Design/implementation of Policy and Specification Languages
Language-based techniques have formed the basis of much of our research in security. Of particular interest have been
- Policy languages for expressing security policies at different levels
- Domain-specific languages for specification based and anomaly-based intrusion detection,
- Sound and efficient implementation of these languages.
Our research has developed policy languages and efficient enforcement techniques in the context of untrusted (and potentially malicious) code containment [9, 10, 17, 20], as well as in the context of detecting attacks on benign software [7, 14]. We have also developed new behavior specification languages and efficient runtime monitoring techniques for host-based and network intrusion detection [19, 21, 25, 26, 24].
An important focus of our security policy research is that of coming up with policy languages and/or security policies that are easy to specify, and can compactly represent the relevant security concerns. Closely related to this effort is our research on synthesizing or inferring security policies [10, 11] by observing system behavior, and/or by utilizing other sources of information.
Related Publications
- [1] A New Tag-Based Approach for Real-Time Detection of Advanced Cyber Attacks
PhD Dissertation (Stony Brook University) January, 2022.- [2] On the Effectiveness of Cyber-Attack Campaign Investigation with Reduced Audit Logs
Undergraduate (Honors) Thesis (Stony Brook University) January, 2021.- [3] Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics
IEEE Symposium on Security and Privacy (IEEE S&P) May, 2020.
(A 2-minute demo and the conference presentation are also available.).
, and - [4] HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
IEEE Symposium on Security and Privacy (IEEE S&P) May, 2019.
, , , and - [5] SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
USENIX Security Symposium (USENIX Security) August, 2017. (Talk).
, , , , , , and - [6] WebSheets: Web Applications for Non-Programmers
New Security Paradigms Workshop (NSPW) September, 2015.
and - [7] An Efficient Black-box Technique for Defeating Web Application Attacks
ISOC Network and Distributed Systems Symposium (NDSS) February, 2009.- [8] Fast Packet Classification for Snort
USENIX Large Installation System Administration Conference (LISA) November, 2008.
, and - [9] Expanding Malware Defense by Securing Software Installations
Detection of Intrusions, Malware and Vulnerability Analysis (DIMVA) July, 2008.
, , and - [10] Practical Proactive Integrity Preservation: A Basis for Malware Defense
IEEE Symposium on Security and Privacy (IEEE S&P) May, 2008.
, , and - [11] Inferring Higher Level Policies from Firewall Rules
USENIX Large Installation System Administration Conference (LISA) November, 2007.
, and - [12] A Framework for Building Privacy-Conscious Composite Web Services
IEEE International Conference on Web Services (ICWS) September, 2006. (Application Services and Industry Track).
, , and - [13] On Supporting Active User Feedback in P3P
Secure Knowledge Management Workshop (SKM) September, 2006.
, and - [14] Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
USENIX Security Symposium (USENIX Security) August, 2006. (An earlier version appeared as Technical Report SECLAB-05-06, November 2005. Also supercedes Technical Report SECLAB-05-05 A Unified Approach for Preventing Attacks Exploiting a Range of Software Vulnerabilities, August 2005, and Technical Report SECLAB-05-04 Practical dynamic taint analysis for countering input validation attacks on web applications, May 2005, [PDF]).
, and - [15] An Approach for Realizing Privacy-Preserving Web-Based Services (Poster)
14th International World Wide Web Conference (WWW) May, 2005.
, , and - [16] A Secure Composition Framework for Trustworthy Personal Information Assistants
IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS) April, 2005.
, , and - [17] Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications
ACM Symposium on Operating Systems Principles (SOSP) October, 2003.
, , , and - [18] An approach for Secure Software Installation
USENIX Large Installation System Administration Conference (LISA) November, 2002.
, , , and - [19] Specification-based anomaly detection: a new approach for detecting network intrusions
ACM Conference on Computer and Communications Security (CCS) October, 2002.
, , , , , and - [20] Empowering mobile code using expressive security policies
New Security Paradigms Workshop (NSPW) September, 2002.
, and - [21] Experiences with Specification Based Intrusion Detection System
Recent Advances in Intrusion Detection (RAID) October, 2001.
and - [22] Model-Carrying Code (MCC): A New Paradigm for Mobile-Code Security
New Security Paradigms Workshop (NSPW) September, 2001.
, , and - [23] Model-Based Analysis of Configuration Vulnerabilities
ACM CCS Workshop on Intrusion Detection Systems (WIDS) October, 2000.
and - [24] Building Survivable Systems: An Integrated Approach based on Intrusion Detection and Damage Containment
DISCEX (DISCEX) February, 2000.
, , , , and - [25] A High-Performance Network Intrusion Detection System
ACM Conference on Computer and Communications Security (CCS) November, 1999.
, , and - [26] Synthesizing Fast Intrusion Detection/Prevention Systems from High-Level Specifications
USENIX Security Symposium (USENIX Security) August, 1999.
and - [27] On Preventing Intrusions by Process Behavior Monitoring
USENIX Intrusion Detection Workshop () April, 1999.
, and