Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gabriela F. Cretu is active.

Publication


Featured researches published by Gabriela F. Cretu.


usenix annual technical conference | 2007

From STEM to SEAD: speculative execution for automated defense

Michael E. Locasto; Angelos Stavrou; Gabriela F. Cretu; Angelos D. Keromytis

Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of self-healing to automatically recover from an attack, self-healing faces some obstacles before it can protect legacy applications and COTS (Commercial Off-The-Shelf) software. Besides the practical issue of not modifying source code, self-healing must know both when to engage and how to guide a repair. Previous work on a self-healing system, STEM, left these challenges as future work. This paper improves STEMs capabilities along three lines to provide practical speculative execution for automated defense (SEAD). First, STEM is now applicable to COTS software: it does not require source code, and it imposes a roughly 73% performance penalty on Apaches normal operation. Second, we introduce repair policy to assist the healing process and improve the semantic correctness of the repair. Finally, STEM can create behavior profiles based on aspects of data and control flow.


Archive | 2006

Quantifying Application Behavior Space for Detection and Self-Healing

Michael E. Locasto; Angelos Stavrou; Gabriela F. Cretu; Angelos D. Keromytis; Salvatore J. Stolfo

The increasing sophistication of software attacks has created the need for increasingly finer-grained intrusion and anomaly detection systems, both at the network and the host level. We believe that the next generation of defense mechanisms will require a much more detailed dynamic analysis of application behavior than is currently done. We also note that the same type of behavior analysis is needed by the current embryonic attempts at self-healing systems. Because such mechanisms are currently perceived as too expensive in terms of their performance impact, questions relating to the feasibility and value of such analysis remain unexplored and unanswered. We present a new mechanism for profiling the behavior space of an application by analyzing all function calls made by the process, including regular functions and library calls, as well as system calls. We derive behavior from aspects of both control and data flow. We show how to build and check profiles that contain this information at the binary level – that is, without making changes to the application’s source, the operating system, or the compiler. This capability makes our system, Lugrind, applicable to a variety of software, including COTS applications. Profiles built for the applications we tested can predict behavior with 97% accuracy given a context window of 15 functions. Lugrind demonstrates the feasibility of combining binary-level behavior profiling with detection and automated repair.


Computer Science Technical Report Series | 2007

A Model for Automatically Repairing Execution Integrity

Michael E. Locasto; Gabriela F. Cretu; Angelos Stavrou; Angelos D. Keromytis

Many users value applications that continue execution in the face of attacks. Current software protection techniques typically abort a process after an intrusion attempt (e.g., a code injection attack). We explore ways in which the security property of integrity can support availability. We extend the ClarkWilson Integrity Model to provide primitives and rules for specifying and enforcing repair mechanisms and validation of those repairs. Users or administrators can use this model to write or automatically synthesize repair policy. The policy can help customize an application’s response to attack. We describe two prototype implementations for transparently applying these policies without modifying source code.


international workshop on security | 2008

Return Value Predictability Profiles for Self---healing

Michael E. Locasto; Angelos Stavrou; Gabriela F. Cretu; Angelos D. Keromytis; Salvatore J. Stolfo

Current embryonic attempts at software self---healing produce mechanisms that are often oblivious to the semantics of the code they supervise. We believe that, in order to help inform runtime repair strategies, such systems require a more detailed analysis of dynamic application behavior. We describe how to profile an application by analyzing all function calls (including library and system) made by a process. We create predictability profiles of the return values of those function calls. Self---healing mechanisms that rely on a transactional approach to repair (that is, rolling back execution to a known safe point in control flow or slicing off the current function sequence) can benefit from these return value predictability profiles. Profiles built for the applications we tested can predict behavior with 97% accuracy given a context window of 15 functions. We also present a survey of the distribution of actual return values for real software as well as a novel way of visualizing both the macro and micro structure of the return value distributions. Our system helps demonstrate the feasibility of combining binary---level behavior profiling with self---healing repairs.


Archive | 2007

Online Training and Sanitization of AD Systems

Gabriela F. Cretu; Angelos Stavrou; Michael E. Locasto; Salvatore J. Stolfo

In this paper, we introduce novel techniques that enhance the training phase of Anomaly Detection (AD) sensors. Our aim is to both improve the detection performance and protect against attacks that target the training dataset. Our approach is two pronged: we employ a novel sanitization method for large training datasets that removes attacks and traffic artifacts by measuring their frequency and position inside the dataset. Furthermore, we extend the training phase in the spatial dimension to include model information from other collaborative systems. We demonstrate that by doing so we can protect all the participating systems against targeted training attacks. Another aspect of our system is its ability to adapt and update the normality model when there is a shift in the nature of inspected traffic that reflects actual changes in the back-end servers. Such “on-line” training appears to be the “Achilles’ heel” of AD sensors because they fail to adapt when there is a legitimate deviation in the traffic behavior, thereby flooding the operator with false positives. To counter that, we discuss the integration of what we call a shadow sensor with the AD system. This sensor complements our techniques by acting as an oracle to analyze and classify the resulting “suspect data” identified by the AD sensor. We show that our techniques can be applied to a wide range of unmodified AD sensors without incurring significant additional computational cost beyond the initial training phase.


ieee symposium on security and privacy | 2008

Casting out Demons: Sanitizing Training Data for Anomaly Sensors

Gabriela F. Cretu; Angelos Stavrou; Michael E. Locasto; Salvatore J. Stolfo; Angelos D. Keromytis


Archive | 2007

Methods, systems and media for software self-healing

Michael E. Locasto; Angelos D. Keromytis; Salvatore J. Stolfo; Angelos Stavrou; Gabriela F. Cretu; Stylianos Sidiroglou; Jason Nieh; Oren Laadan


Archive | 2007

Method and apparatus for detecting vulnerabilities and bugs in software applications

Vugranam C. Sreedhar; Gabriela F. Cretu; Julian T. Dolby


consumer communications and networking conference | 2006

Intrusion and anomaly detection model exchange for mobile ad-hoc networks

Gabriela F. Cretu; Janak J. Parekh; Ke Wang; Salvatore J. Stolfo


Archive | 2013

Systems, methods, and media for generating sanitized data, sanitizing anomaly detection models, and/or generating sanitized anomaly detection models

Gabriela F. Cretu; Angelos Stavrou; Salvatore J. Stolfo; Angelos D. Keromytis; Michael E. Locasto

Collaboration


Dive into the Gabriela F. Cretu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge