Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Robert J. Walls is active.

Publication


Featured researches published by Robert J. Walls.


ieee symposium on security and privacy | 2016

Domain-Z: 28 Registrations Later Measuring the Exploitation of Residual Trust in Domains

Chaz Lever; Robert J. Walls; Yacin Nadji; David Dagon; Patrick D. McDaniel; Manos Antonakakis

Any individual that re-registers an expired domain implicitly inherits the residual trust associated with the domains prior use. We find that adversaries can, and do, use malicious re-registration to exploit domain ownership changes - undermining the security of both users and systems. In fact, we find that many seemingly disparate security problems share a root cause in residual domain trust abuse. With this study we shed light on the seemingly unnoticed problem of residual domain trust by measuring the scope and growth of this abuse over the past six years. During this time, we identified 27,758 domains from public blacklists and 238,279 domains resolved by malware that expired and then were maliciously re-registered. To help address this problem, we propose a technical remedy and discuss several policy remedies. For the former, we develop Alembic, a lightweight algorithm that uses only passive observations from the Domain Name System (DNS) to flag potential domain ownership changes. We identify several instances of residual trust abuse using this algorithm, including an expired APT domain that could be used to revive existing infections.


military communications conference | 2015

Malware traffic detection using tamper resistant features

Z. Berkay Celik; Robert J. Walls; Patrick D. McDaniel; Ananthram Swami

This paper presents a framework for evaluating the transport layer feature space of malware heartbeat traffic. We utilize these features in a prototype detection system to distinguish malware traffic from traffic generated by legitimate applications. In contrast to previous work, we eliminate features at risk of producing overly optimistic detection results, detect previously unobserved anomalous behavior, and rely only on tamper-resistant features making it difficult for sophisticated malware to avoid detection. Further, we characterize the evolution of malware evasion techniques over time by examining the behavior of 16 malware families. In particular, we highlight the difficultly of detecting malware that use traffic-shaping techniques to mimic legitimate traffic.


internet measurement conference | 2015

Measuring the Impact and Perception of Acceptable Advertisements

Robert J. Walls; Eric D. Kilmer; Nathaniel Lageman; Patrick D. McDaniel

In 2011, Adblock Plus---the most widely-used ad blocking software---began to permit some advertisements as part of their Acceptable Ads program. Under this program, some ad networks and content providers pay to have their advertisements shown to users. Such practices have been controversial among both users and publishers. In a step towards informing the discussion about these practices, we present the first comprehensive study of the Acceptable Ads program. Specifically, we characterize which advertisements are allowed and how the whitelisting has changed since its introduction in 2011. We show that the list of filters used to whitelist acceptable advertisements has been updated on average every 1.5 days and grew from 9 filters in 2011 to over 5,900 in the Spring of 2015. More broadly, the current whitelist triggers filters on 59% of the top 5,000 websites. Our measurements also show that the program allows advertisements on 2.6 million parked domains. Lastly, we take the lessons learned from our analysis and suggest ways to improve the transparency of the whitelisting process.


Proceedings of the First ACM Workshop on Moving Target Defense | 2014

Security and Science of Agility

Patrick D. McDaniel; Trent Jaeger; Thomas F. La Porta; Nicolas Papernot; Robert J. Walls; Alexander Kott; Lisa M. Marvel; Ananthram Swami; Prasant Mohapatra; Srikanth V. Krishnamurthy; Iulian Neamtiu

Moving target defenses alter the environment in response to adversarial action and perceived threats. Such defenses are a specific example of a broader class of system management techniques called system agility. In its fullest generality, agility is any reasoned modification to a system or environment in response to a functional, performance, or security need. This paper details a recently launched 10-year Cyber-Security Collaborative Research Alliance effort focused in-part on the development of a new science of system agility, of which moving target defenses are a central theme. In this context, the consortium seeks to address the questions of when, what, and how to employ changes to improve the security of an environment, as well as consider how to measure and weigh the effectiveness of different approaches to agility. We discuss several fundamental challenges in developing and using MTD maneuvers, and outline several broad classes of mechanisms that can be used to implement them. We conclude by detailing specific MTD mechanisms used to adaptively quarantine vulnerable code in Android applications, and consider ways of comparing cost and payout of its use.


international symposium on software reliability engineering | 2015

Discovering specification violations in networked software systems

Robert J. Walls; Yuriy Bruii; Marc Liberatore; Brian Neil Levine

Publicly released software implementations of network protocols often have bugs that arise from latent specification violations. We present Ape, a technique that explores program behavior to identify potential specification violations. Ape overcomes the challenge of exploring the large space of behavior by dynamically inferring precise models of behavior, stimulating unobserved behavior likely to lead to violations, and refining the behavioral models with the new, stimulated behavior. Ape can (1) discover new specification violations, (2) verify that violations are removed, (3) identify related violations in other versions and implementations of the protocols, and (4) generate tests. Ape works on binaries and requires a lightweight description of the protocols network messages and a violation characteristic. We use Ape to rediscover the known heartbleed bug in OpenSSL, and discover one unknown bug and two unexpected uses of three popular BitTorrent clients. Manual inspection of Ape-produced artifacts reveals four additional, previously unknown specification violations in OpenSSL and μTorrent.


ieee symposium on security and privacy | 2017

Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains

Chaz Lever; Robert J. Walls; Yacin Nadji; David Dagon; Patrick D. McDaniel; Manos Antonakakis

An individual who re-registers an expired domain implicitly inherits the residual trust associated with the domains prior use. Adversaries can, and increasingly do, exploit these ownership changes to undermine the security of both users and systems. In fact, many seemingly disparate security problems share a root cause in residual trust abuse. As we enter the dawn of the dead domain, new techniques and policies are needed to fight this growing threat.


military communications conference | 2016

Mapping sample scenarios to operational models

Z. Berkay Celik; Nan Hu; Yun Li; Nicolas Papernot; Patrick D. McDaniel; Robert J. Walls; Jeff Rowe; Karl N. Levitt; Novella Bartolini; Thomas F. La Porta; Ritu Chadha

Achieving mission objectives in complex and increasingly adversarial networks is difficult even under the best of circumstances. Currently, there are few tools for reasoning about how to react to rapid changes in a given networks environmental state; that is, we do not know how to cope with adversarial actions in hostile environments. In this paper, we consider a preliminary operational model that combines the states, detection outputs, and agility maneuvers associated with a cyber-operation in hostile networks. The goal is positing the development of an operational model to aid in the successful completion of mission objectives with a minimal maneuver cost. We present a host remediation case study that explores the efficacy of the proposed model in aiding operation completion.


international conference on security and privacy in communication systems | 2016

BinDNN: Resilient Function Matching Using Deep Learning.

Nathaniel Lageman; Eric D. Kilmer; Robert J. Walls; Patrick D. McDaniel

Determining if two functions taken from different compiled binaries originate from the same function in the source code has many applications to malware reverse engineering. Namely, this process allows an analyst to filter large swaths of code, removing functions that have been previously observed or those that originate in shared or trusted libraries. However, this task is challenging due to the myriad factors that influence the translation between source code and assembly instructions—the instruction stream created by a compiler is heavily influenced by a number of factors including optimizations, target platforms, and runtime constraints. In this paper, we seek to advance methods for reliably testing the equivalence of functions found in different executables. By leveraging advances in deep learning and natural language processing, we design and evaluate a novel algorithm, BinDNN, that is resilient to variations in compiler, compiler optimization level, and architecture. We show that BinDNN is effective both in isolation or in conjunction with existing approaches. In the case of the latter, we boost performance by 109% when combining BinDNN with BinDiff to compare functions across architectures. This result—an improvement of 32% for BinDNN and 185% for BinDiff—demonstrates the utility of employing multiple orthogonal approaches to function matching.


military communications conference | 2015

Computational ontology of network operations

Alessandro Oltramari; Lorrie Faith Cranor; Robert J. Walls; Patrick D. McDaniel

In this article we outline an ontology of secure operations in cyberspace, describing its primary characteristics through some basic modeling examples. We make the case for adopting a rigorous semantic model of cyber security to overcome the current limits of the state of the art, namely lack of comprehensive knowledge representation and effective automatic reasoning functionalities.


military communications conference | 2015

Enforcing agile access control policies in relational databases using views

Nicolas Papernot; Patrick D. McDaniel; Robert J. Walls

Access control is used in databases to prevent unauthorized retrieval and tampering of stored data, as defined by policies. Various policy models provide different protections and guarantees against illegal accesses, but none is able to offer a universal fit for all access control needs. Therefore, the static nature of access control mechanisms deployed in commercial databases limit the security guarantees provided. They require time-consuming and error-prone efforts to adapt access control policies to evolving security contexts. In contrast, we propose a fully automated and agile approach to access control enforcement in relational databases. We present tractable algorithms that enforce any policy expressible using the high-level syntax of the Authorization Specification Language. This includes complex policies involving information flow control or user history dependencies. Our method does not require any modification to the database schema or user queries, thus allowing for a transparent implementation in existing systems. We demonstrate our findings by formulating two classic access control models: the Bell-LaPadula model and the Chinese Wall policy.

Collaboration


Dive into the Robert J. Walls's collaboration.

Top Co-Authors

Avatar

Patrick D. McDaniel

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Nicolas Papernot

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chaz Lever

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

David Dagon

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Eric D. Kilmer

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manos Antonakakis

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Nathaniel Lageman

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Thomas F. La Porta

Pennsylvania State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge