SlideShare a Scribd company logo
1 of 24
Computer Security Innovation 
IMHO 
Presented for your consideration by: Fred Seigneur 
Copies of the Power Point file are available at: 
wfredsr@SecureComputingInnovationForum.org
2014 Cybersecurity Innovation 
Forum 
 In January 2014, I attended the 2014 
Cybersecurity Innovation Forum, in 
Baltimore. 
 One reason I attended was that I was 
impressed with the Forum’s stated vision.
2014 Cybersecurity Innovation 
Forum – Background and Vision 
In spite of this insightful and accurate assessment that our current approach to 
Cybersecurity is unsustainable, and non-scalable, rather little innovation to 
“define and embrace a fundamentally different approach to enterprise architecture 
security – one that builds security in from the beginning as a robust and solid 
foundation upon which to conduct our transactions” was presented.
Foundational Weaknesses 
 Helms Deep 
Photo Source
Foundational Weaknesses 
Photo Source 
Such weaknesses exist, but are poorly understood and generally ignored
Computer Security - Defense in Depth 
Helms Deep had Defense in Depth 
Photo Source
Computer Security - Defense in Depth 
But, the fatal flaw was in the foundation 
Photo Source
The Root(s) of the Problem 
 Today’s Operating Systems are not secure 
and are too complex to secure by retrofit. 
 Few Operating Systems or Applications 
are rugged. 
 Don’t verify inputs. 
 Crash leaving attack vectors for malicious 
code. 
 Most current security “solutions” are 
“Band-Aid” approaches.
Operating Systems and Applications 
Lack a Basic Immune System 
 Like someone who must be 
protected by an external 
bubble 
 What’s wrong with this 
picture? 
 David Vetter, a young boy from Texas, 
lived his life - in a plastic bubble. 
Nicknamed "Bubble Boy," David was born 
in 1971 with severe combined 
immunodeficiency, and was forced to live in 
a specially constructed sterile plastic 
bubble from birth until he died at age 12. 
(The photo is from a movie based, 
inappropriately, on David’s plight.) Photo Source
Foundational Immune System Deficiencies 
 Two very serious foundational software 
problems 
 Operating Systems 
 Applications Software 
 Both of these have the same root cause 
 Software Developers do not write robust 
code. Why? 
 They don’t know how 
 They don’t know why it’s important 
 They did not learn how, or why it’s so critical
Foundational Immune 
Deficiencies (Cont.) 
 Two very serious foundational 
educational problems 
 Software developers have NOT been 
taught why or how to write robust and 
defensive code. 
 Many CS Professors don’t know how to 
write robust and defensive code, or why it 
is necessary to teach it.
Long Term Solutions 
 Better Education 
 Better Computer Security Education 
 Better CS and Engineering Education 
 Include Basic Computer Security Education 
Thread in Virtually All University/College 
Departments 
 Create Demand for Foundational Security 
Solutions 
 IT Procurement Authorities & Staff 
 Users 
 University/College Accreditation Authorities
How Can This be Done? 
 Some Universities understand these 
issues 
 A few Educational Institutions have 
realized that they can differentiate 
themselves in the educational market by 
implementing steps such as those above.
The Current State of Cyber 
Security Practice 
 Patch known holes 
 Hope we fixed ALL the holes
Small leaks can get bigger and 
some still remain undetected
But, then … 
It is not IF your dam will break, it’s WHEN
Plan Ahead 
 Your dam WILL break 
 Start planning a downstream dam ASAP 
 Existing components, available today, can be 
integrated to create a Secure Computing 
InFrastructure (SCIF*) 
* SCIF – A compartmentalized infrastructure for 
processing sensitive information
Secure Computing Infrastructure (SCIF) 
 The SCIF can be used in an embedded system (such as IoT , Smart 
Grid, SDN White Box Switches) or as an SDN Controller and executes 
Erlang functions as transactions. One envisioned SCIF application is 
as a Secure Network Interface Function (SNIF), which can be used to 
authenticate inputs to and outputs from a secure enclave. With two or 
more SCIF boards in a system, fault tolerance is supported using 
Erlang fault tolerance. 
 A Trusted SCIF Interactive Development Environment (SIDE) for SCIF 
applications, based on SysML and a SCIF Management System (SMS) 
for Administration of the SCIF and SNIF are supported via Erlang 
running on a virtualized instance of Linux, atop seL4 and will be fault 
tolerant, using Erlang's inherent fault tolerance capabilities 
 The SCIF architecture can be used to host other Linux applications in a 
more trusted and fault tolerant environment than with off the shelf 
Linux. 
 Block diagrams for the SCIF hardware and software follow.
Recent Progress 
 The Parallella board seems ideally suited for the SCIF 
prototype. 
 The Erlang Virtual Machine runs on the Adaptiva 
Epiphany chip. 
 The secure seL4 microkernel runs on the ARM Cortex 
A9 in the XILINX ZYNQ portion of the Parallella along 
with drivers, TCP/IP protocol processing and the 
Secure Network Interface Function. 
 A SCIF is used to 
 Applications run securely on the Epiphany in Erlang, a 
functional programming language that supports soft 
real-time, like a Software Defined Networking (SDN) 
controller
Photos of Parallella 16 Core Board 
Top View 
Bottom View
Parallella Cluster
Parallella Architecture
Secure Computing Infrastructure 
Software Architecture 
User Mode Partitions 
ARM Cortex A9 on XILIX ZYNQ Adaptiva Epiphany Multi Processor 
Trusted 
Device 
Drivers 
Separation Kernel (seL4) 
Hardware w/Trusted Platform Module (TPM) 
Kernel 
Mode 
Trusted 
Encryption 
Services 
Secure 
Network 
Interface 
Function 
Erlang 
Virtual 
Machine 
Code 
Erlang 
Byte 
Code 
Program 1 
Erlang 
Byte 
Code 
Program n
Phased Integration Plan 
 Phase I - Proof of Concept/Prototype 
Demonstration 
 Phase II - Field Trials 
Visit our LinkedIn group, the 
Secure Computing Infrastructure Foundation

More Related Content

What's hot

Blind spots in the network.pdf
Blind spots in the network.pdfBlind spots in the network.pdf
Blind spots in the network.pdfDivyeshMDesai
 
Security Best Practices for Mobile Development @ Dreamforce 2013
Security Best Practices for Mobile Development @ Dreamforce 2013Security Best Practices for Mobile Development @ Dreamforce 2013
Security Best Practices for Mobile Development @ Dreamforce 2013Tom Gersic
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
Gloriolesoft Consulting Security and Privacy Offering
Gloriolesoft Consulting Security and Privacy Offering Gloriolesoft Consulting Security and Privacy Offering
Gloriolesoft Consulting Security and Privacy Offering Debasis Chakraborty
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
Omer FarukARIK-CCNA-20-11-2021-certificate.pdf
Omer FarukARIK-CCNA-20-11-2021-certificate.pdfOmer FarukARIK-CCNA-20-11-2021-certificate.pdf
Omer FarukARIK-CCNA-20-11-2021-certificate.pdfOmerFaruk32
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsBlrDroid
 
What Makes a Good CISO
What Makes a Good CISOWhat Makes a Good CISO
What Makes a Good CISOStephen Cobb
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android SecurityAsanka Dilruk
 
85320337 networking-case-study
85320337 networking-case-study85320337 networking-case-study
85320337 networking-case-studyhomeworkping3
 
Iis Security Programming Countermeasures
Iis Security Programming CountermeasuresIis Security Programming Countermeasures
Iis Security Programming Countermeasuresguestc27cd9
 
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6Knowledge & Experience
 
Mobile Browser Content Handling
Mobile Browser Content HandlingMobile Browser Content Handling
Mobile Browser Content HandlingDenim Group
 

What's hot (20)

Blind spots in the network.pdf
Blind spots in the network.pdfBlind spots in the network.pdf
Blind spots in the network.pdf
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Security Best Practices for Mobile Development @ Dreamforce 2013
Security Best Practices for Mobile Development @ Dreamforce 2013Security Best Practices for Mobile Development @ Dreamforce 2013
Security Best Practices for Mobile Development @ Dreamforce 2013
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
It
ItIt
It
 
Gloriolesoft Consulting Security and Privacy Offering
Gloriolesoft Consulting Security and Privacy Offering Gloriolesoft Consulting Security and Privacy Offering
Gloriolesoft Consulting Security and Privacy Offering
 
ESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure AuthenticationESET is introducing its brand new product ESET Secure Authentication
ESET is introducing its brand new product ESET Secure Authentication
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Omer FarukARIK-CCNA-20-11-2021-certificate.pdf
Omer FarukARIK-CCNA-20-11-2021-certificate.pdfOmer FarukARIK-CCNA-20-11-2021-certificate.pdf
Omer FarukARIK-CCNA-20-11-2021-certificate.pdf
 
Ite pc v40_chapter9
Ite pc v40_chapter9Ite pc v40_chapter9
Ite pc v40_chapter9
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android Applications
 
Ite pc v40_chapter10
Ite pc v40_chapter10Ite pc v40_chapter10
Ite pc v40_chapter10
 
What Makes a Good CISO
What Makes a Good CISOWhat Makes a Good CISO
What Makes a Good CISO
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android Security
 
Ibrahim aledeene
Ibrahim aledeeneIbrahim aledeene
Ibrahim aledeene
 
85320337 networking-case-study
85320337 networking-case-study85320337 networking-case-study
85320337 networking-case-study
 
Iis Security Programming Countermeasures
Iis Security Programming CountermeasuresIis Security Programming Countermeasures
Iis Security Programming Countermeasures
 
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
 
Mobile Browser Content Handling
Mobile Browser Content HandlingMobile Browser Content Handling
Mobile Browser Content Handling
 

Similar to Cyber security innovation imho v5

Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on VehiclesPriyanka Aash
 
Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...
Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...
Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...HostedbyConfluent
 
Securing Public Web Servers
Securing Public Web ServersSecuring Public Web Servers
Securing Public Web Serverswebhostingguy
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JSFestUA
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hWilheminaRossi174
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMScscpconf
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left SecurityBATbern
 
Tech You Oughta Know - BlackBerry_Cylance.pptx
Tech You Oughta Know - BlackBerry_Cylance.pptxTech You Oughta Know - BlackBerry_Cylance.pptx
Tech You Oughta Know - BlackBerry_Cylance.pptxPhilip Moroni
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDJames Wickett
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateAndy Bochman
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtityAhmed Sallam
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...United Security Providers AG
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris WysopalThreat Stack
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applicationseightbit
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeDenim Group
 
Oracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for SecurityOracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for SecurityChris Muir
 

Similar to Cyber security innovation imho v5 (20)

Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...
Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...
Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...
 
Securing Public Web Servers
Securing Public Web ServersSecuring Public Web Servers
Securing Public Web Servers
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
Tech You Oughta Know - BlackBerry_Cylance.pptx
Tech You Oughta Know - BlackBerry_Cylance.pptxTech You Oughta Know - BlackBerry_Cylance.pptx
Tech You Oughta Know - BlackBerry_Cylance.pptx
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Jsse
JsseJsse
Jsse
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security Update
 
Db2z bp security_transcript
Db2z bp security_transcriptDb2z bp security_transcript
Db2z bp security_transcript
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security Knowledge
 
Oracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for SecurityOracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for Security
 

More from W Fred Seigneur

1995 roads report_broschure-the_advent_of_client-server_telephony_networks
1995 roads report_broschure-the_advent_of_client-server_telephony_networks1995 roads report_broschure-the_advent_of_client-server_telephony_networks
1995 roads report_broschure-the_advent_of_client-server_telephony_networksW Fred Seigneur
 
Secure Computing Architecture for Medical Software System Application
Secure Computing Architecture for Medical Software System ApplicationSecure Computing Architecture for Medical Software System Application
Secure Computing Architecture for Medical Software System ApplicationW Fred Seigneur
 
Ashburn medical group screens
Ashburn medical group screensAshburn medical group screens
Ashburn medical group screensW Fred Seigneur
 
Fred GWU Grad Certificate class project
Fred GWU Grad Certificate class projectFred GWU Grad Certificate class project
Fred GWU Grad Certificate class projectW Fred Seigneur
 
Kick starter project secure computing infrastructure for real-time embedded ...
Kick starter project  secure computing infrastructure for real-time embedded ...Kick starter project  secure computing infrastructure for real-time embedded ...
Kick starter project secure computing infrastructure for real-time embedded ...W Fred Seigneur
 
Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4W Fred Seigneur
 
Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4W Fred Seigneur
 
Cyber security innovation_imho v3
Cyber security innovation_imho v3Cyber security innovation_imho v3
Cyber security innovation_imho v3W Fred Seigneur
 
Cyber securityinnovationimho v3
Cyber securityinnovationimho v3Cyber securityinnovationimho v3
Cyber securityinnovationimho v3W Fred Seigneur
 

More from W Fred Seigneur (12)

1995 roads report_broschure-the_advent_of_client-server_telephony_networks
1995 roads report_broschure-the_advent_of_client-server_telephony_networks1995 roads report_broschure-the_advent_of_client-server_telephony_networks
1995 roads report_broschure-the_advent_of_client-server_telephony_networks
 
Secure Computing Architecture for Medical Software System Application
Secure Computing Architecture for Medical Software System ApplicationSecure Computing Architecture for Medical Software System Application
Secure Computing Architecture for Medical Software System Application
 
Ashburn medical group screens
Ashburn medical group screensAshburn medical group screens
Ashburn medical group screens
 
Db relationships
Db relationshipsDb relationships
Db relationships
 
Mamouth white paper
Mamouth white paperMamouth white paper
Mamouth white paper
 
Fred GWU Grad Certificate class project
Fred GWU Grad Certificate class projectFred GWU Grad Certificate class project
Fred GWU Grad Certificate class project
 
Kick starter project secure computing infrastructure for real-time embedded ...
Kick starter project  secure computing infrastructure for real-time embedded ...Kick starter project  secure computing infrastructure for real-time embedded ...
Kick starter project secure computing infrastructure for real-time embedded ...
 
Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4
 
Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4Cyber Security Innovation IMHO v4
Cyber Security Innovation IMHO v4
 
Cyber security innovation_imho v3
Cyber security innovation_imho v3Cyber security innovation_imho v3
Cyber security innovation_imho v3
 
Cyber securityinnovationimho v3
Cyber securityinnovationimho v3Cyber securityinnovationimho v3
Cyber securityinnovationimho v3
 
Kingdom ofgod
 Kingdom ofgod Kingdom ofgod
Kingdom ofgod
 

Cyber security innovation imho v5

  • 1. Computer Security Innovation IMHO Presented for your consideration by: Fred Seigneur Copies of the Power Point file are available at: wfredsr@SecureComputingInnovationForum.org
  • 2. 2014 Cybersecurity Innovation Forum  In January 2014, I attended the 2014 Cybersecurity Innovation Forum, in Baltimore.  One reason I attended was that I was impressed with the Forum’s stated vision.
  • 3. 2014 Cybersecurity Innovation Forum – Background and Vision In spite of this insightful and accurate assessment that our current approach to Cybersecurity is unsustainable, and non-scalable, rather little innovation to “define and embrace a fundamentally different approach to enterprise architecture security – one that builds security in from the beginning as a robust and solid foundation upon which to conduct our transactions” was presented.
  • 4. Foundational Weaknesses  Helms Deep Photo Source
  • 5. Foundational Weaknesses Photo Source Such weaknesses exist, but are poorly understood and generally ignored
  • 6. Computer Security - Defense in Depth Helms Deep had Defense in Depth Photo Source
  • 7. Computer Security - Defense in Depth But, the fatal flaw was in the foundation Photo Source
  • 8. The Root(s) of the Problem  Today’s Operating Systems are not secure and are too complex to secure by retrofit.  Few Operating Systems or Applications are rugged.  Don’t verify inputs.  Crash leaving attack vectors for malicious code.  Most current security “solutions” are “Band-Aid” approaches.
  • 9. Operating Systems and Applications Lack a Basic Immune System  Like someone who must be protected by an external bubble  What’s wrong with this picture?  David Vetter, a young boy from Texas, lived his life - in a plastic bubble. Nicknamed "Bubble Boy," David was born in 1971 with severe combined immunodeficiency, and was forced to live in a specially constructed sterile plastic bubble from birth until he died at age 12. (The photo is from a movie based, inappropriately, on David’s plight.) Photo Source
  • 10. Foundational Immune System Deficiencies  Two very serious foundational software problems  Operating Systems  Applications Software  Both of these have the same root cause  Software Developers do not write robust code. Why?  They don’t know how  They don’t know why it’s important  They did not learn how, or why it’s so critical
  • 11. Foundational Immune Deficiencies (Cont.)  Two very serious foundational educational problems  Software developers have NOT been taught why or how to write robust and defensive code.  Many CS Professors don’t know how to write robust and defensive code, or why it is necessary to teach it.
  • 12. Long Term Solutions  Better Education  Better Computer Security Education  Better CS and Engineering Education  Include Basic Computer Security Education Thread in Virtually All University/College Departments  Create Demand for Foundational Security Solutions  IT Procurement Authorities & Staff  Users  University/College Accreditation Authorities
  • 13. How Can This be Done?  Some Universities understand these issues  A few Educational Institutions have realized that they can differentiate themselves in the educational market by implementing steps such as those above.
  • 14. The Current State of Cyber Security Practice  Patch known holes  Hope we fixed ALL the holes
  • 15. Small leaks can get bigger and some still remain undetected
  • 16. But, then … It is not IF your dam will break, it’s WHEN
  • 17. Plan Ahead  Your dam WILL break  Start planning a downstream dam ASAP  Existing components, available today, can be integrated to create a Secure Computing InFrastructure (SCIF*) * SCIF – A compartmentalized infrastructure for processing sensitive information
  • 18. Secure Computing Infrastructure (SCIF)  The SCIF can be used in an embedded system (such as IoT , Smart Grid, SDN White Box Switches) or as an SDN Controller and executes Erlang functions as transactions. One envisioned SCIF application is as a Secure Network Interface Function (SNIF), which can be used to authenticate inputs to and outputs from a secure enclave. With two or more SCIF boards in a system, fault tolerance is supported using Erlang fault tolerance.  A Trusted SCIF Interactive Development Environment (SIDE) for SCIF applications, based on SysML and a SCIF Management System (SMS) for Administration of the SCIF and SNIF are supported via Erlang running on a virtualized instance of Linux, atop seL4 and will be fault tolerant, using Erlang's inherent fault tolerance capabilities  The SCIF architecture can be used to host other Linux applications in a more trusted and fault tolerant environment than with off the shelf Linux.  Block diagrams for the SCIF hardware and software follow.
  • 19. Recent Progress  The Parallella board seems ideally suited for the SCIF prototype.  The Erlang Virtual Machine runs on the Adaptiva Epiphany chip.  The secure seL4 microkernel runs on the ARM Cortex A9 in the XILINX ZYNQ portion of the Parallella along with drivers, TCP/IP protocol processing and the Secure Network Interface Function.  A SCIF is used to  Applications run securely on the Epiphany in Erlang, a functional programming language that supports soft real-time, like a Software Defined Networking (SDN) controller
  • 20. Photos of Parallella 16 Core Board Top View Bottom View
  • 23. Secure Computing Infrastructure Software Architecture User Mode Partitions ARM Cortex A9 on XILIX ZYNQ Adaptiva Epiphany Multi Processor Trusted Device Drivers Separation Kernel (seL4) Hardware w/Trusted Platform Module (TPM) Kernel Mode Trusted Encryption Services Secure Network Interface Function Erlang Virtual Machine Code Erlang Byte Code Program 1 Erlang Byte Code Program n
  • 24. Phased Integration Plan  Phase I - Proof of Concept/Prototype Demonstration  Phase II - Field Trials Visit our LinkedIn group, the Secure Computing Infrastructure Foundation