Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Drew Dean is active.

Publication


Featured researches published by Drew Dean.


ACM Transactions on Information and System Security | 2002

An algebraic approach to IP traceback

Drew Dean; Matthew K. Franklin; Adam Stubblefield

We present a new solution to the problem of determining the path a packet traversed over the Internet (called the traceback problem) during a denial-of-service attack. This article reframes the traceback problem as a polynomial reconstruction problem and uses algebraic techniques from coding theory and learning theory to provide robust methods of transmission and reconstruction.


ieee symposium on security and privacy | 1996

Java security: from HotJava to Netscape and beyond

Drew Dean; Edward W. Felten; Dan S. Wallach

The introduction of Java applets has taken the World Wide Web by storm. Information servers can customize the presentation of their content with server-supplied code which executes inside the Web browser. We examine the Java language and both the HotJava and Netscape browsers which support it, and find a significant number of flaws which compromise their security. These flaws arise for several reasons, including implementation errors, unintended interactions between browser features, differences between the Java language and bytecode semantics, and weaknesses in the design of the language and the bytecode format. On a deeper level, these flaws arise because of weaknesses in the design methodology used in creating Java and the browsers. In addition to the flaws, we discuss the underlying tension between the openness desired by Web application writers and the security needs of their users, and we suggest how both might be accommodated.


symposium on operating systems principles | 1997

Extensible security architectures for Java

Dan S. Wallach; Dirk Balfanz; Drew Dean; Edward W. Felten

Mobile code technologies such as Java, JavaScript, and ActiveX generally limit all programs to a single restrictive security policy. However, software-based protection can allow for more extensible security models, with potentially significant performance improvements over traditional hardware-based solutions. An extensible security system should be able to protect subsystems and implement policies that are created after the initial system is shipped. We describe and analyze three implementation strategies for interposing such security policies in software-based security systems. Implementations exist for all three strategies: several vendors have adapted capabilities to Java, Netscape and Microsoft have extensions to Javas stack introspection, and we built a name space management system as an add-on to Microsoft Internet Explorer. Theoretically, all these systems are equivalently secure, but many practical issues and implementation details favor some aspects of each system.


ieee symposium on security and privacy | 2002

Self-healing key distribution with revocation

Jessica Staddon; Sara K. Miner; Matthew K. Franklin; Dirk Balfanz; Michael Malkin; Drew Dean

We address the problem of establishing a group key amongst a dynamic group of users over an unreliable, or lossy, network. We term our key distribution mechanisms self-healing because users are capable of recovering lost group keys on their own, without requesting additional transmissions from the group manager thus cutting back on network traffic, decreasing the load on the group manager and reducing the risk of user exposure through traffic analysis. A user must be a member both before and after the session in which a particular key is sent in order to be able to recover the key through self-healing. Binding the ability to recover keys to membership status enables the group manager to use short broadcasts to establish group keys, independent of the group size. In addition, the self-healing approach to key distribution is stateless, meaning that a group member who has been off-line for some time is able to recover new session keys immediately after coming back on-line.


computer and communications security | 1997

The security of static typing with dynamic linking

Drew Dean

Dynamic linking is a requirement for portable executable content. Executable content cannot know, ahead of time, where it is going to be executed, nor know the proper operating system interface. This imposes a requirement for dynamic linking. At the same time, we would like languages supporting executable content to be statically typable, for increased efficiency and security. Static typing and dynamic linking interact in a security-relevant way. This interaction is the subject of this paper. One solution is modeled in PVS, and formally proven to be safe.


Journal of Computer Security | 2004

Reconstructing trust management

Ajay Chander; Drew Dean; John C. Mitchell

We present a trust management kernel that clearly separates authorization and structured distributed naming. Given an access request and supporting credentials, the kernel determines whether the request is authorized. We prove soundness and completeness of the authorization system without names and prove that naming is orthogonal to authorization in a precise sense. The orthogonality theorem gives us simple soundness and completeness proofs for the entire kernel. The kernel is formally verified in PVS, allowing for the automatic generation of a verified implementation of a reference monitor. By separating naming and authorization primitives, we arrive at a compositional model and avoid concepts such as “speaks-for” that have led to anomalies in logical characterizations of other trust management systems. Supported in part by DARPA contract N66001-00-C-8015 and ONR grant N00014-01-1-0795. Supported in part by DARPA contract N66001-00-C-8015 and ONR grant N00014-01-1-0837.


international conference on information security | 2004

A Distributed High Assurance Reference Monitor

Ajay Chander; Drew Dean; John C. Mitchell

We present dharma, a distributed high assurance reference monitor that is generated mechanically by the formal methods tool PVS from a verified specification of its key algorithms. dharma supports policies that allow delegation of access rights, as well as structured, distributed names. To test dharma, we use it as the core reference monitor behind a web server that serves files over SSL connections. Our measurements show that formally verified high assurance access control systems are practical.


Archive | 1997

Web Spoofing: An Internet Con Game

Edward W. Felten; Dirk Balfanz; Drew Dean; Dan S. Wallach


network and distributed system security symposium | 2004

Model Checking One Million Lines of C Code.

Hao Chen; Drew Dean; David A. Wagner


network and distributed system security symposium | 2001

An algebraic approach to ip traceback

Drew Dean; Matthew K. Franklin; Adam Stubblefield

Collaboration


Dive into the Drew Dean's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge