EECS Colloquium

March 02, 2018

Venue: Golden Jubilee hall,
             Department of ECE, IISc

Friday, March 02, 2018
14.45 - 15.00 Coffee
15:00 - 15:45

Dr Sriram Rajamani, MSRI

Title: Trusted Cloud--How to make the cloud mode secure
Cloud computing is growing because of cost advantages and convenience it offers to customers. However, security and privacy continue to be major concerns. We wish to guard against a powerful adversary who can compromise the CloudOS, and uses all privileges of the CloudOS to compromise the integrity and confidentiality of user applications. Secure hardware and/or small trusted hypervisors are the main weapons in our arsenal to guard against such powerful adversaries. Secure hardware (such as Intel SGX) enables user mode applications to package code and data into regions that are isolated from all other software running on the machine. Isolated regions can also be implemented with a small trusted hypervisor. However, it is an open research question as to how entire cloud services can be built using trusted hardware as a primitive, while maintaining a small TCB, providing good performance and end-to-end security guarantees. The Trusted Cloud project at Microsoft Research explores ways to answer this question, and it builds on techniques spanning hardware, OS, compilers and verification tools. In this talk, I will describe our efforts on architecting trusted and more secure cloud services using these principles. (Collaboration with Manuel Costa and several colleagues across MSR and Azure)

15:50 - 16:35

Prof Sandeep Shukla, IITK

Title: Vulnerabilities, threat intelligence and Cyber Defense of Critical Infrastructure: A C3I Perspective
Industrial automation hardware and software is used in critical infrastructures such as power generation, transmission and distribution automation, factory automation, smart transportation etc. As Industry 4.0 - the 4th industrial revolution is being predicted to be based on wide usage of robotics, and AI based functional upgrades supervisory control and data acquisition systems (SCADA) are becoming more sophisticated. In the recent years, cyber-attacks have been reported on industrial systems -- including several attacks on power systems in Ukraine, Israel, and elsewhere; steel plants in Germany, and ransomware attacks on transportation logistics automation systems. Thus, cyber security and defense of critical infrastructures have now become a national security issue -- more than just local cyber security concern. At the Interdisciplinary center for cyber security and cyber defense of critical infrastructures (C3I) at IIT Kanpur, we are building various real test-beds for hardware and software in-the-loop testing of cyber vulnerabilities, as well as innovating defensive mechanisms, and experiment with the concept of resilient system design for such infrastructures. In this talk, we first introduce our distribution automation testbed, and the various cyber vulnerabilities in a commercial product we have uncovered through penetration tests. We also discuss the mitigation techniques being experimented with as well as artifacts of defense postures such as malware analysis/classification, honeypot based entrapment of attackers, threat intelligence collection/assessment, and anomaly detection for detecting on-going attacks. We then briefly discuss our under procurement -- large scale test bed that encompasses power generation, transmission, as well as distribution automation, process/discrete control, and industry 4.0 automation, with a heterogeneity of commercially available components.

16:40 - 17:30
Prof Vinod Ganapathy, IISc

Title: Secure Memory Snapshotting and Applications
Many security and forensic analyses rely on the ability to fetch memory snapshots from a target machine. To date, the security community has relied on virtualization, external hardware or trusted hardware to obtain such snapshots. I will make the case that these techniques either sacrifice snapshot consistency or degrade the performance of applications executing atop the target. I will then present the design and implementation of a a new snapshot acquisition system that offers snapshot consistency without excessively hurting the performance of the target's applications.

17:30 onwards High Tea