Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jonathon T. Giffin is active.

Publication


Featured researches published by Jonathon T. Giffin.


ieee symposium on security and privacy | 2004

Formalizing sensitivity in static analysis for intrusion detection

Henry Hanping Feng; Jonathon T. Giffin; Yong Huang; Somesh Jha; Wenke Lee; Barton P. Miller

A key function of a host-based intrusion detection system is to monitor program execution. Models constructed using static analysis have the highly desirable feature that they do not produce false alarms; however, they may still miss attacks. Prior work has shown a trade-off between efficiency and precision. In particular, the more accurate models based upon pushdown automata (PDA) are very inefficient to operate due to non-determinism in stack activity. In this paper, we present techniques for determinizing PDA models. We first provide a formal analysis framework of PDA models and introduce the concepts of determinism and stack-determinism. We then present the VP-Static model, which achieves determinism by extracting information about stack activity of the program, and the Dyck model, which achieves stack-determinism by transforming the program and inserting code to expose program state. Our results show that in run-time monitoring, our models slow execution of our test programs by 1% to 135%. This shows that reasonable efficiency needs not be sacrificed for model precision. We also compare the two models and discover that deterministic PDA are more efficient, although stack-deterministic PDA require less memory.


annual computer security applications conference | 2005

Strengthening software self-checksumming via self-modifying code

Jonathon T. Giffin; Mihai Christodorescu; Louis Kruger

Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack against such programs that renders code modifications undetectable to any self-checksumming routine. The attack replicated pages of program text and altered values in hardware data structures so that data reads and instruction fetches retrieved values from different memory pages. A cornerstone of their attack was its applicability to a variety of commodity hardware: they could alter memory accesses using only a malicious operating system. In this paper, we show that their page-replication attack can be detected by self-checksumming programs with self-modifying code. Our detection is efficient, adding less than 1 microsecond to each checksum computation in our experiments on three processor families, and is robust up to attacks using either costly interpretive emulation or specialized hardware


recent advances in intrusion detection | 2005

Environment-sensitive intrusion detection

Jonathon T. Giffin; David Dagon; Somesh Jha; Wenke Lee; Barton P. Miller

We perform host-based intrusion detection by constructing a model from a programs binary code and then restricting the programs execution by the model. We improve the effectiveness of such model-based intrusion detection systems by incorporating into the model knowledge of the environment in which the program runs, and by increasing the accuracy of our models with a new data-flow analysis algorithm for context-sensitive recovery of static data. n nThe environment—configuration files, command-line parameters, and environment variables—constrains acceptable process execution. Environment dependencies added to a program model update the model to the current environment at every program execution. n nOur new static data-flow analysis associates a programs data flows with specific calling contexts that use the data. We use this analysis to differentiate system-call arguments flowing from distinct call sites in the program. n nUsing a new average reachability measure suitable for evaluation of call-stack-based program models, we demonstrate that our techniques improve the precision of several test programs models from 76% to 100%.


computer and communications security | 2005

An auctioning reputation system based on anomaly

Shai Rubin; Mihai Christodorescu; Vinod Ganapathy; Jonathon T. Giffin; Louis Kruger; Hao Wang; Nicholas Kidd

Existing reputation systems used by online auction houses do not address the concern of a buyer shopping for commodities - finding a good bargain. These systems do not provide information on the practices adopted by sellers to ensure profitable auctions. These practices may be legitimate, like imposing a minimum starting bid on an auction, or fraudulent, like using colluding bidders to inflate the final price in a practice known as shilling.We develop a reputation system to help buyers identify sellers whose auctions seem price-inflated. Our reputation system is based upon models that characterize sellers according to statistical metrics related to price inflation. We combine the statistical models with anomaly detection techniques to identify the set of suspicious sellers. The output of our reputation system is a set of values for each seller representing the confidence with which the system can say that the auctions of the seller are price-inflated.We evaluate our reputation system on 604 high-volume sellers who posted 37,525 auctions on eBay. Our system automatically pinpoints sellers whose auctions contain potential shill bidders. When we manually analyze these sellers auctions, we find that many winning bids are at about the items market values, thus undercutting a buyers ability to find a bargain and demonstrating the effectiveness of our reputation system.


recent advances in intrusion detection | 2006

Automated discovery of mimicry attacks

Jonathon T. Giffin; Somesh Jha; Barton P. Miller

Model-based anomaly detection systems restrict program execution by a predefined model of allowed system call sequences. These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model. Our work helps to automate the discovery of such attacks. We start with two models: a program model of the applications system call behavior and a model of security-critical operating system state. Given unsafe OS state configurations that describe the goals of an attack, we then find system call sequences allowed as valid execution by the program model that produce the unsafe configurations. Our experiments show that we can automatically find attack sequences in models of programs such as wu-ftpd and passwd that previously have only been discovered manually. When undetected attacks are present, we frequently find the sequences with less than 2 seconds of computation.


annual computer security applications conference | 2012

Efficient protection of kernel data structures via object partitioning

Abhinav Srivastava; Jonathon T. Giffin

Commodity operating system kernels isolate applications via separate memory address spaces provided by virtual memory management hardware. However, kernel memory is unified and mixes core kernel code with driver components of different provenance. Kernel-level malicious software exploits this lack of isolation between the kernel and its modules by illicitly modifying security-critical kernel data structures. In this paper, we design an access control policy and enforcement system that prevents kernel components with low trust from altering security-critical data used by the kernel to manage its own execution. Our policies are at the granularity of kernel variables and structure elements, and they can protect data structures dynamically allocated at runtime. Our hypervisor-based design uses memory page protection bits as part of its policy enforcement. The granularity difference between page-level protection and variable-level policies challenges the systems ability to remain performant. We develop kernel data-layout partitioning and reorganization techniques to maintain kernel performance in the presence of our protections. We show that our system can prevent malicious modifications to security-critical kernel data with small overhead. By offering protection for critical kernel data structures, we can detect unknown kernel-level malware and guarantee that security utilities relying on the integrity of kernel-level state remain accurate.


usenix security symposium | 2005

An architecture for generating semantics-aware signatures

Vinod Yegneswaran; Jonathon T. Giffin; Paul Barford; Somesh Jha


network and distributed system security symposium | 2008

Impeding Malware Analysis Using Conditional Code Obfuscation.

Monirul I. Sharif; Andrea Lanzi; Jonathon T. Giffin; Wenke Lee


network and distributed system security symposium | 2004

Efficient Context-Sensitive Intrusion Detection.

Jonathon T. Giffin; Somesh Jha; Barton P. Miller


usenix security symposium | 2002

Detecting Manipulated Remote Call Streams

Jonathon T. Giffin; Somesh Jha; Barton P. Miller

Collaboration


Dive into the Jonathon T. Giffin's collaboration.

Top Co-Authors

Avatar

Somesh Jha

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar

Barton P. Miller

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar

Wenke Lee

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Louis Kruger

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar

David Dagon

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hao Wang

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar

Henry Hanping Feng

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Monirul I. Sharif

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Nicholas Kidd

University of Wisconsin-Madison

View shared research outputs
Researchain Logo
Decentralizing Knowledge