Umesh Shankar
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Umesh Shankar.
workshop on wireless security | 2003
Naveen Sastry; Umesh Shankar; David A. Wagner
With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.
symposium on access control models and technologies | 2006
Trent Jaeger; Reiner Sailer; Umesh Shankar
We propose an integrity measurement approach based on information flow integrity,which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA).The recent availability of secure hardware has made it practical for a system to measure its own integrity, such that it can generate an integrity proof for remote parties. Various approaches have been proposed,but most simply measure the loaded code and static data to approximate runtime system integrity.We find that these approaches suffer from two problems: (1)the load-time measurements of code alone do not accurately reflect runtime behaviors,such as the use of untrusted network data,and (2) they are ineficient,requiring all measured entities to be known and fully trusted even if they have no impact on the target application.Classical integrity models are based on information flow,so we design the PRIMA approach to enable measurement of information flow integrity and prove that it achieves these goals. We prove how a remote party can verify useful information flow integrity properties using PRIMA. A PRIMA prototype has been built based on the open-source Linux Integrity Measurement Architecture (IMA)using SELinux policies to provide the information flow.
IEEE Computer | 2012
Dawn Song; Elaine Shi; Ian Fischer; Umesh Shankar
Offering strong data protection to cloud users while enabling rich applications is a challenging task. Researchers explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.
recent advances in intrusion detection | 2002
David L. Donoho; Ana Georgina Flesia; Umesh Shankar; Vern Paxson; Jason Coit; Stuart Staniford
Computer attackers frequently relay their attacks through a compromised host at an innocent site, thereby obscuring the true origin of the attack. There is a growing literature on ways to detect that an interactive connection into a site and another outbound from the site give evidence of such a stepping stone. This has been done based on monitoring the access link connecting the site to the Internet (Eg. [7,11, 8]). The earliest work was based on connection content comparisons but more recent work has relied on timing information in order to compare encrypted connections. Past work on this problem has not yet attempted to cope with the ways in which intruders might attempt to modify their traffic to defeat stepping stone detection. In this paper we give the first consideration to constraining such intruder evasion. We present some unexpected results that show there are theoretical limits on the ability of attackers to disguise their traffic in this way for sufficiently long connections. We consider evasions that consist of local jittering of packet arrival times (without addition and subtraction of packets), and also the addition of superfluous packets which will be removed later in the connection chain (chaff). To counter such evasion, we assume that the intruder has a maximum delay tolerance. By using wavelets and similar multiscale methods, we show that we can separate the short-term behavior of the streams - where the jittering or chaff indeed masks the correlation - from the long-term behavior of the streams - where the correlation remains. It therefore appears, at least in principle, that there is an effective countermeasure to this particular evasion tactic, at least for sufficiently long-lived interactive connections.
usenix security symposium | 2001
Umesh Shankar; Kunal Talwar; Jeffrey S. Foster; David A. Wagner
Lecture Notes in Computer Science | 2002
David L. Donoho; Ana Georgina Flesia; Umesh Shankar; Vern Paxson; Jason Coit; Stuart Staniford
ieee symposium on security and privacy | 2003
Umesh Shankar; Vern Paxson
computer and communications security | 2007
Chris Karlof; Umesh Shankar; J. D. Tygar; David A. Wagner
usenix security symposium | 2004
Umesh Shankar; Monica Chew; J. D. Tygar
network and distributed system security symposium | 2006
Umesh Shankar; Trent Jaeger; Reiner Sailer