Lucian Carata
University of Cambridge
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Lucian Carata.
ACM Queue | 2014
Lucian Carata; Sherif Akoush; Nikilesh Balakrishnan; Thomas Bytheway; Ripduman Sohan; Margo I. Seltzer; Andy Hopper
Assessing the quality or validity of a piece of data is not usually done in isolation. You typically examine the context in which the data appears and try to determine its original sources or review the process through which it was created. This is not so straightforward when dealing with digital data, however: the result of a computation might have been derived from numerous sources and by applying complex successive transformations, possibly over long periods of time.
asia pacific workshop on systems | 2017
Nikilesh Balakrishnan; Lucian Carata; Thomas Bytheway; Ripduman Sohan; Andy Hopper
It is currently impossible for an application to verify that the data it passes to the kernel for storage is actually submitted to an underlying device or that the data returned to an application by the kernel has actually originated from an underlying device. A compromised or malicious OS can silently discard data written by the application or return fabricated data during a read operation. This is a serious data integrity issue for use-cases where verifiable storage and retrieval of data is a necessary precondition for ensuring correct operation, for example with secure logging, APT monitoring and compliance. We outline a solution for verifiable data storage and retrieval by providing a trustworthy mechanism, based on Intel SGX, to authenticate and verify request data at both the application and storage device endpoints. Even in the presence of a malicious OS our design ensures the authenticity and integrity of data while performing disk I/O and detects any data loss attributable to the untrusted OS fabricating or discarding read and write requests respectively. We provide a nascent prototype implementation for the core system together with an evaluation highlighting the temporal overheads imposed by this mechanism.
TaPP | 2017
Graeme Jenkinson; Lucian Carata; Nikilesh Balakrishnan; Thomas Bytheway; Ripduman Sohan; Robert N. M. Watson; Jonathan Anderson; Brian J. Kidney; A Strnad; A Thomas; G Neville-Neil
Advanced Persistent Threats (APT) are a class of security threats in which a well-resourced attacker targets a specific individual or organisation with a predefined goal. This typically involves exfiltration of confidential material, although increasingly attacks target the encryption or destruction of mission critical data. With traditional prevention and detection mechanisms failing to stem the tide of such attacks, there is a pressing need for new monitoring and analysis tools that reduce both false-positive rates and the cognitive burden on human analysts. We propose that local and distributed provenance metadata can simplify and improve monitoring and analysis of APTs by providing a single, authoritative sequence of events that captures the context (and side effects) of potentially malicious activities. Provenance metadata allows a human analyst to backtrack from detection of malicious activity to the point of intrusion and, similarly, to work forward to fully understand the consequences. Applying provenance to APT monitoring and analysis introduces some significantly different challenges and requirements in comparison to more traditional applications. Drawing from our experiences working with and adapting the OPUS (Observed Provenance in User Space) system to an APT monitoring and analysis use case, we introduce and discuss some of the key challenges in this space. These preliminary observations are intended Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. TaPP 2017, June 22-23, 2017, Seattle, Washington. Copyright remains with the owner/author(s). to prime a discussion within the community about the design space for scalable, efficient and trustworthy distributed provenance for scenarios that impose different constraints from traditional provenance applications such as workflow and data processing frameworks. CCS Concepts • Information systems → Data provenance; •Software and its engineering → Distributed systems organizing principles; •Security and privacy → Distributed systems security
international provenance and annotation workshop | 2018
Jyothish Soman; Thomas Bytheway; Lucian Carata; Nikilesh Balakrishnan; Ripduman Sohan; Robert N. M. Watson
System based provenance generates traces captured from various systems, a representation method for inferring these traces is a graph. These graphs are not well understood, and current work focuses on their extraction and processing, without a thorough characterization being in place. This paper studies the topology of such graphs. We analyze multiple Whole-system-Provenance graphs and present that they have hubs-and-authorities model of graphs as well as a power law distribution. Our observations allow for a novel understanding of the structure of Whole-system-Provenance graphs.
asia pacific workshop on systems | 2015
Oliver R. A. Chick; Lucian Carata; James Snee; Nikilesh Balakrishnan; Ripduman Sohan
Existing operating systems share a common kernel text section amongst all processes. It is not possible to perform kernel specialization or tuning such that different applications execute text optimized for their kernel use despite the benefits of kernel specialization for performance guided optimization, exokernels, kernel fastpaths, and cheaper hardware access. Current specialization primitives involve system wide changes to kernel text, which can have adverse effects on other processes sharing the kernel due to the global side-effects. We present shadow kernels: a primitive that allows multiple kernel text sections to coexist in a contemporary operating system. By remapping kernel virtual memory on a context-switch, or for individual system calls, we specialize the kernel on a fine-grained basis. Our implementation of shadow kernels uses the Xen hypervisor so can be applied to any operating system that runs on Xen.
ieee international conference on cloud computing technology and science | 2014
Sherif Akoush; Lucian Carata; Ripduman Sohan; Andy Hopper
TaPP '13 Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance | 2013
Lucian Carata; Ripduman Sohan; Andrew C. Rice; Andy Hopper
ieee international conference on cloud computing technology and science | 2015
James Snee; Lucian Carata; Oliver R. A. Chick; Ripduman Sohan; Ramsey M. Faragher; Andrew C. Rice; Andy Hopper
TaPP'15 Proceedings of the 7th USENIX Conference on Theory and Practice of Provenance | 2015
Nikilesh Balakrishnan; Thomas Bytheway; Lucian Carata; Oliver R. A. Chick; James Snee; Sherif Akoush; Ripduman Sohan; Margo I. Seltzer; Andy Hopper
TaPP'16 Proceedings of the 8th USENIX Conference on Theory and Practice of Provenance | 2016
Nikilesh Balakrishnan; Thomas Bytheway; Lucian Carata; Ripduman Sohan; Andy Hopper