Vulnerability Elimination

نویسنده

  • Byoungyoung Lee
چکیده

Today’s computer systems are large and complex. Œere have been tremendous research e‚orts to fully defend these systems, but it is still an elusive goal. Introducing radical design changes for security is not practical, or adding a small security enhancing component easily breaks the critical functionality of a system. Even if these issues are resolved, aŠackers are ever evolving, and they always €nd a vulnerability from tiny liŠle corner cases. My research focuses on building secure systems. In particular, my approach can be characterized by a practical prospect with a strong understanding on both aŠacks and computer systems. With the deep knowledge on aŠacks, my research comprehensively identi€ed the root cause of underlying vulnerabilities, and built security solutions completely eliminating causes [1, 2]. Further, my research analyzed emerging security issues that are newly introduced in modern system’s design and implementation [6, 9, 12], which enlightened to formulate the principle of secure system designs. I have also proposed aŠack countermeasures [3, 7, 8], which protects the system from being compromised. In addition, with the thorough understanding of computer systems, many of these techniques are carefully designed to scale to large and complex systems including Chrome, Firefox, the Linux kernel, and the Android OS, and already demonstrated its e‚ectiveness. My research results are recognized for their highly practical impacts, as noted by the Internet Defense Prize (awarded by Facebook and USENIX) and the best applied research paper (awarded by CSAW). Moreover, my research so‰ware has been deployed as part of the security infrastructure in Google and Mozilla, and widely covered in popular medias including ZDNet, Science 2.0, Phys.org, etc. In addition, my research results discovered and accordingly €xed more than 100 highly critical security vulnerabilities in various so‰ware, such as the Linux kernel, Chrome, Firefox, Safari, and etc., and received several vulnerability discovery gi‰s and awards in recognition of helping to secure their products. Further, undertaking these security problems brought pleasant interdisciplinary collaboration experiences beyond the security research domain: compilers [1, 2]; systems [3, 9]; programming languages [8]; networks [11]; and data mining [4].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scenario-Based Markovian Modeling of Web-System Availability Considering Attacks on Vulnerabilities

In the paper we simulate web-system availability taking into account security aspects and different maintenance scenarios. As a case study we have developed two Markov’s models. These models simulate availability of a multitier web-system considering attacks on DNS vulnerabilities in additional to system failures due to hardware/software (HW/SW) faults. Proposed Markov’s model use attacks rate ...

متن کامل

Towards a Formal Framework of Vulnerability to Climate Change

There is confusion regarding the notion of “vulnerability” in the climate change scientific community. Recent research has identified a need for formalisation, which would support accurate communication and the elimination of misunderstandings that result from ambiguous interpretations. Moreover, a formal framework of vulnerability is a prerequisite for computational approaches to its assessmen...

متن کامل

Characterizing Types of Human Mobility to Inform Differential and Targeted Malaria Elimination Strategies in Northeast Cambodia

Human population movements currently challenge malaria elimination in low transmission foci in the Greater Mekong Subregion. Using a mixed-methods design, combining ethnography (n = 410 interviews), malariometric data (n = 4996) and population surveys (n = 824 indigenous populations; n = 704 Khmer migrants) malaria vulnerability among different types of mobile populations was researched in the ...

متن کامل

Reentrant waves and their elimination in a model of mammalian ventricular tissue.

The vulnerability to reentrant wave propagation, its characteristics (period, meander, and stability), the effects of rotational transmural anisotropy, and the control of reentrant waves by small amplitude perturbations and large amplitude defibrillating shocks are investigated theoretically and numerically for models based on high order, stiff biophysically derived excitation equations.

متن کامل

Detection of Malicious User in Oracle 10g DBMS and Cost of Elimination

One major difficulty faced by organizations is the protection of data against malicious access. Six security mechanisms, namely, authentication, authorization, access control, auditing, encryption and integrity control are available in Oracle 10g database management systems (DBMS). These are implemented for protecting data. These typical database security mechanisms are not able to detect and h...

متن کامل

Mechanisms for the genesis of paroxysmal atrial fibrillation in the Wolff Parkinson-White syndrome: intrinsic atrial muscle vulnerability vs. electrophysiological properties of the accessory pathway.

BACKGROUND Paroxysmal atrial fibrillation (PAF) develops in up to one-third of patients with the Wolff Parkinson-White syndrome (WPW). The reason for this high incidence of PAF in the WPW syndrome is not yet clearly understood. When PAF appears in patients with WPW syndrome who have anterograde conduction via the accessory pathway (AP), it may be life-threatening if an extremely rapid ventricul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015