Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John D. Powell is active.

Publication


Featured researches published by John D. Powell.


annual software engineering workshop | 2001

Reducing software security risk through an integrated approach

David P. Gilliam; John D. Powell; John C. Kelly; Matt Bishop

The paper presents joint work by the California Institute of Technologys Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the National Aeronautics and Space Administration Goddard Independent Verification and Validation Facility to develop a security assessment instrument for the software development and maintenance life cycle. The paper presents research on the generation of a software security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.


workshops on enabling technologies infrastracture for collaborative enterprises | 2001

Development of a software security assessment instrument to reduce software security risk

David P. Gilliam; John C. Kelly; John D. Powell; Matt Bishop

The paper discusses joint work by the California Institute of Technologys Jet Propulsion Laboratory and the University of California at Davis (CC Davis) sponsored by the National Aeronautics and Space Administration to develop a security assessment instrument for the software development and maintenance life cycle. The assessment instrument is a collection of tools and procedures to support development of secure software. Specifically, the instrument offers a formal approach for engineering network security into software systems and application throughout the software development and maintenance life cycle. The security assessment instrument includes a Vulnerability Matrix (VMatrix) with platform/application, and signature fields in a database. The information in the VMatrix has become the basis for the Database of Vulnerabilities, Exploits, and Signatures (DOVES) at UC Davis. The instrument also includes a set of Security Assessment Tools (SAT), including the development of a property-based testing tool by UC Davis, to slice software code looking for specific vulnerability properties. A third component of the research is an investigation into the verification of software designs for compliance to security properties. This is based on innovative model checking approaches that will facilitate the development and verification of software security models.


annual software engineering workshop | 2003

Addressing software security and mitigations in the life cycle

David P. Gilliam; John D. Powell; Eric Haugh; Matt Bishop

Traditionally, security is viewed as an organizational and information technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security settings and patches to the operating system (OS) and applications running on it. Until recently, little thought has been given to the importance of security as a formal approach in the software life cycle. The Jet Propulsion Laboratory has approached the problem through the development of an integrated formal software security assessment instrument (SSAI) with six foci for the software life cycle.


workshops on enabling technologies: infrastracture for collaborative enterprises | 2005

Application of lightweight formal methods to software security

David P. Gilliam; John D. Powell; Matt Bishop

Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines several formal techniques can increase the confidence in the verification of software security properties. Such an approach which specifies security properties in a library that can be re-used by 2 instruments and their methodologies developed for the National Aeronautics and Space Administration (NASA) at the Jet Propulsion Laboratory (JPL) are described herein The flexible modeling framework (FMF) is a model based verification instrument that uses Promela and the SPIN model checker. The property based tester (PET) uses TASPEC and a test execution monitor (TEM). They are used to reduce vulnerabilities and unwanted exposures in software during the development and maintenance life cycles. These instruments are currently being piloted with a COTS server-agent application.


workshops on enabling technologies: infrastracture for collaborative enterprises | 2002

Integrating a flexible modeling framework (FMF) with the network security assessment instrument to reduce software security risk

David P. Gilliam; John D. Powell

The network security assessment instrument is a comprehensive set of tools that can be used individually or collectively to ensure the security of network aware software applications and systems. Using the various tools collectively provide a distinct advantage for assuring the security of software and systems. Each tools resulting output provides feedback into the other tools. Thus, more comprehensive assessment results are attained through the leverage each tool provides to the other when they are employed in concert. Previous portions of this work were presented at the IEEE Wet Ice 2000 and 2001 Workshops and are printed in those proceedings. This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles. This portion, the flexible modeling framework (FMF), focuses on modeling requirements and early lifecycle designs to discover vulnerabilities that result from interaction between system components that are either under development in a new system or proposed as additions to an existing system. There are early indications that this new approach, the flexible modeling framework (FMF), has promise in the areas of network security as well as other critical areas such as system safety. Information about the overall research effort regarding network security is available at http://security.jpl.nasa.gov/rssr.


workshops on enabling technologies: infrastracture for collaborative enterprises | 2006

Security Verification Techniques Applied to PatchLink COTS Software

David P. Gilliam; John D. Powell; Matt Bishop; Chris Andrew; Sameer Jog

Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security of software artifacts. Such an approach has been developed by the Jet Propulsion Laboratory (JPL) and the University of California at Davis (UC Davis). Two security verification instruments were developed and then piloted on PatchLinks UNIX agent, a commercial-off-the-shelf (COTS) software product, to assess the value of the instruments and the approach. The two instruments are the flexible modeling framework (FMF) - a model-based verification instrument (JPL), and a property-based tester (UC Davis). Security properties were formally specified for the COTS artifact and then verified using these instruments. The results were then reviewed to determine the effectiveness of the approach and the security of the COTS product


Archive | 2004

Model based verification of the Secure Socket Layer (SSL) Protocol for NASA systems

John D. Powell; David P. Gilliam


Archive | 2006

PatchLink Unix agent verification and assessment

David P. Gilliam; John D. Powell; Matt Bishop; Chris Andrew; Sameer Jog


Archive | 2005

Reducing software security risk through an integrated approach : SAS '05 Executive briefing

David P. Gilliam; John D. Powell; Matt Bishop


Archive | 2004

Reducing software security risk

David P. Gilliam; John D. Powell; Matt Bishop

Collaboration


Dive into the John D. Powell's collaboration.

Top Co-Authors

Avatar

David P. Gilliam

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Matt Bishop

University of California

View shared research outputs
Top Co-Authors

Avatar

John C. Kelly

California Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge