Award Abstract # 1834216
SDI-CSCS: Collaborative Research: S2OS Enabling Infrastructure-Wide Programmable Security with SDI

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: OHIO STATE UNIVERSITY, THE
Initial Amendment Date: April 30, 2018
Latest Amendment Date: August 6, 2019
Award Number: 1834216
Award Instrument: Continuing Grant
Program Manager: Karen Karavanic
kkaravan@nsf.gov
 (703)292-2594
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: January 1, 2018
End Date: August 31, 2022 (Estimated)
Total Intended Award Amount: $393,440.00
Total Awarded Amount to Date: $400,000.00
Funds Obligated to Date: FY 2017 = $261,058.00
FY 2019 = $138,942.00
History of Investigator:
  • Zhiqiang Lin (Principal Investigator)
    zlin@cse.ohio-state.edu
Recipient Sponsored Research Office: Ohio State University
1960 KENNY RD
COLUMBUS
OH  US  43210-1016
(614)688-8735
Sponsor Congressional District: 03
Primary Place of Performance: Ohio State University
2036 Neil Avenue
Columbus
OH  US  43210-1226
Primary Place of Performance
Congressional District:
03
Unique Entity Identifier (UEI): DLWBSLWAJWR1
Parent UEI: MN4MDDMN8529
NSF Program(s): Information Technology Researc,
Special Projects - CNS
Primary Program Source: 01001718DB NSF RESEARCH & RELATED ACTIVIT
01001920DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7354
Program Element Code(s): 164000, 171400
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Traditionally, many of our critical systems have been developed with security as a reactive add-on, rather than a by default design. As a result, existing security mechanisms are often fragmented, hard to configure or verify, which makes it difficult to defend against various cyber attacks. This project will build the "holy grail" for enterprise/cloud/data-center security management with software-defined infrastructure (SDI): a unified framework for security and management of disparate resources, ranging from processes to storage to networking. Cloud computing is now an essential part of our national cyberinfrastructure; the proposed work will lower the total cost of ownership for clouds - further unlocking economic and environmental benefits - as well as improving the security of today's clouds.

This project proposes S2OS (SDI-defined Security Operating System), which abstracts security capabilities and primitives at both the host Operating System (OS) and network levels and offers an easy-to-use and programmable security model for monitoring and dynamically securing applications. This project will explore new techniques to transparently compose software into a unified enterprise, even if the individual pieces were never explicitly designed to inter-operate, similar in a way a traditional operating system managing various hardware resources for upper-layer user applications. Further, this project will contribute new ways to leverage global information for making effective local security management decisions. Finally, this project enables new innovations in programming dynamic, host-network coordinated, and intelligent security applications to protect the entire infrastructure.

This project will make significant contributions to how enterprise, data centers and cloud computing are securely built and managed. The project's PIs will engage in educational and outreach activities to train the next generation talent. In particular, the PIs plan to integrate the interdisciplinary research ideas into courses spanning networking, systems and security. The project will also actively encourage participation from underrepresented groups and transfer technology to industry partners.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Li, Mengyuan and Zhang, Yinqian and Lin, Zhiqiang "CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV" Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security , 2021 https://doi.org/10.1145/3460120.3485253 Citation Details
Mengyuan Li, Yinqian Zhang "Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization" Proceedings of the 2019 USENIX Security Symposium , 2019 Citation Details
Wang, Huibo and Wang, Pei and Ding, Yu and Sun, Mingshen and Jing, Yiming and Duan, Ran and Li, Long and Zhang, Yulong and Wei, Tao and Lin, Zhiqiang "Towards Memory Safe Enclave Programming with Rust-SGX" ACM Conference on Computer and Communications Security , 2019 10.1145/3319535.3354241 Citation Details
Wubing Wang, Yinqian Zhang "Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries" Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses , 2019 Citation Details
Wubing Wang, Yinqian Zhang "Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries" Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses , 2019 Citation Details
Zhang, Yue and Turkistani, Bayan and Yang, Allen Yuqing and Zuo, Chaoshun and Lin, Zhiqiang "A Measurement Study of Wechat Mini-Apps" Proceedings of the ACM on Measurement and Analysis of Computing Systems , v.5 , 2021 https://doi.org/10.1145/3460081 Citation Details
Zhao, Qingchuan and Zuo, Chaoshun and Blasco, Jorge and Lin, Zhiqiang "PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals" Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security , 2022 https://doi.org/10.1145/3488932.3517410 Citation Details
Zhao, Shixuan and Li, Mengyuan and Zhangyz, Yinqian and Lin, Zhiqiang "vSGX: Virtualizing SGX Enclaves on AMD SEV" Proceedings of the 43rd IEEE Symposium on Security and Privacy , 2022 https://doi.org/10.1109/SP46214.2022.9833694 Citation Details
Zuo, Chaoshun and Wen, Haohuang and Lin, Zhiqiang and Zhang, Yinqian "Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps" ACM Conference on Computer and Communications Security , 2019 https://doi.org/10.1145/3319535.3354240 Citation Details

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

The goal of this project was to study the unified abstractions and management of software security at data-center scale.  We prototyped and evaluated S2OS, a security OS for managing software-defined infrastructure. S2OS contributes techniques for virtualizing hardware and software, including components that predate S2OS, such as trusted execution environment (TEE) hardware.  This project demonstrates the potential for leveraging global information, such as using machine learning on network data to identify and defend against malware.  This project has also contributed additional system management and security data, tools, and techniques.

Intellectual Merit: One set of contributions from this project are in the area of techniques to virtualize, or abstract and integrate, hardware and software that is not designed for software-defined security management.  Examples include vSGX, a virtualized environment for running code designed for Intel's SGX on AMD's SEV both are trusted execution environments with different requirements and restrictions, facilitating more flexible code deployments.  Similarly, the project has contributed techniques for refactoring code to deploy in a TEE, and has demonstrated that, unlike CPU hardware, the most efficient layer for virtualizing accelerators, such as GPUs, is at the software API level.

A second set of contributions from the project come from studying how to program management software across these hardware and software resources in a data center.  For instance, the Toccoa sub-project supports programmable network packet analysis at the rate of tens of millions of packets per second, while also scaling out to more nodes linearly.  Similarly, the SysFlow sub-project is a programming framework for modeling and controlling software activities across the entire infrastructure, providing a data-center-scale data plane and control plane separation.

Finally, S2OS contributes novel security defense and mitigation techniques that are only possible with data collected, analyzed, and applied at scale.  For instance, the IMap sub-project shows how to implement network-level defenses that leverage data collected at scale, yet are deployed in individual switches.  The xNIDS sub-project further applies machine learning to characterize network traffic, troubleshoot issues, and automatically generate defenses.  Similarly, our study of ransomware defense shows that network-level monitoring for a command-and-control channel can be more effective than tracking file access behavior on a single system.  Other examples of novel security management applications enabled by S2OS include 1) risk-aware micro-segmentation for micro-services, which confines file accesses within a container's scope and isolates potentially compromised containers from one another; 2) Fine-grained and Context-aware Access Control (FCAC) in Web Applications, which offers context-aware, fine-grained access control within web servers, and 3) Virtual Patching, a security policy enforcement layer that prevents the exploitation of a known vulnerability in a timely manner, even if a patch is not yet available.

Broader Impacts: Data-center scale computing is rapidly becoming the norm for modern computing, yet security and administrative tools are struggling to scale up from a single machine to a rack or data-center.  The S2OS project shows how to leverage and extend software-defined infrastructure to build security management solutions at scale.  The project has supported the training and research of seventeen students.  Key software components of S2OS have been released as open source.


 

 


Last Modified: 10/21/2022
Modified by: Zhiqiang Lin

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page