Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Amy L. Herzog is active.

Publication


Featured researches published by Amy L. Herzog.


Journal of Computer Security | 2005

Verifying information flow goals in security-enhanced Linux

Joshua D. Guttman; Amy L. Herzog; John D. Ramsdell; Clement W. Skorupka

In this paper, we present a systematic way to determine the information flow security goals achieved by systems running a secure O/S, specifically systems running Security-Enhanced Linux. A formalization of the access control mechanism of the SELinux security server, together with a labeled transition system representing an SELinux configuration, provides our framework. Information flow security goal statements expressed in linear temporal logic provide a clear description of the objectives that SELinux is intended to achieve. We use model checking to determine whether security goals hold in a given system. These formal models combined with appropriate algorithms have led to automated tools for the verification of security properties in an SELinux system. Our approach has been used in other security management contexts over the past decade, under the name rigorous automated security management.


International Journal of Information Security | 2005

Rigorous automated network security management

Joshua D. Guttman; Amy L. Herzog

Achieving a security goal in a networked system requires the cooperation of a variety of devices, each device potentially requiring a different configuration. Many information security problems may be solved with appropriate models of these devices and their interactions, giving a systematic way to handle the complexity of real situations.We present an approach, rigorous automated network security management, that front-loads formal modeling and analysis before problem solving, thereby providing easy-to-run tools with rigorously justified results. With this approach, we model the network and a class of practically important security goals. The models derived suggest algorithms that, given system configuration information, determine the security goals satisfied by the system. The modeling provides rigorous justification for the algorithms, which may then be implemented as ordinary computer programs requiring no formal methods training to operate.We have applied this approach to several problems. In this paper we describe two: distributed packet filtering and the use of IP security (IPsec) gateways. We also describe how to piece together the two separate solutions to these problems, jointly enforcing packet filtering as well as IPsec authentication and confidentiality on a single network.


International Journal of Information Security | 2011

Principles of remote attestation

George Coker; Joshua D. Guttman; Peter Loscocco; Amy L. Herzog; Jonathan K. Millen; Brian O’Hanlon; John D. Ramsdell; Justin Sheehy; Brian T. Sniffen

Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five central principles to guide development of attestation systems. We argue that (i) attestation must be able to deliver temporally fresh evidence; (ii) comprehensive information about the target should be accessible; (iii) the target, or its owner, should be able to constrain disclosure of information about the target; (iv) attestation claims should have explicit semantics to allow decisions to be derived from several claims; and (v) the underlying attestation mechanism must be trustworthy. We illustrate how to acquire evidence from a running system, and how to transport it via protocols to remote appraisers. We propose an architecture for attestation guided by these principles. Virtualized platforms, which are increasingly well supported on stock hardware, provide a natural basis for our attestation architecture.


ieee symposium on security and privacy | 2012

New Results for Timing-Based Attestation

Xeno Kovah; Corey Kallenberg; Chris Weathers; Amy L. Herzog; Matthew Albin; John Butterworth

In this paper we present a comprehensive timing-based attestation system suitable for typical enterprise use, and evidence of that systems performance. This system, similar to Pioneer [20] but built with relaxed assumptions, successfully detects attacks on code integrity over 10 links of an enterprise network, despite an average of just 1.7% time overhead for the attacker. We also present the first implementation and evaluation of a Trusted Platform Module (TPM) hardware timing-based attestation protocol. We describe the design and results of a set of experiments showing the effectiveness of our timing-based system, thereby providing further evidence of the practicality of timing-based attestation in real-world settings. While system measurement itself is a worthwhile goal, and timing-based attestation systems can provide measurements that are equally as trustworthy as hardware-based attestation systems, we feel that Time Of Check, Time Of Use (TOCTOU) attacks have not received appropriate attention in the literature. To address this topic, we present the three conditions required to execute such an attack, and how past attacks and defenses relate to these conditions.


european symposium on research in computer security | 2000

Authentication and Confidentiality via IPSEC

Joshua D. Guttman; Amy L. Herzog; F. Javier Thayer

The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported by an increasing number of commercial products. In this paper, we formalize the types of authentication and confidentiality goal that IPsec is capable of achieving, and we provide criteria that entail that a network with particular IPsec processing achieves its security goals.


workshop on information technologies and systems | 2003

Information Flow in Operating Systems: Eager Formal Methods

Joshua D. Guttman; Amy L. Herzog; John D. Ramsdell


Lecture Notes in Computer Science | 2000

Authentication and confidentiality via IPsec

Joshua D. Guttman; Amy L. Herzog; F. Javier Thayer


computer and communications security | 2013

BIOS chronomancy: fixing the core root of trust for measurement

John Butterworth; Corey Kallenberg; Xeno Kovah; Amy L. Herzog


Archive | 2008

Attestation architecture and system

S. Coker Ii George; Amy L. Herzog; Joshua D. Guttman; Peter A. Loscocco; Jonathan K. Millen; John D. Ramsdell; Justin Sheehy; Brian T. Sniffen; Grant Wagner


workshop on information technologies and systems | 2004

Verifying Information Flow Goals in Security-Enhanced Linux

Joshua D. Guttman; Amy L. Herzog; John D. Ramsdell; Clement W. Skorupka

Collaboration


Dive into the Amy L. Herzog's collaboration.

Top Co-Authors

Avatar

Joshua D. Guttman

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge