IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

IN FOCUS

IEEE SecDev 2016: Prioritizing Secure Development Robert Cunningham | MIT Lincoln Laboratory Pamela Gupta | OutSecure Ulf Lindqvist | SRI International Stelios Sidiroglou-Douskos | MIT Michael Hicks | University of Maryland

D

eveloping software in 2016 is different than it was when IEEE Security & Privacy magazine was founded in 2003. Developers now need to know about the constantly evolving threat landscape, the challenging complexity of systems security, and the accelerating pace of software and system development. Computer attacks in 2003 were rare enough that the term computer worms had to be defined when reported and taxonomies needed to be developed.1,2 Today’s threats are from well-funded militaries and companies with expertise in attacking systems, applications, and data, and the attacks are more varied and common. Back in 2003, Microsoft and Apple released a major OS update roughly every two years, and it took another year or two for it to be installed on the majority of systems. Today, a significant new OS version comes out almost every year, and the ability to share data and services across platforms like smartphones and smart watches is becoming ubiquitous. It’s clear that developers, researchers, and practitioners need a venue to discuss design approaches and tools for building security in and significantly reducing the introduction of vulnerabilities. Great progress is being made in the academic security research community, but research results don’t transition to the engineering and development communities to the necessary extent and at the necessary speed. To address this

82

July/August 2016

Copublished by the IEEE Computer and Reliability Societies

critical need, the IEEE Cybersecurity Initiative is introducing a new event that aims to expand interactions and bridge the gap between cybersecurity research and development: the IEEE Cybersecurity Development Conference (IEEE SecDev). The inaugural IEEE SecDev 2016 Conference will be held on 3–4 November 2016 in Boston.

Conference Focus

Systems and software vulnerabilities continue to jeopardize intellectual property, consumer trust, and business operations and services. A broad spectrum of critical applications and infrastructure, from process control systems to commercial application products, depends on secure, reliable software. SecDev 2016 is designed to provide a proactive and innovative approach to the security challenges in systems of varying size, complexity, and functionality. It’s aimed at bringing different corners of the academic and business worlds’ engineering and security communities together to share the latest research, technical developments, and lessons learned from the front lines of security. Software systems can be built more securely when we understand and apply concepts coming out of research and development to realworld problems facing various areas of functionality and complexity. SecDev is distinguished by its focus on how to build security in— not to simply discover the absence 1540-7993/16/$33.00 © 2016 IEEE

IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

of security. Its goal is to encourage, fingerprints, date or place of birth) in the January/February 2016 issue develop, and disseminate ideas for is stolen too, then users might need of this magazine, “Complexity is the secure system development among to hire companies that monitor ille- worst enemy of security.”4 We’ve both academia and industry. Devel- gal use of identity. known this for decades, yet we conopers have valuable experiences Devices also need security, tinue to invent complex protocols and ideas that can inform academic and with the rise of the Internet and applications in the hopes of research, and researchers have con- of Things, more and more people delivering optimized implementacepts, studies, code, and tools that will be leveraging thermostats, tions. Some companies incorporate could benefit developers. We antici- door locks, lights, and many other metrics that capture important elepate that attendees from academic devices that allow remote control ments of security complexity and conferences like the IEEE seek to design systems Symposium on Security that are inherently more SecDev is a venue for developers, and Privacy, the USENIX secure.5 Some go furresearchers, and practitioners to Security Symposium, ther and leverage formal the ACM SIGPLAN methods to prove that discuss design approaches and Programming Language critical software compotools for building security in. Design and Implemennents or protocol designs tation conference, the are provably correct. ACM SIGSOFT InterWe know that tools national Symposium on the Foun- via mobile devices. The ability to and techniques exist to help build dations of Software Engineering, ensure that your door is locked from secure software. Random fuzzthe International Symposium on a remote location is a useful feature, ing has been surprisingly effective Software Testing and Analysis, the but security vulnerabilities in these in uncovering errors and is heavSymposium on Usable Privacy systems can result in property loss ily used by security researchers. and Security, and many others will and even death. Early research on But because of the state explosion contribute ideas to SecDev, as will these systems have demonstrated problem, random fuzzing has been attendees of industrial conferences significant problems with the design relatively ineffective at generatlike the Open Web Application and implementation of security.3 ing inputs that trigger errors deep Security Project’s AppSec event, For companies, the most valu- inside applications. the RSA Conference, the Black Hat able asset is often intellectual propBy analyzing source code, static Conference, and ShmooCon. erty; intellectual property theft analysis tools can help find potenIn its inaugural year, the confer- can have catastrophic effects for a tially all security bugs—even those ence will run for two full days and business. deep inside complex applications— will blend invited and proposed Failures in key resources, for for certain error classes (for talks and hands-on tutorials by example, power distribution sys- example, buffer overflows). Unforknown experts and leading research- tems and banking systems, can tunately, sound and complete analyers from academia and industry. negatively impact entire economies. sis is shown to be undecidable. SecDev will try to cover portions of In practice, static analysis can be all these areas to give a sense of how made practical by either adopting Understanding important protecting intellectual unsound techniques that lead to Security Failures false negatives or reducing precision The morning of the first day will property is. that leads to false positives. address computer security failures Dynamic analysis techniques and their implications for people, Building Security In devices, companies, and the economy. The first day’s afternoon session will find bugs by analyzing code as it Users feel the impact of security focus on solutions to commonly executes. By focusing on concrete failures primarily because of the encountered security problems. execution traces, dynamic analysis inconvenience they cause. When IEEE SecDev members will start by avoids issues with precision (that passwords are stolen, users need to looking at the state of software and is, false positives) but suffers from reauthenticate and establish new hardware security: What are the insufficient coverage, requiring ones. If users are unwise enough best practices followed by indus- inputs that trigger potentially vulto reuse their password, then they try, and what are the known good nerable functionality. An effective need to do this for every site with secure-design patterns? They will development practice will combine the shared password. If data used for explore design and implementation these tools to find and fix software identity establishment (for instance, of security. As Bruce Schneier wrote before it’s widely deployed. 83

www.computer.org/security

IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

IN FOCUS

Papers and Tutorial Sessions

The morning of the second day will cover more recent research in these areas. Papers will be selected from those submitted to the conference by the program committee assembled by Michael Hicks of the University of Maryland. On the afternoon of the second day, attendees will be able to select from among several parallel tutorial sessions. This mix of tools curated by the tutorial chair, Stelios Sidiroglou-Douskos, represents the core secure-development principles used in industry and academia today. Namely, there are tutorials representing the state of the art in random testing and fuzzing (for instance, Google’s libfuzzer), static analysis—both industrial (Coverity) and academic (DroidSafe6)— and dynamic analysis (MIT’s Lincoln Laboratory’s PANDA framework7). Together, these frameworks and tools form the foundation of secure development. Attendees will greatly benefit from understanding how to incorporate them in their development process. 

T

he general chair for SecDev 2016 is Robert Cunningham, who also leads the IEEE Cybersecurity Initiative. For more information, please visit the SecDev website at www.secdev.ieee.org.

We hope to see you in Boston on 3 and 4 November! References 1. K. Semple, “Computer ‘Worm’ Widely Attacks Windows Versions,” New York Times, 13 Aug. 2003; www.nytimes.com/2003/08/13 /technology/13WORM.html. _________________ 2. N. Weaver et al., “A Taxonomy of Computer Worms,” Proc. ACM Workshop Rapid Malcode (WORM 03), 2003, pp. 11–18. 3. C. Kolias, “Learning Internet-ofThings Security ‘Hands-On,’” IEEE Security & Privacy, vol. 14, no. 1, 2016, pp. 37–46. 4. B. Schneier, “Cryptography Is Harder than It Looks,” IEEE Security & Privacy, vol. 14, no. 1, 2016, pp. 87–88. 5. P. Manadhata and J. Wing, “An Attack Surface Metric,” IEEE Trans. Software Eng., vol. 37, no. 3, 2005, pp. 371–386. 6. M.I. Gordon, “Information-Flow Analysis of Android Applications in DroidSafe,” Network and Distributed System Security Symp. (NDSS 15), 2015. 7. B. Dolan-Gavitt, “Repeatable Reverse Engineering with PANDA,” Proc. ACM 5th Program Protection and Reverse Engineering Workshop, 2015, pp. 1–11. Robert Cunningham is the leader

of the Secure, Resilient Systems and Technology Group at MIT

Lincoln Laboratory. Contact him at ___________________ [email protected]. Pamela Gupta is president and

founder of OutSecure. Contact her at ___________________ [email protected].

Ulf Lindqvist is a program director

in the Computer Science Laboratory at SRI International. Contact him at [email protected]. _____________ Sidiroglou-Douskos is a research scientist in the Computer Science and Artificial Intelligence Laboratory at MIT. Contact him at _____________ [email protected].

Stelios

Michael Hicks is a professor in the

Department of Computer Science at the University of Maryland and is affiliated with the Maryland Cybersecurity Center. Contact him at [email protected]. ____________

Selected CS articles and columns are also available for free at http://ComputingNow.computer.org. ___________________

Subscribe today for the latest in computational science and engineering research, news and analysis, CSE in education, and emerging technologies in the hard sciences.

www.computer.org/cise

84

IEEE Security & Privacy

July/August 2016

IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

IEEE SecDev 2016 - Computer Science and Statistics

Sep 11, 2016 - and even death. Early research on ... The first day's afternoon session will focus on ... the afternoon of the second day, attendees will be able to ...

354KB Sizes 0 Downloads 204 Views

Recommend Documents

IEEE SecDev 2016: Prioritizing Secure Development - Computer ...
Sep 11, 2016 - Security Project's AppSec event, the RSA Conference, the Black Hat. Conference, and ShmooCon. In its inaugural year, the confer- ence will ...

Departments of Statistics and Computer Science ...
and Computer Science. 2. , Purdue ... increased modeling power (ex: power-law degree distribution) ... Na¨ıvely sampling each entry of matrix will take O(n. 2. ) ...

Departments of Statistics and Computer Science ...
and Computer Science. 2. , Purdue University. Abstract ... increased modeling power (ex: power-law degree distribution). • d attributes characterize nodes in the ...

Managers 2016 Computer Science & Information Technology.pdf ...
Managers 2016 Computer Science & Information Technology.pdf. Managers 2016 Computer Science & Information Technology.pdf. Open. Extract. Open with.

Information Science and Statistics - GitHub
Expert Systems. Doucet, de Freitas, and Gordon: Sequential Monte Carlo Methods in Practice. Fine: Feedforward Neural Network Methodology. Hawkins and Olwell: Cumulative Sum ... Library of Congress Control Number: 2006922522 ... that fill in important

2016 IEEE Access.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 2016 IEEE Access.pdf. 2016 IEEE Access.pdf. Open. Extract.

Wireless Location Privacy Protection - IEEE Computer Society
Dec 1, 2003 - dated that, by December 2005, all cellular carriers be able to identify the location of emergency callers using mobile phones to within 50 to 100.

Challenges for Perceptual Computer Applications and ... - IEEE Xplore
Jul 12, 2012 - I. Introduction. The phrase Computing With Words (CWW), originated by Zadeh in 1996 [31], equates fuzzy logic to it (see. Box 1). Oh, if it were ...

Verifying Business Process Compatibility - IEEE Computer Society
We describe a process-algebraic approach to verifying process interactions for business collaboration described in. Business Process Modelling Notation.

Dualism, Science, and Statistics
Dualism, Science, and Statistics ... Published By: American Institute of Biological Sciences .... can either collect more data or revise our research hypothe- sis.

2016 BPS Computer Science Instruction For All.pdf
WHEREAS, Science, technology, engineering, and mathematics (STEM) jobs currently. comprise the fastest growing job sector, and according to the Bureau of ...

Advanced Placement Computer Science A – 2016
10-50 points each. Projects. 50-100 points each. Cheating. You are responsible for creating your own programs! Any program which has duplicate ownership/authorship will have the grade divided ... All make up work, assignments, daily completed notes a

2016 Career Chat Computer Science 8.5x11.pdf
2016 Career Chat Computer Science 8.5x11.pdf. 2016 Career Chat Computer Science 8.5x11.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying ...

12-computer-science-quarterly-answer-key-2016.pdf
www.nammakalvi.weebly.com. Page 3 of 9. 12-computer-science-quarterly-answer-key-2016.pdf. 12-computer-science-quarterly-answer-key-2016.pdf. Open.

MCA Computer Science Regulations 2016-17 Onwards.pdf ...
MCA Computer Science Regulations 2016-17 Onwards.pdf. MCA Computer Science Regulations 2016-17 Onwards.pdf. Open. Extract. Open with. Sign In.

M.Sc Computer Science Regulations 2016-17 Onwards.pdf ...
M.Sc Computer Science Regulations 2016-17 Onwards.pdf. M.Sc Computer Science Regulations 2016-17 Onwards.pdf. Open. Extract. Open with. Sign In.

2016 BPS Computer Science Instruction For All.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 2016 BPS ...

Faculty of Computer Science - Final exams schedule - Spring 2016 ...
Modeling & Simulation L3 + L4 ... Computer Architecture L1 + L2. Decision ... Displaying Faculty of Computer Science - Final exams schedule - Spring 2016.pdf.

Project Guidelines - Department of Computer Science and ...
The project work for M.E. / M.Tech. consists of Phase – I and Phase – II. Phase – I is to be under taken during III semester and Phase – II, which is a continuation ...

Noorul Islam University Computer Science and Engineering ...
Security issues include protecting data from unauthorized access and viruses. 3. ... Using HDB3, encode the bit stream 10000000000100. ... Displaying Noorul Islam University Computer Science and Engineering Computer Networks.pdf.

Kings Engineering College Computer Science and Engineering ...
Kings Engineering College Computer Science and Engineering Sem 8 Information Security.pdf. Kings Engineering College Computer Science and Engineering ...

Computer Science and Engg Information Science Engg..pdf
Page 3 of 4. -Computer Science and Engg Information Science Engg..pdf. -Computer Science and Engg Information Science Engg..pdf. Open. Extract. Open with.

. Computer Science and Engg Information Science Engg..pdf ...
Page 3 of 4 . Computer Science and Engg Information Science Engg..pdf . Computer Science and Engg Information Science Engg..pdf. Open. Extract. Open with.