Vulnerability Elimination
نویسنده
چکیده
Today’s computer systems are large and complex. ere have been tremendous research eorts to fully defend these systems, but it is still an elusive goal. Introducing radical design changes for security is not practical, or adding a small security enhancing component easily breaks the critical functionality of a system. Even if these issues are resolved, aackers are ever evolving, and they always nd a vulnerability from tiny lile corner cases. My research focuses on building secure systems. In particular, my approach can be characterized by a practical prospect with a strong understanding on both aacks and computer systems. With the deep knowledge on aacks, my research comprehensively identied the root cause of underlying vulnerabilities, and built security solutions completely eliminating causes [1, 2]. Further, my research analyzed emerging security issues that are newly introduced in modern system’s design and implementation [6, 9, 12], which enlightened to formulate the principle of secure system designs. I have also proposed aack countermeasures [3, 7, 8], which protects the system from being compromised. In addition, with the thorough understanding of computer systems, many of these techniques are carefully designed to scale to large and complex systems including Chrome, Firefox, the Linux kernel, and the Android OS, and already demonstrated its eectiveness. My research results are recognized for their highly practical impacts, as noted by the Internet Defense Prize (awarded by Facebook and USENIX) and the best applied research paper (awarded by CSAW). Moreover, my research soware has been deployed as part of the security infrastructure in Google and Mozilla, and widely covered in popular medias including ZDNet, Science 2.0, Phys.org, etc. In addition, my research results discovered and accordingly xed more than 100 highly critical security vulnerabilities in various soware, such as the Linux kernel, Chrome, Firefox, Safari, and etc., and received several vulnerability discovery gis and awards in recognition of helping to secure their products. Further, undertaking these security problems brought pleasant interdisciplinary collaboration experiences beyond the security research domain: compilers [1, 2]; systems [3, 9]; programming languages [8]; networks [11]; and data mining [4].
منابع مشابه
Scenario-Based Markovian Modeling of Web-System Availability Considering Attacks on Vulnerabilities
In the paper we simulate web-system availability taking into account security aspects and different maintenance scenarios. As a case study we have developed two Markov’s models. These models simulate availability of a multitier web-system considering attacks on DNS vulnerabilities in additional to system failures due to hardware/software (HW/SW) faults. Proposed Markov’s model use attacks rate ...
متن کاملTowards a Formal Framework of Vulnerability to Climate Change
There is confusion regarding the notion of “vulnerability” in the climate change scientific community. Recent research has identified a need for formalisation, which would support accurate communication and the elimination of misunderstandings that result from ambiguous interpretations. Moreover, a formal framework of vulnerability is a prerequisite for computational approaches to its assessmen...
متن کاملCharacterizing Types of Human Mobility to Inform Differential and Targeted Malaria Elimination Strategies in Northeast Cambodia
Human population movements currently challenge malaria elimination in low transmission foci in the Greater Mekong Subregion. Using a mixed-methods design, combining ethnography (n = 410 interviews), malariometric data (n = 4996) and population surveys (n = 824 indigenous populations; n = 704 Khmer migrants) malaria vulnerability among different types of mobile populations was researched in the ...
متن کاملReentrant waves and their elimination in a model of mammalian ventricular tissue.
The vulnerability to reentrant wave propagation, its characteristics (period, meander, and stability), the effects of rotational transmural anisotropy, and the control of reentrant waves by small amplitude perturbations and large amplitude defibrillating shocks are investigated theoretically and numerically for models based on high order, stiff biophysically derived excitation equations.
متن کاملDetection of Malicious User in Oracle 10g DBMS and Cost of Elimination
One major difficulty faced by organizations is the protection of data against malicious access. Six security mechanisms, namely, authentication, authorization, access control, auditing, encryption and integrity control are available in Oracle 10g database management systems (DBMS). These are implemented for protecting data. These typical database security mechanisms are not able to detect and h...
متن کاملMechanisms for the genesis of paroxysmal atrial fibrillation in the Wolff Parkinson-White syndrome: intrinsic atrial muscle vulnerability vs. electrophysiological properties of the accessory pathway.
BACKGROUND Paroxysmal atrial fibrillation (PAF) develops in up to one-third of patients with the Wolff Parkinson-White syndrome (WPW). The reason for this high incidence of PAF in the WPW syndrome is not yet clearly understood. When PAF appears in patients with WPW syndrome who have anterograde conduction via the accessory pathway (AP), it may be life-threatening if an extremely rapid ventricul...
متن کامل