[talks] Sergiy Popovych will be presenting his General Exam on Tuesday, May 3, 2016 at 2pm in CS 402.

Nicki Gotsis ngotsis at CS.Princeton.EDU
Wed Apr 27 15:27:39 EDT 2016

Sergiy Popovych will be presenting his General Exam on Tuesday, May 3, 2016 at 2pm in CS 402.

The members of his committee are David August (adviser), Nick Feamster and Arvind Narayanan.

Everyone is invited to attend his talk, and those faculty wishing to remain for the oral exam following are welcome to do so.  His abstract and reading list follow below.

As has been demonstrated time and again, almost all systems can be compromised. Connecting to an external network through a unidirectional gateway physically disallows any outgoing traffic, and thus prevents data theft. Existing unidirectional gateways act as stateless links, only supporting inherently unidirectional applications. In an attempt to support applications that require request/response behavior (e.g. web browsing), Starlight adds a second, bidirectionally connected machine not entrusted with sensitive information, which improves usability but makes the system vulnerable to attacks involving the user (e.g. phishing, insider attacks). This work demonstrates the benefit of making unidirectional gateways stateful. The proposed solution, Moonshine, uses this state to pre-cache content from the external network, after which an illusion of request/reply behavior can be achieved, thus partially supporting such applications as web browsing and software updates without compromising security.

[1] Ross J. Anderson. 2008. Security Engineering: A Guide to Building Dependable Distributed Systems (2 ed.). Wiley Publishing. (Chapters 2, 3, 4, 6, 8, 9, 21)
[2] Asaf Shabtai, Yuval Elovici, Lior Rokach. 2012. A Survey of Data Leakage Detection and Prevention Solutions. Springer US.

[1] J. H. Saltzer, D. P. Reed, and D. D. Clark. 1984. End-to-end arguments in system design. ACM Trans. Comput. Syst. 2, 4 (November 1984), 277-288. 
[2] David L. Chaum. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (February 1981), 84-90.
[3] M. H. Kang and I. S. Moskowitz, "A Pump for rapid, reliable, secure communication", Proc. ACM Conf. Computer Commun. Security, pp. 119-129, 1993.
[4] M. Anderson, C. North, J. Griffin, R. Milner, J. Yesberg and K. Yiu, "Starlight: Interactive Link," Computer Security Applications Conference, 1996., 12th Annual, San Diego, CA, 1996, pp. 55-63.
[5] R. T. Barker and C. J. Cheese, "The application of data diodes for securely connecting nuclear power plant safety systems to the corporate IT network," System Safety, incorporating the Cyber Security Conference 2012, 7th IET International Conference on, Edinburgh, 2012, pp. 1-6.
[6] B. S. Jeon and J. C. Na, "A study of cyber security policy in industrial control system using data diodes," 2016 18th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, 2016, pp. 314-317.
[7] J. Epstein, "Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing," 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), Miami Beach, FL, 2006, pp. 301-320.
[8] Eric Byres. 2013. The air gap: SCADA's enduring security myth. Commun. ACM 56, 8 (August 2013), 29-31
[9] Butler W. Lampson. 1973. A note on the confinement problem. Commun. ACM 16, 10 (October 1973), 613-615.
[10] A. Wool. 2004. A Quantitative Study of Firewall Configuration Errors. Computer 37, 6 (June 2004), 62-67.

More information about the talks mailing list