Bertino Named Editor-in-Chief of Top IEEE Journal

Bertino Named Editor-in-Chief of Top IEEE Journal


Bertino Named Editor-in-Chief of Top IEEE Journal

Posted: 30 Oct 2013 10:54 AM PDT

Elisa Bertino, a CERIAS Fellow, professor of computer science at Purdue University and acting research director for the Center for Education and Research in Information Assurance and Security, was named editor-in-chief of IEEE Transactions on Secure and Dependable Computing. Bertino received the IEEE Computer Society Technical Achievement Award in 2002 for outstanding contributions to database systems and database security and advanced data management systems, and the 2005 Tsutomu Kanai Award for pioneering and innovative research contributions to secure distributed systems. IEEE Computer Society produces peer-reviewed, technical journals, magazines, books, and conference publications, in addition to online courses, certification programs, conferences, career development services, and networking opportunities. IEEE Computer Society publications are led and governed by the Publications Board, which includes operations committees for each publishing line. The IEEE Computer Society provides up-to-date, easily accessible information for computing professionals, and serves as a source for technology information, inspiration and collaboration.

Lessons from the First Major Computer Virus

Posted: 30 Oct 2013 10:53 AM PDT

Eugene Spafford, one of the first to analyze the Morris Worm, says we haven't learned from it or other major security breaches since. More information »

The Evolution of IT Security Ethics

Posted: 30 Oct 2013 10:52 AM PDT

Purdue's Spafford on Building Trust with the Public More information »

Spafford calls for more manager, employee accountability (Federal News Radio)

Spafford calls for more manager, employee accountability (Federal News Radio)


Spafford calls for more manager, employee accountability (Federal News Radio)

Posted: 16 Oct 2013 11:14 AM PDT

The one action that may make the most difference in how federal agencies secure their computer networks involves no new whiz-bang technology. It has no up-front real-dollar costs either. More information »

Spaf on Security

Posted: 16 Oct 2013 11:10 AM PDT

He was one of the first computer scientists to dissect the game-changing worm that hit the Internet 25 years ago and took down thousands of computers. He's also credited for defining software forensics and shaping other security technologies. But Eugene "Spaf" Spafford says security still isn't taken seriously enough today. More information »

Sypris Expands Indiana-based Research Center

Sypris Expands Indiana-based Research Center


Sypris Expands Indiana-based Research Center

Posted: 11 Oct 2013 06:15 AM PDT

John Walsh, president of Sypris Electronics LLC, speaks during the dedication of the company's cybersecurity research center in the Purdue Research Park of West Lafayette. (Purdue News) TAMPA, Fla. And WEST LAFAYETTE, Ind. -Sypris Electronics LLC, a subsidiary of Sypris Solutions Inc., announced Thursday (Oct. 10) the opening of its newly expanded Sypris Research Center (SRC). Sypris Electronics dedicated the office in its new location in the Purdue Research Park in West Lafayette, Ind. The newly expanded office will continue to focus on advancements in cybersecurity as well as other innovative research in the areas of network protection and critical infrastructure for government and commercial entities through its partnerships with Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS), government, and industry. "Sypris' expansion near Purdue, one of our premier university partners, is a solid testament to our commitment to advancing research in the areas of security and information assurance, not just for our government and commercial allies, but for the benefit of our worldwide partners as well," said John Walsh, president of Sypris Electronics. "I am proud to be a part of the grand opening event and I would like to thank our Indiana-based partners who helped make our expansion a seamless transition." Joseph Hornett, senior vice president, treasurer and COO of the Purdue Research Foundation, spoke at the dedication. "Purdue University and Sypris Electronics have a long history of research collaborations and the dedication of Sypris' offices in the Purdue Research Park of West Lafayette is another step in further developing this positive relationship," Hornett said. "It also is a good example of how Greater Lafayette can attract high-tech and defense companies to this area." Joel Rasmus, director of strategic relations for CERIAS, said that the expansion will provide additional opportunities for research collaborations. "Sypris has a strong reputation of doing innovative information assurance and security work, and this newly opened research and development facility has already begun to open new avenues for joint research collaboration and timely tech transfer from academia to industry," Rasmus said. "It is also affording many of our students the opportunity to work for an innovative industry leader." About Sypris Electronics Sypris Electronics is a world-class, integrated systems solutions provider. Our ruggedized electronic products, advanced engineering services and complete electronic manufacturing capabilities are aligned to provide our customers the best people, practices and technologies to continually exceed expectations. We consistently promote an agile, innovative culture by strategically partnering with leading-edge technology companies, agencies and universities. With over 40 years of experience, Sypris Electronics is proud to develop, manufacture and integrate leading technologies into mission critical electronics systems that secure America's interest. Visit www.sypriselectronics.com for additional information. Contacts: Jennifer L. Limeri, Sypris Electronics, 813-972-6486 Cynthia Sequin, Purdue Research Foundation, 765-588-3340, casequin@prf.org Sources: John Walsh, (813) 972-6486 Joseph Hornett, (765) 588-1040, jbhornett@prf.org Joel Rasmus, (765) 494-7806, jrasmus@purdue.edu

Spafford on Educating Executives

Spafford on Educating Executives


Spafford on Educating Executives

Posted: 09 Oct 2013 08:50 AM PDT

To mark his induction into the National Cyber Security Hall of Fame, Purdue University Computer Science Professor Eugene Spafford offers insights on key challenges, including overcoming senior executives' misperceptions about key issues. More information »

Arxan Technologies Announces Major Investment from TA Associates

Arxan Technologies Announces Major Investment from TA Associates


Arxan Technologies Announces Major Investment from TA Associates

Posted: 07 Oct 2013 12:26 PM PDT

West Lafayette, Ind. (Dept. of Computer Science) Arxan, an application security company specializing in software protection, was recently sold to TA Associates, one of the largest private equity firms. Founded by members of the Computer Science Department and local entrepreneur, Eric Davis, in 2001, the company grew out of efforts by Distinguished Professor and CERIAS Fellow Mikhail (Mike) Atallah, his graduate student, Hoi Chang, Distinguished Professor John Rice, and Assistant Head Tim Korb, working together to develop the technology for a business that grew into one of the leading providers of software security solutions. The technology protects from attacks in distributed or untrusted environments and is used in more than 200 million computing devices, providing protection from hackers by linking "guards" at different points within software code. Purdue supported their efforts with the Trask fund and also paid for the legal expenses of the patents. "Purdue was very helpful, providing some initial funding, filing for patents, renting to the company its initial space at the Research Park under advantageous conditions, and eventually licensing the technology to the company. Before Arxan was founded in 2001, both the CS Department and the CERIAS center provided facilities for research, and an environment conducive to generating the results that were eventually licensed to Arxan. After Arxan was founded in 2001, Purdue also gave us the flexibility and encouragement to pursue this venture," Atallah said. The ultimate decision to sell Arxan was driven by the board of directors, with regard to market conditions. Atallah added, "The recent rapid growth of mobile computing gave a boost to Arxan, because mobile devices are so easily compromised and we were positioned to protect the apps in such situations." Both Atallah and Korb will continue to serve on the technical advisory board, along with Professor Eugene Spafford, who is also the founder and director for the Center for Education and Research in Information Assurance and Security (CERIAS). TA Associates was founded in 1968 and is one of the largest global, middle-market growth, private equity firms in the world. The firm has invested in more than 430 companies and has raised $118 billion in capital with offices in Boston, Menlo Park, London, Mumbai, and Hong Kong. TA leads the world in buyouts and minority recapitalizations of profitable growth companies in technology, financial services, business services, health care and consumer industries. More information about Arxan is available at http://www.arxan.com/ Writer: Jesica E. Hollinger, (765) 494-0996, jehollin@purdue.edu Sources: Mikhail Atallah, (765) 494-6010 Tim Korb, (765) 494-6184 Related websites: http://www.ta.com/News/Arxan-Technologies-Press-Release.aspx

Happy Anniversary—Bang My Head Against A Wall

Happy Anniversary—Bang My Head Against A Wall


Happy Anniversary—Bang My Head Against A Wall

Posted: 06 Oct 2013 12:22 PM PDT

Over the last month or two I have received several invitations to go speak about cyber security. Perhaps the up-tick in invitations is because of the allegations by Edward Snowden and their implications for cyber security. Or maybe it is because news of my recent awards has caught their attention. It could be it is simply to hear about something other than the (latest) puerile behavior by too many of our representatives in Congress and I'm an alternative chosen at random. Whatever the cause, I am tempted to accept many of these invitations on the theory that if I refuse too many invitations, people will stop asking, and then I wouldn't get to meet as many interesting people. As I've been thinking about what topics I might speak about, I've been looking back though the archive of talks I've given over the last few decades. It's a reminder of how many things we, as a field, knew about a long time ago but have been ignored by the vendors and authorities. It's also depressing to realize how little impact I, personally, have had on the practice of information security during my career. But, it has also led me to reflect on some anniversaries this year (that happens to us old folk). I'll mention three in particular here, and may use others in some future blogs. In early November of 1988 the world awoke to news of the first major, large-scale Internet incident. Some self-propagating software had spread around the nascent Internet, causing system crashes, slow-downs, and massive uncertainty. It was really big news. Dubbed the "Internet Worm," it served as an inspiration for many malware authors and vandals, and a wake-up call for security professionals. I recall very well giving talks on the topic for the next few years to many diverse audiences about how we must begin to think about structuring systems to be resistant to such attacks. Flash forward to today. We don't see the flashy, widespread damage of worm programs any more, such as what Nimda and Code Red caused. Instead, we have more stealthy botnets that infiltrate millions of machines and use them for spam, DDOS, and harassment. The problem has gotten larger and worse, although in a manner that hides some of its magnitude from the casual observer. However, the damage is there; don't try to tell the folks at Saudi Aramaco or Qatar's Rasgas that network malware isn't a concern any more! Worrisomely, experts working with SCADA systems around the world are increasingly warning how vulnerable they might be to similar attacks in the future. Computer viruses and malware of all sorts first notably appeared "in the wild" in 1982. By 1988 there were about a dozen in circulation. Those of us advocating for more care in design, programming and use of computers were not heeded in the head-long rush to get computing available on every desktop (and more) at the lowest possible cost. Thus, we now we have (literally) tens of millions of distinct versions of malware known to security companies, with millions more appearing every year. And unsafe practices are still commonplace -- 25 years after that Internet Worm. For the second anniversary, consider 10 years ago. The Computing Research Association, with support from the NSF, convened a workshop of experts in security to consider some Grand Challenges in information security. It took a full 3 days, but we came up with four solid Grand Challenges (it is worth reading the full report and (possibly) watching the video): Eliminate epidemic-style attacks within 10 years Viruses and worms SPAM Denial of Service attacks (DOS) Develop tools and principles that allow construction of large-scale systems for important societal applications that are highly trustworthy despite being attractive targets. Within 10 years, quantitative information-systems risk management will be at least as good as quantitative financial risk management. For the dynamic, pervasive computing environments of the future, give endusers security they can understand and privacy they can control. I would argue -- without much opposition from anyone knowledgeable, I daresay -- that we have not made any measurable progress against any of these goals, and have probably lost ground in at least two. Why is that? Largely economics, and bad understanding of what good security involves. The economics aspect is that no one really cares about security -- enough. If security was important, companies would really invest in it. However, they don't want to part with all the legacy software and systems they have, so instead they keep stumbling forward and hope someone comes up with magic fairy dust they can buy to make everything better. The government doesn't really care about good security, either. We've seen that the government is allegedly spending quite a bit on intercepting communications and implanting backdoors into systems, which is certainly not making our systems safer. And the DOD has a history of huge investment into information warfare resources, including buying and building weapons based on unpatched, undisclosed vulnerabilities. That's offense, not defense. Funding for education and advanced research is probably two orders of magnitude below what it really should be if there was a national intent to develop a secure infrastructure. As far as understanding security goes, too many people still think that the ability to patch systems quickly is somehow the approach to security nirvana, and that constructing layers and layers of add-on security measures is the path to enlightenment. I no longer cringe when I hear someone who is adept at crafting system exploits referred to as a "cyber security expert," but so long as that is accepted as what the field is all about there is little hope of real progress. As J.R.R. Tolkien once wrote, "He that breaks a thing to find out what it is has left the path of wisdom." So long as people think that system penetration is a necessary skill for cyber security, we will stay on that wrong path. And that is a great segue into the last of my three anniversary recognitions. Consider this quote (one of my favorite) from 1973 -- 40 years ago -- from a USAF report, Preliminary Notes on the Design of Secure Military Computer Systems, by a then-young Roger Schell: …From a practical standpoint the security problem will remain as long as manufacturers remain committed to current system architectures, produced without a firm requirement for security. As long as there is support for ad hoc fixes and security packages for these inadequate designs and as long as the illusory results of penetration teams are accepted as demonstrations of a computer system security, proper security will not be a reality. That was something we knew 30 years ago. To read it today is to realize that the field of practice hasn't progressed in any appreciable way in three decades, except we are now also stressing the wrong skills in developing the next generation of expertise. Maybe I'll rethink that whole idea of going to give a talks on security and simply send them each a video loop of me banging my head against a wall. PS -- happy 10th annual National Cyber Security Awareness Month -- a freebie fourth anniversary! But consider: if cyber security were really important, wouldn't we be aware of that every month? The fact that we need to promote awareness of it is proof it isn't taken seriously. Thanks, DHS! Now, where can I find I good wall that doesn't already have dents from my forehead....?

U.S. Agencies Revamp Standards for Cybersecurity Program (Chronicle.com)

U.S. Agencies Revamp Standards for Cybersecurity Program (Chronicle.com)


U.S. Agencies Revamp Standards for Cybersecurity Program (Chronicle.com)

Posted: 30 Sep 2013 01:54 PM PDT

More information »