Advances In System Isolation For Cyber Attack MitigationSpeaker: Christophe Bobda – Gainesville, FL, United States
Topic(s): Architecture, Embedded Systems and Electronics, Robotics
The increasing global availability of broadband access to the Internet has led to the creation and distribution of malicious software and financially-oriented underground economies of criminals. Annual economic loss attributed to malicious software activities is estimated at more than US $10 Billion. Malicious activities are no more limited to single hackers and DDoS attacks, but range from hardware Trojans to more complex insider and outsider attacks in cloud computing systems. These attacks can take down critical infrastructures such as the power grid, financial trading platform or large data centers. Isolation has been one of the most effective solutions in connected SCADA-based systems. However, the practicability of early solutions as well as the need for high-speed communication have prevented a wider adoption of isolation as a means to tackle security. Recently, there has been a resurgence in isolation as a means to mitigate cyber attacks.
In this talk, we introduce and motivate the principle of isolation and it's application to cyber security. Thereafter recent advances in the field will be discussed including efforts currently on the way in academia and industry. The talk will discuss current work at the University of Arkansas, particularly the Isolation and Protection Module (IPM) and the Hardware Sandboxing paradigm. While the IPM provide a system on chip (SoC) solution to enforce isolation in networked systems, hardware sandbox are used in SoC to contain effects of non-trusted IPs.
About this LectureNumber of Slides: 42
Duration: 45 minutes
Languages Available: English
Request this Lecture
To request this particular lecture, please complete this online form.
Request a Tour
To request a tour with this speaker, please complete this online form.
All requests will be sent to ACM headquarters for review.