<node id="590949">
  <nid>590949</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1493203657</created>
  <changed>1493203657</changed>
  <title><![CDATA[PhD Proposal by Yeongjin Jang]]></title>
  <body><![CDATA[<p>Title: Building Trust in the User I/O in Computer Systems</p>

<p>&nbsp;</p>

<p>Yeongjin Jang</p>

<p>School of Computer Science</p>

<p>College of Computing</p>

<p>Georgia Institute of Technology</p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p>Date: Monday, May 1st, 2017</p>

<p>Time: 12:00pm - 2:00pm</p>

<p>Location: Klaus 3126</p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p>Committee</p>

<p>--------------------</p>

<p>Dr. Wenke Lee (Advisor), School of Computer Science, Georgia Institute of Technology</p>

<p>Dr. Taesoo Kim (co-advisor), School of Computer Science, Georgia Institute of Technology</p>

<p>Dr. Mustaque Ahamad, School of Computer Science, Georgia Institute of Technology</p>

<p>&nbsp;</p>

<p>Abstract</p>

<p>--------------------</p>

<p>User input plays an important role in computer security because it</p>

<p>can control system behavior and make security decisions in the system.</p>

<p>System output to users, or user output, is also important because</p>

<p>it often contains security-critical information that must be protected</p>

<p>in terms of integrity and confidentiality, such as passwords and user&#39;s</p>

<p>private data. Despite the importance of user input and output (I/O),</p>

<p>modern computer systems often fail to provide basic security guarantees</p>

<p>on them, which has resulted in serious security breaches.</p>

<p>&nbsp;</p>

<p>My dissertation research aims to build trust in the user I/O in computer</p>

<p>systems and keep systems secure by blocking attack pathways. To this end,</p>

<p>I analyze user I/O path on popular platforms including desktop operating</p>

<p>systems, mobile operating systems, and trusted execution environments</p>

<p>such as Intel SGX, and then develop systems that guarantee three key</p>

<p>security properties of user I/O: integrity, confidentiality, and authenticity.</p>

<p>&nbsp;</p>

<p>First, Gyrus addresses the integrity of user input by matching the user&#39;s</p>

<p>original input with the content of outgoing network traffic and authorizing</p>

<p>user-intended network transactions. Second, M-Aegis addresses the</p>

<p>confidentiality of user I/O by implementing an encryption layer on top of</p>

<p>user interface layer that provides user-to-user encryption. Third,</p>

<p>the A11y Attack addresses the importance of verifying user I/O authenticity</p>

<p>by demonstrating twelve new attacks, which stem from missing proper security</p>

<p>checks to verify input sources and output destinations on alternative user</p>

<p>I/O paths in operating systems.</p>

<p>&nbsp;</p>

<p>Finally, to establish trust in user I/O, I propose a system called SGX-USB,</p>

<p>which combines three security properties to ensure the assurance of user I/O.</p>

<p>SGX-USB establishes a trusted communication channel between the USB</p>

<p>controller and an enclave instance of Intel SGX. The system supports common</p>

<p>user input devices such as a keyboard and a mouse over the trusted channel,</p>

<p>which guarantees the assurance of user input. Having assurance in user I/O</p>

<p>allows the computer system to securely handle commands and data from</p>

<p>the user and eliminate attacks to I/O paths.</p>

<p><br />
&nbsp;</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Building Trust in the User I/O in Computer Systems]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2017-05-01T13:00:00-04:00]]></value>
      <value2><![CDATA[2017-05-01T15:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>102851</tid>
        <value><![CDATA[Phd proposal]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
