{"593630":{"#nid":"593630","#data":{"type":"event","title":"PhD Defense by Yeongjin Jang","body":[{"value":"\u003Cp\u003ETitle: Building Trust in the User I\/O in Computer Systems\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EYeongjin Jang\u003C\/p\u003E\r\n\r\n\u003Cp\u003EPh.D. Candidate\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESchool of Computer Science\u003C\/p\u003E\r\n\r\n\u003Cp\u003ECollege of Computing\u003C\/p\u003E\r\n\r\n\u003Cp\u003EGeorgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDate: Monday, July 24, 2017\u003C\/p\u003E\r\n\r\n\u003Cp\u003ETime: 9AM - 11AM (EDT)\u003C\/p\u003E\r\n\r\n\u003Cp\u003ELocation: Klaus 3126\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003ECommittee:\u003C\/p\u003E\r\n\r\n\u003Cp\u003E--------------------\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Wenke Lee (Advisor), School of Computer Science, Georgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Taesoo Kim (co-advisor), School of Computer Science, Georgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Mustaque Ahamad, School of Computer Science, Georgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Kang Li, School of Computer Science, University of Georgia\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Yongdae Kim, School of Electrical Engineering, KAIST\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAbstract\u003C\/p\u003E\r\n\r\n\u003Cp\u003E--------------------\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EUser input plays an essential role in computer security because it can\u003C\/p\u003E\r\n\r\n\u003Cp\u003Econtrol system behavior and make security decisions in the system.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESystem output to users, or user output, is also important because it\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eoften contains security-critical information that must be protected\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eregarding its integrity and confidentiality, such as passwords and\u003C\/p\u003E\r\n\r\n\u003Cp\u003Euser\u0026rsquo;s private data. Despite the importance of user input and output (I\/O),\u003C\/p\u003E\r\n\r\n\u003Cp\u003Emodern computer systems often fail to provide necessary security guarantees\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eon them, which could result in serious security breaches.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThis dissertation aims to build trust in the user I\/O in computer systems\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eto keep the systems secure from attacks on the user I\/O. To this end,\u003C\/p\u003E\r\n\r\n\u003Cp\u003Ewe analyze the user I\/O paths on popular platforms including desktop\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eoperating systems, mobile operating systems, and trusted execution\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eenvironments such as Intel SGX, and identified that threats and attacks on\u003C\/p\u003E\r\n\r\n\u003Cp\u003Ethe user I\/O can be blocked by guaranteeing three key security properties\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eof user I\/O: integrity, confidentiality, and authenticity.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EFirst, Gyrus addresses the integrity of user input by matching the user\u0026rsquo;s\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eoriginal input with the content of outgoing network traffic to authorize\u003C\/p\u003E\r\n\r\n\u003Cp\u003Euser-intended network transactions. Second, M-Aegis addresses the\u003C\/p\u003E\r\n\r\n\u003Cp\u003Econfidentiality of user I\/O by implementing an encryption layer on top of\u003C\/p\u003E\r\n\r\n\u003Cp\u003Euser interface layer that provides user-to-user encryption. Third, the\u003C\/p\u003E\r\n\r\n\u003Cp\u003EA11y Attack addresses the importance of verifying user I\/O authenticity by\u003C\/p\u003E\r\n\r\n\u003Cp\u003Edemonstrating twelve new attacks, all of which stem from missing proper\u003C\/p\u003E\r\n\r\n\u003Cp\u003Esecurity checks that verify input sources and output destinations on\u003C\/p\u003E\r\n\r\n\u003Cp\u003Ealternative user I\/O paths in operating systems.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EFinally, to establish trust in the user I\/O in a commodity computer system,\u003C\/p\u003E\r\n\r\n\u003Cp\u003EI built a system called SGX-USB, which combines all three security properties\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eto ensure the assurance of user I\/O. SGX-USB establishes a trusted\u003C\/p\u003E\r\n\r\n\u003Cp\u003Ecommunication channel between the USB controller and an enclave instance of\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIntel SGX. The implemented system supports common user input devices such as\u003C\/p\u003E\r\n\r\n\u003Cp\u003Ea keyboard and a mouse over the trusted channel, which guarantees the\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eassurance of user input. Having assurance in user I\/O allows the computer\u003C\/p\u003E\r\n\r\n\u003Cp\u003Esystem to securely handle commands and data from the user by eliminating\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eattack pathways to a system\u0026rsquo;s I\/O paths.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Building Trust in the User I\/O in Computer Systems"}],"uid":"27707","created_gmt":"2017-07-21 12:52:31","changed_gmt":"2017-07-21 12:52:31","author":"Tatianna Richardson","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-07-24T10:00:00-04:00","event_time_end":"2017-07-24T12:00:00-04:00","event_time_end_last":"2017-07-24T12:00:00-04:00","gmt_time_start":"2017-07-24 14:00:00","gmt_time_end":"2017-07-24 16:00:00","gmt_time_end_last":"2017-07-24 16:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[{"id":"221981","name":"Graduate Studies"}],"categories":[],"keywords":[{"id":"100811","name":"Phd Defense"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}