CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Aerial View of the George Mason Fairfax Campus

CSIS Seminar

Securing Operating System Kernels with Fewer Shots

Speaker:   Yueqi Chen, Penn State University
When:   March 7, 2022, 11:00 am - 12:00 pm
Where:   Zoom

Abstract

Despite significant efforts on cybersecurity, we are observing an increasing number of attacks in recent years. The reason for this harsh reality is all our efforts aim at individual incidents and there is no deep understanding of attack surfaces in software systems. As a result, software systems are integrated with too many individual patches and ad-hoc mitigations, which slows down systems significantly without introducing substantial security benefits. In this talk, I will present a systematic approach to understanding attack surfaces. This approach provides security analysts and developers with the ability to quantify the impact of attack surfaces and facilitate the development of universal and effective defense solutions. Technically, this approach consists of two steps - induction and deduction. The induction step abstracts the essential attack surface behind the incident and the deduction step generalizes it to the exploitation of different error types in different systems. In this talk, I will illustrate this research approach starting from a security incident in the Linux kernel. I will then present a universal and effective defense that mitigates the generalized attack surface and is widely adopted in various commodity Operating System kernels. In the future, I plan to further advance this systematic approach and make it a fundamental part of the entire software development lifecycles. More specifically, I will: 1) enrich induction and deduction techniques for more attack forms under new contexts, 2) formalize the description of attack surfaces, and 3) quantify the security of systems to optimize and re-construct existing defenses architecture. Join Zoom Meeting https://gmu.zoom.us/j/96575862853?pwd=eEVNM0pQSXhkRkhiZ01LblhoVTc4UT09 Meeting ID: 965 7586 2853 Passcode: 323119

Speaker Bio

Yueqi Chen received his B.Sc degree from Nanjing University. He is currently a fifth-year Ph.D. student at Pennsylvania State University and a predoctoral fellow with Dr. Xinyu Xing at Northwestern University. He was awarded the IBM Ph.D. Fellowship 2020-2022. In general, his research focuses on system security and software security. He is particularly interested in developing systematic approaches to inducing, deducting, and mitigating attack surfaces. Along this thread, he has published 11 papers in top-tier academic conferences, including IEEE S&P, USENIX Security, ACM CCS, NDSS, OOPSLA, ACM/IEEE ICSE, IEEE/ACM ASE as leading authors and co-authors over the past 4 years. In addition, he presented his works at CLK 2019, BlackHat Europe 2019, BlueHat IL 2020, LSS Europe 2020, BlackHat Aisa 2021, LSS North America 2021, BlackHat Europe 2021. His research works were covered by high-profile media (e.g., Dark Reading) and have received wide recognition from the industry, including Amazon, Apple, Baidu, Google, Grsecurity, IBM, JD.com, Linux Foundation, Microsoft, and Red Hat. His work is integrated into the internal threat alerting platform of JD.com. The new defenses in AutoSlab produced by Grsecurity and iPhone 13 series from Apple can find their prototypes in his works. As a team member of r3kapig and Nu1L, he participated in DEF CON 26 CTF Final and DECONF 29 CTF Final, and ranked 16th and 7th, respectively. He ranked 5th in NSA codebreaker 2017.