<node id="593630">
  <nid>593630</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1500641551</created>
  <changed>1500641551</changed>
  <title><![CDATA[PhD Defense by Yeongjin Jang]]></title>
  <body><![CDATA[<p>Title: Building Trust in the User I/O in Computer Systems</p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p>Yeongjin Jang</p>

<p>Ph.D. Candidate</p>

<p>School of Computer Science</p>

<p>College of Computing</p>

<p>Georgia Institute of Technology</p>

<p>&nbsp;</p>

<p>Date: Monday, July 24, 2017</p>

<p>Time: 9AM - 11AM (EDT)</p>

<p>Location: Klaus 3126</p>

<p>&nbsp;</p>

<p>Committee:</p>

<p>--------------------</p>

<p>&nbsp;</p>

<p>Dr. Wenke Lee (Advisor), School of Computer Science, Georgia Institute of Technology</p>

<p>Dr. Taesoo Kim (co-advisor), School of Computer Science, Georgia Institute of Technology</p>

<p>Dr. Mustaque Ahamad, School of Computer Science, Georgia Institute of Technology</p>

<p>Dr. Kang Li, School of Computer Science, University of Georgia</p>

<p>Dr. Yongdae Kim, School of Electrical Engineering, KAIST</p>

<p>&nbsp;</p>

<p>Abstract</p>

<p>--------------------</p>

<p>&nbsp;</p>

<p>User input plays an essential role in computer security because it can</p>

<p>control system behavior and make security decisions in the system.</p>

<p>System output to users, or user output, is also important because it</p>

<p>often contains security-critical information that must be protected</p>

<p>regarding its integrity and confidentiality, such as passwords and</p>

<p>user&rsquo;s private data. Despite the importance of user input and output (I/O),</p>

<p>modern computer systems often fail to provide necessary security guarantees</p>

<p>on them, which could result in serious security breaches.</p>

<p>&nbsp;</p>

<p>This dissertation aims to build trust in the user I/O in computer systems</p>

<p>to keep the systems secure from attacks on the user I/O. To this end,</p>

<p>we analyze the user I/O paths on popular platforms including desktop</p>

<p>operating systems, mobile operating systems, and trusted execution</p>

<p>environments such as Intel SGX, and identified that threats and attacks on</p>

<p>the user I/O can be blocked by guaranteeing three key security properties</p>

<p>of user I/O: integrity, confidentiality, and authenticity.</p>

<p>&nbsp;</p>

<p>First, Gyrus addresses the integrity of user input by matching the user&rsquo;s</p>

<p>original input with the content of outgoing network traffic to authorize</p>

<p>user-intended network transactions. Second, M-Aegis addresses the</p>

<p>confidentiality of user I/O by implementing an encryption layer on top of</p>

<p>user interface layer that provides user-to-user encryption. Third, the</p>

<p>A11y Attack addresses the importance of verifying user I/O authenticity by</p>

<p>demonstrating twelve new attacks, all of which stem from missing proper</p>

<p>security checks that verify input sources and output destinations on</p>

<p>alternative user I/O paths in operating systems.</p>

<p>&nbsp;</p>

<p>Finally, to establish trust in the user I/O in a commodity computer system,</p>

<p>I built a system called SGX-USB, which combines all three security properties</p>

<p>to ensure the assurance of user I/O. SGX-USB establishes a trusted</p>

<p>communication channel between the USB controller and an enclave instance of</p>

<p>Intel SGX. The implemented system supports common user input devices such as</p>

<p>a keyboard and a mouse over the trusted channel, which guarantees the</p>

<p>assurance of user input. Having assurance in user I/O allows the computer</p>

<p>system to securely handle commands and data from the user by eliminating</p>

<p>attack pathways to a system&rsquo;s I/O paths.</p>

<p>&nbsp;</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Building Trust in the User I/O in Computer Systems]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2017-07-24T10:00:00-04:00]]></value>
      <value2><![CDATA[2017-07-24T12:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>100811</tid>
        <value><![CDATA[Phd Defense]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
