Matthias Vallentin
University of California, Berkeley
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Matthias Vallentin.
recent advances in intrusion detection | 2007
Matthias Vallentin; Robin Sommer; Jason Lee; Craig Leres; Vern Paxson; Brian Tierney
In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addresses three challenges: (i) distributing traffic evenly across an extensible set of analysis nodes in a fashion that minimizes the communication required for coordination, (ii) adapting the NIDSs operation to support coordinating its low-level analysis rather than just aggregating alerts; and (iii) validating that the cluster produces sound results. Prototypes of our NIDS cluster now operate at the Lawrence Berkeley National Laboratory and the University of California at Berkeley. In both environments the clusters greatly enhance the power of the network security monitoring.
annual computer security applications conference | 2013
Bernhard Amann; Robin Sommer; Matthias Vallentin; Seth Hall
Much of the Internets end-to-end security relies on the SSL/TLS protocol along with its underlying X.509 certificate infrastructure. However, the system remains quite brittle due to its liberal delegation of signing authority: a single compromised certification authority undermines trust globally. Several recent high-profile incidents have demonstrated this shortcoming convincingly. Over time, the security community has proposed a number of counter measures to increase the security of the certificate ecosystem; many of these efforts monitor for what they consider tell-tale signs of man-in-the-middle attacks. In this work we set out to understand to which degree benign changes to the certificate ecosystem share structural properties with attacks, based on a large-scale data set of more than 17 billion SSL sessions. We find that common intuition falls short in assessing the maliciousness of an unknown certificate, since their typical artifacts routinely occur in benign contexts as well. We also discuss what impact our observations have on proposals aiming to improve the security of the SSL ecosystem.
acm workshop on networked systems for developing regions | 2011
Yahel Ben-David; Shaddi Hasan; Joyojeet Pal; Matthias Vallentin; Saurabh Panjwani; Philipp Gutheim; Jay Chen; Eric A. Brewer
Technology users in the developing world face a varied and complex set of computer security concerns. These challenges are deeply tied to a range of contextual factors including poor infrastructure, non-traditional usage patterns, and different attitudes towards security, which make simply importing security solutions from industrialized nations inadequate. Recognizing this, we describe some of the specific security risks in developing regions and their relationships with technical, political, social, and economic factors. We present concrete examples of how these factors affect the security of individuals, groups, and key applications such as mobile banking. Our analysis highlights the urgency of the concerns that need attention and presents an important intellectual challenge for the research community.
internet measurement conference | 2014
Robin Sommer; Matthias Vallentin; Lorenzo De Carli; Vern Paxson
When developing networking systems such as firewalls, routers, and intrusion detection systems, one faces a striking gap between the ease with which one can often describe a desired analysis in high-level terms, and the tremendous amount of low-level implementation details that one must still grapple with to come to a robust solution. We present HILTI, a platform that bridges this divide by providing to application developers much of the low-level functionality, without tying it to a specific analysis structure. HILTI consists of two parts: (1) an abstract machine model that we tailor specifically to the networking domain, directly supporting the fields common abstractions and idioms in its instruction set; and (2) a compilation strategy for turning programs written for the abstract machine into optimized, natively executable code. We have developed a prototype of the HILTI compiler toolchain that fully implements the designs functionality, and ported exemplars of networking applications to the HILTI model to demonstrate the aptness of its abstractions. Our evaluation of HILTIs functionality and performance confirms its potential to become a powerful platform for future application development.
acm special interest group on data communication | 2015
Matthias Vallentin; Dominik Charousset; Thomas C. Schmidt; Vern Paxson; Matthias Wählisch
When an organization detects a security breach, it undertakes a forensic analysis to figure out what happened. This investigation involves inspecting a wide range of heterogeneous data sources spanning over a long period of time. The iterative nature of the analysis procedure requires an interactive experience with the data. However, the distributed processing paradigms we find in practice today fail to provide this requirement: the batch-oriented nature of MapReduce cannot deliver sub-second round-trip times, and distributed in-memory processing cannot store the terabytes of activity logs needed to inspect during an incident. We present the design and implementation of Visibility Across Space and Time (VAST), a distributed database to support interactive network forensics, and libcppa, its exceptionally scalable messaging core. The extended actor framework libcppa enables VAST to distribute lightweight tasks at negligible overhead. In our live demo, we showcase how VAST enables security analysts to grapple with the huge amounts of data often associated with incident investigations.
international world wide web conferences | 2013
Devdatta Akhawe; Bernhard Amann; Matthias Vallentin; Robin Sommer
international conference on detection of intrusions and malware and vulnerability assessment | 2011
Gregor Maier; Anja Feldmann; Vern Paxson; Robin Sommer; Matthias Vallentin
acm workshop on networked systems for developing regions | 2010
Yahel Ben-David; Matthias Vallentin; Seth Fowler; Eric A. Brewer
networked systems design and implementation | 2016
Matthias Vallentin; Vern Paxson; Robin Sommer
TinyToCS | 2015
Johanna Amann; Robin Sommer; Matthias Vallentin; Seth Hall