Society, 2013, pp. 107-118.
X. Leroy, "Formal verification of a realistic compiler, " Commun. ACM, vol. 52, no. 7, pp. 107-115, 2009.
G. Klein, K. Elphinstone, G. Heiser, et al., "Sel4: Formal verification of an OS kernel, " in SOSP 2009, ACM, 2009, pp. 207-220.
B. Barras, "Sets in Coq, Coq in sets, " Journal of Formalized Reasoning, vol. 3, no. 1, pp. 29-48, 2010.
R. Kumar, R. Arthan, M. O. Myreen, and S. Owens, "Selfformalisation of higher-order logic-semantics, soundness, and a verified implementation, " J. Autom. Reasoning, vol. 56, no. 3, pp. 221-259, 2016.
A. W. Appel, "Verified software toolchain-(invited talk), " in ESOP 2011, ser. LNCS, vol. 6602, Springer, 2011, pp. 1-17.
R. Kumar, M. O. Myreen, M. Norrish, and S. Owens, "Cakeml: A verified implementation of ML, " in POPL'14, ACM, 2014, pp. 179-192.
Y. K. Tan, M. O. Myreen, R. Kumar, A. C. J. Fox, S. Owens, and M. Norrish, "A new verified compiler backend for cakeml, " in ICFP 2016, ACM, 2016, pp. 60-73.
C. Hawblitzel, J. Howell, J. R. Lorch, A. Narayan, B. Parno, D. Zhang, and B. Zill, "Ironclad apps: End-to-end security via automated full-system verification, " in OSDI '14, USENIX Association, 2014, pp. 165-181.
L. Beringer, A. Petcher, K. Q. Ye, and A. W. Appel, "Verified correctness and security of openssl HMAC, " in USENIX Security 15, USENIX Association, 2015, pp. 207-221.
J. R. Wilcox, D. Woos, P. Panchekha, Z. Tatlock, X. Wang, M. D. Ernst, and T. E. Anderson, "Verdi: A framework for implementing and formally verifying distributed systems, " in PLDI 2015, ACM, 2015, pp. 357-368.
N. Schiper, V. Rahli, R. van Renesse, M. Bickford, and R. L. Constable, "Developing correctly replicated databases using formal tools, " in DSN 2014, IEEE Computer Society, 2014, pp. 395-406.
C. Hawblitzel, J. Howell, M. Kapritsos, J. R. Lorch, B. Parno, M. L. Roberts, S. T. V. Setty, and B. Zill, "Ironfleet: Proving practical distributed systems correct, " in SOSP 2015, ACM, 2015, pp. 1-17.