IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

IN FOCUS

IEEE SecDev 2016: Prioritizing Secure Development Robert Cunningham | MIT Lincoln Laboratory Pamela Gupta | OutSecure Ulf Lindqvist | SRI International Stelios Sidiroglou-Douskos | MIT Michael Hicks | University of Maryland

D

eveloping software in 2016 is different than it was when IEEE Security & Privacy magazine was founded in 2003. Developers now need to know about the constantly evolving threat landscape, the challenging complexity of systems security, and the accelerating pace of software and system development. Computer attacks in 2003 were rare enough that the term computer worms had to be defined when reported and taxonomies needed to be developed.1,2 Today’s threats are from well-funded militaries and companies with expertise in attacking systems, applications, and data, and the attacks are more varied and common. Back in 2003, Microsoft and Apple released a major OS update roughly every two years, and it took another year or two for it to be installed on the majority of systems. Today, a significant new OS version comes out almost every year, and the ability to share data and services across platforms like smartphones and smart watches is becoming ubiquitous. It’s clear that developers, researchers, and practitioners need a venue to discuss design approaches and tools for building security in and significantly reducing the introduction of vulnerabilities. Great progress is being made in the academic security research community, but research results don’t transition to the engineering and development communities to the necessary extent and at the necessary speed. To address this

82

July/August 2016

Copublished by the IEEE Computer and Reliability Societies

critical need, the IEEE Cybersecurity Initiative is introducing a new event that aims to expand interactions and bridge the gap between cybersecurity research and development: the IEEE Cybersecurity Development Conference (IEEE SecDev). The inaugural IEEE SecDev 2016 Conference will be held on 3–4 November 2016 in Boston.

Conference Focus

Systems and software vulnerabilities continue to jeopardize intellectual property, consumer trust, and business operations and services. A broad spectrum of critical applications and infrastructure, from process control systems to commercial application products, depends on secure, reliable software. SecDev 2016 is designed to provide a proactive and innovative approach to the security challenges in systems of varying size, complexity, and functionality. It’s aimed at bringing different corners of the academic and business worlds’ engineering and security communities together to share the latest research, technical developments, and lessons learned from the front lines of security. Software systems can be built more securely when we understand and apply concepts coming out of research and development to realworld problems facing various areas of functionality and complexity. SecDev is distinguished by its focus on how to build security in— not to simply discover the absence 1540-7993/16/$33.00 © 2016 IEEE

IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

of security. Its goal is to encourage, fingerprints, date or place of birth) in the January/February 2016 issue develop, and disseminate ideas for is stolen too, then users might need of this magazine, “Complexity is the secure system development among to hire companies that monitor ille- worst enemy of security.”4 We’ve both academia and industry. Devel- gal use of identity. known this for decades, yet we conopers have valuable experiences Devices also need security, tinue to invent complex protocols and ideas that can inform academic and with the rise of the Internet and applications in the hopes of research, and researchers have con- of Things, more and more people delivering optimized implementacepts, studies, code, and tools that will be leveraging thermostats, tions. Some companies incorporate could benefit developers. We antici- door locks, lights, and many other metrics that capture important elepate that attendees from academic devices that allow remote control ments of security complexity and conferences like the IEEE seek to design systems Symposium on Security that are inherently more SecDev is a venue for developers, and Privacy, the USENIX secure.5 Some go furresearchers, and practitioners to Security Symposium, ther and leverage formal the ACM SIGPLAN methods to prove that discuss design approaches and Programming Language critical software compotools for building security in. Design and Implemennents or protocol designs tation conference, the are provably correct. ACM SIGSOFT InterWe know that tools national Symposium on the Foun- via mobile devices. The ability to and techniques exist to help build dations of Software Engineering, ensure that your door is locked from secure software. Random fuzzthe International Symposium on a remote location is a useful feature, ing has been surprisingly effective Software Testing and Analysis, the but security vulnerabilities in these in uncovering errors and is heavSymposium on Usable Privacy systems can result in property loss ily used by security researchers. and Security, and many others will and even death. Early research on But because of the state explosion contribute ideas to SecDev, as will these systems have demonstrated problem, random fuzzing has been attendees of industrial conferences significant problems with the design relatively ineffective at generatlike the Open Web Application and implementation of security.3 ing inputs that trigger errors deep Security Project’s AppSec event, For companies, the most valu- inside applications. the RSA Conference, the Black Hat able asset is often intellectual propBy analyzing source code, static Conference, and ShmooCon. erty; intellectual property theft analysis tools can help find potenIn its inaugural year, the confer- can have catastrophic effects for a tially all security bugs—even those ence will run for two full days and business. deep inside complex applications— will blend invited and proposed Failures in key resources, for for certain error classes (for talks and hands-on tutorials by example, power distribution sys- example, buffer overflows). Unforknown experts and leading research- tems and banking systems, can tunately, sound and complete analyers from academia and industry. negatively impact entire economies. sis is shown to be undecidable. SecDev will try to cover portions of In practice, static analysis can be all these areas to give a sense of how made practical by either adopting Understanding important protecting intellectual unsound techniques that lead to Security Failures false negatives or reducing precision The morning of the first day will property is. that leads to false positives. address computer security failures Dynamic analysis techniques and their implications for people, Building Security In devices, companies, and the economy. The first day’s afternoon session will find bugs by analyzing code as it Users feel the impact of security focus on solutions to commonly executes. By focusing on concrete failures primarily because of the encountered security problems. execution traces, dynamic analysis inconvenience they cause. When IEEE SecDev members will start by avoids issues with precision (that passwords are stolen, users need to looking at the state of software and is, false positives) but suffers from reauthenticate and establish new hardware security: What are the insufficient coverage, requiring ones. If users are unwise enough best practices followed by indus- inputs that trigger potentially vulto reuse their password, then they try, and what are the known good nerable functionality. An effective need to do this for every site with secure-design patterns? They will development practice will combine the shared password. If data used for explore design and implementation these tools to find and fix software identity establishment (for instance, of security. As Bruce Schneier wrote before it’s widely deployed. 83

www.computer.org/security

IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

IN FOCUS

Papers and Tutorial Sessions

The morning of the second day will cover more recent research in these areas. Papers will be selected from those submitted to the conference by the program committee assembled by Michael Hicks of the University of Maryland. On the afternoon of the second day, attendees will be able to select from among several parallel tutorial sessions. This mix of tools curated by the tutorial chair, Stelios Sidiroglou-Douskos, represents the core secure-development principles used in industry and academia today. Namely, there are tutorials representing the state of the art in random testing and fuzzing (for instance, Google’s libfuzzer), static analysis—both industrial (Coverity) and academic (DroidSafe6)— and dynamic analysis (MIT’s Lincoln Laboratory’s PANDA framework7). Together, these frameworks and tools form the foundation of secure development. Attendees will greatly benefit from understanding how to incorporate them in their development process. 

T

he general chair for SecDev 2016 is Robert Cunningham, who also leads the IEEE Cybersecurity Initiative. For more information, please visit the SecDev website at www.secdev.ieee.org.

We hope to see you in Boston on 3 and 4 November! References 1. K. Semple, “Computer ‘Worm’ Widely Attacks Windows Versions,” New York Times, 13 Aug. 2003; www.nytimes.com/2003/08/13 /technology/13WORM.html. _________________ 2. N. Weaver et al., “A Taxonomy of Computer Worms,” Proc. ACM Workshop Rapid Malcode (WORM 03), 2003, pp. 11–18. 3. C. Kolias, “Learning Internet-ofThings Security ‘Hands-On,’” IEEE Security & Privacy, vol. 14, no. 1, 2016, pp. 37–46. 4. B. Schneier, “Cryptography Is Harder than It Looks,” IEEE Security & Privacy, vol. 14, no. 1, 2016, pp. 87–88. 5. P. Manadhata and J. Wing, “An Attack Surface Metric,” IEEE Trans. Software Eng., vol. 37, no. 3, 2005, pp. 371–386. 6. M.I. Gordon, “Information-Flow Analysis of Android Applications in DroidSafe,” Network and Distributed System Security Symp. (NDSS 15), 2015. 7. B. Dolan-Gavitt, “Repeatable Reverse Engineering with PANDA,” Proc. ACM 5th Program Protection and Reverse Engineering Workshop, 2015, pp. 1–11. Robert Cunningham is the leader

of the Secure, Resilient Systems and Technology Group at MIT

Lincoln Laboratory. Contact him at ___________________ [email protected]. Pamela Gupta is president and

founder of OutSecure. Contact her at ___________________ [email protected].

Ulf Lindqvist is a program director

in the Computer Science Laboratory at SRI International. Contact him at [email protected]. _____________ Sidiroglou-Douskos is a research scientist in the Computer Science and Artificial Intelligence Laboratory at MIT. Contact him at _____________ [email protected].

Stelios

Michael Hicks is a professor in the

Department of Computer Science at the University of Maryland and is affiliated with the Maryland Cybersecurity Center. Contact him at [email protected]. ____________

Selected CS articles and columns are also available for free at http://ComputingNow.computer.org. ___________________

Subscribe today for the latest in computational science and engineering research, news and analysis, CSE in education, and emerging technologies in the hard sciences.

www.computer.org/cise

84

IEEE Security & Privacy

July/August 2016

IEEE

SECURITY& PRIVACY

Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page

M q M q

M q

MqM q THE WORLD’S NEWSSTAND®

IEEE SecDev 2016: Prioritizing Secure Development - Computer ...

Sep 11, 2016 - Security Project's AppSec event, the RSA Conference, the Black Hat. Conference, and ShmooCon. In its inaugural year, the confer- ence will ...

354KB Sizes 1 Downloads 202 Views

Recommend Documents

IEEE SecDev 2016 - Computer Science and Statistics
Sep 11, 2016 - and even death. Early research on ... The first day's afternoon session will focus on ... the afternoon of the second day, attendees will be able to ...

Secure Mobile Ad hoc Routing - IEEE Xplore
In mobile ad hoc networks (MANETs), multi-hop mes- sage relay is the common way for nodes to communicate and participate in network operations, making ...

Adaptive Air-to-Ground Secure Communication System ... - IEEE Xplore
Corresponding author, e-mail: [email protected]. Abstract—A novel ... hardware setup for the ADS-B based ATG system is analytically established and ...

Secure Software Development Model
I. INTRODUCTION oftware security is to engineer software in such a ... During development system is presented to security analyst ..... Network sniffers used by ...

Adaptive Air-to-Ground Secure Communication System ... - IEEE Xplore
May 12, 2016 - technology has been conceived to be an unauthenticated and unencrypted signal ... of ADS-B signal suffers from the following security vulnera-.

Prioritizing Requirements
especially be true of safety and security requirements, which are specifically ..... Engineering Institute is a federally funded research and development center.

2016 IEEE Access.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 2016 IEEE Access.pdf. 2016 IEEE Access.pdf. Open. Extract.

Secure PHP Development _ Building 50 Practical Applications.pdf ...
tracking, and business applications. • Mature as a PHP developer by. using software practices as part. of your design, development, and. software life cycle ...

Wireless Location Privacy Protection - IEEE Computer Society
Dec 1, 2003 - dated that, by December 2005, all cellular carriers be able to identify the location of emergency callers using mobile phones to within 50 to 100.

Verifying Business Process Compatibility - IEEE Computer Society
We describe a process-algebraic approach to verifying process interactions for business collaboration described in. Business Process Modelling Notation.

ISIE-2016 - IEEE Industrial Electronics Society
Feb 23, 2015 - We propose to show tentative session titles in the Call for Papers announcement. This way, we hope to reduce the number of submissions that do not fit the ... The ISIE-2016 conference theme: “Industrial Electronics for the ...

call for participation - IEEE RCIS 2016
RESEARCH CHALLENGES in INFORMATION SCIENCE ... The workshop is about creating better testing and maintenance practices through a focus ... Kiran Lakhotia, CREST Department of Computer Science, University College London.

call for participation - IEEE RCIS 2016
acceptance by the March 24th 2013. Authors are invited to submit talks proposal in English. Each submitted talk proposal will have to be associated to one of the ...

ISIE-2016 - IEEE Industrial Electronics Society
Feb 23, 2015 - IES technical committees (TC) will define the program. ... We propose to show tentative session titles in the Call for Papers announcement. ... The ISIE-2016 conference theme: “Industrial Electronics for the Internet of Things.

Interactive_ The Top Programming Languages 2016 - IEEE ...
Interactive_ The Top Programming Languages 2016 - IEEE Spectrum.pdf. Interactive_ The Top Programming Languages 2016 - IEEE Spectrum.pdf. Open.

secure java for web application development pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. secure java for ...

secure java for web application development pdf
development pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. secure java for web application development pdf.

Detecting Malicious JavaScript Code in Mozilla - IEEE Computer Society
tive information to unauthorized parties (e.g., phishing at- tacks). We propose an approach to solve this problem that is based on monitoring JavaScript code execution and com- paring the execution to high-level policies, to detect mali- cious code b