Cyber Security Research under CFIT - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Cyber Security Research under CFIT

Description:

Cyber Security Research under CFIT – PowerPoint PPT presentation

Number of Views:38
Avg rating:3.0/5.0
Slides: 12
Provided by: nr94358
Category:

less

Transcript and Presenter's Notes

Title: Cyber Security Research under CFIT


1
Cyber Security Research under CFIT
  • S. Felix Wu
  • Computer Science Department
  • University of California, Davis
  • wu_at_cs.ucdavis.edu
  • http//seclab.cs.ucdavis.edu

2
Security Research at UCD
  • 20 Faculty members plus 40 PhD students
  • Variety of cyber security research from
    cryptography, system, architecture, hardware
    software, society/community, to networking and
    distributed systems
  • Only can highlight very few in this talk

3
Prof. Hao Chen his PhD students
UDP Packets
Victim (410) 555-1980
4
DETER/EMISTa national security test-bed
Internet BGP Playback
DETER
ipsec tunnels
5
Todays Internet
FROMMR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho
Branch 171 Shaukiwan Road Hong Kong. Please
contact me on my personal box puicheungcheungpui_at_
yahoo.com Let me start by introducing myself. I
am Mr. Cheung Pui,director of operations of the
Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a
obscured business suggestion for you. Before the
U.S and Iraqi war our client Major Fadi Basem who
was with the Iraqi forces and also business man
made a numbered fixed deposit for 18
calendar months, with a value of Twenty Four
millions Five Hundred Thousand United State
Dollars only in my branch. Upon maturity several
notice was sent to him,
6
Future Internet
  • M from Cheung Pui
  • ? Probably a spam
  • M from Cheung Pui via GGCS mailing list
  • ? Probably not interesting
  • M from Cheung Pui via Felix Wu
  • ? Better be more serious (at least I hope)

F
A
B
F
F
7
Intel/UCD GENI workshop
  • Global Environment for Network Innovation

8
How to catch worms
9
Minos/Dacoda
  • Security-enhanced Virtual Machine
  • Capturing Internet worms over public Internet for
    two years without ANY signatures
  • Zero false positive and empirically zero false
    negative
  • Control flow Hijack attacks

10
Only one false positive
11
Two DoD MURI awards
  • Announced on March 7, 2007
  • ARSENAL A Cross Layer Architecture for Secure
    Resilient Tactical Mobile ad hoc Networks
    (Mohapatra/Levitt/Wu)
  • Helix A Self-Regenerative Architecture for the
    Incorruptible Enterprise (Chen/Rowe/Su/Wu)
Write a Comment
User Comments (0)
About PowerShow.com