BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Protecting Programs During Resource Retrieval - Professor Trent Ja
 eger\, CSE Department\, Pennsylvania State University
DTSTART:20140429T140000Z
DTEND:20140429T150000Z
UID:TALK51898@talks.cam.ac.uk
CONTACT:Laurent Simon
DESCRIPTION:*Abstract:*\nPrograms must retrieve many system resources to e
 xecute properly\, but\nthere are several classes of vulnerabilities that m
 ay befall programs\nduring resource retrieval.  These vulnerabilities are 
 difficult for\nprogrammers to eliminate because their cause is external to
  the\nprogram: adversaries may control the inputs used to build names\,\nn
 amespaces used to find the target resources\, and the target resources\nth
 emselves to trick victim programs to retrieve resources of the\nadversarie
 s' choosing.  In this talk\, I will present a system\nmechanism\, called t
 he Process Firewall\, that protects programs from\nvulnerabilities during 
 resource retrieval by introspecting into	\nrunning programs to enforce con
 text-specific rules.  Our key insight\nis that using introspection to prev
 ent such vulnerabilities is safe\nbecause we only aim to protect processes
 \, relying on access control to\nconfine malicious processes.  I will show
  that the Process Firewall\ncan prevent many types of vulnerabilities duri
 ng resource retrieval\,\nincluding those involving race conditions.  I wil
 l also show how to\nperform such introspection and enforcement efficiently
 \, incurring much\nlower overhead than equivalent program defenses.  Final
 ly\, I will\ndescribe a conceptual model that describes the conditions for
  safe\nresource retrieval\, and outline how to produce enforceable rules f
 rom\nthat model.  By following this model\, we find that the Process\nFire
 wall mechanism can prevent many vulnerabilities during resource\nretrieval
  without causing false	positives.\n\n*Bio:*\nTrent Jaeger is a Professor i
 n the Computer Science and Engineering\nDepartment at The Pennsylvania Sta
 te University and the Co-Director of\nthe Systems and Internet Infrastruct
 ure Security Lab.  Trent's\nresearch interests include systems security an
 d the application of\nprogramming language techniques to improve security.
   He has published\nover 100 referreed papers on these topics and the book
  "Operating\nSystems Security\," which examines the principles behind secu
 re\noperating systems designs.  Trent has made a variety of contributions\
 nto open source systems security\, particularly to the Linux Security\nMod
 ules framework\, SELinux\, integrity measurement in Linux\, and the\nXen s
 ecurity architecture.  He is currently the Chair of the ACM\nSpecial Inter
 est Group on Security\, Audit\, and Control (SIGSAC) and\nProgram Chair of
  ASIACCS 2014.  Trent has an M.S. and a Ph.D. from the\nUniversity of Mich
 igan\, Ann Arbor in Computer Science and Engineering\nin 1993 and 1997\, r
 espectively\, and spent nine years at IBM Research\nprior to joining Penn 
 State.\n\n\n
LOCATION:Lecture Theatre 2\, Computer Laboratory\, William Gates Building
END:VEVENT
END:VCALENDAR
