Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Umesh Shankar is active.

Publication


Featured researches published by Umesh Shankar.


workshop on wireless security | 2003

Secure verification of location claims

Naveen Sastry; Umesh Shankar; David A. Wagner

With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then, we present the Echo protocol, a simple method for secure location verification. The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks. Hence, we believe that it is well suited for use in small, cheap, mobile devices.


symposium on access control models and technologies | 2006

PRIMA: policy-reduced integrity measurement architecture

Trent Jaeger; Reiner Sailer; Umesh Shankar

We propose an integrity measurement approach based on information flow integrity,which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA).The recent availability of secure hardware has made it practical for a system to measure its own integrity, such that it can generate an integrity proof for remote parties. Various approaches have been proposed,but most simply measure the loaded code and static data to approximate runtime system integrity.We find that these approaches suffer from two problems: (1)the load-time measurements of code alone do not accurately reflect runtime behaviors,such as the use of untrusted network data,and (2) they are ineficient,requiring all measured entities to be known and fully trusted even if they have no impact on the target application.Classical integrity models are based on information flow,so we design the PRIMA approach to enable measurement of information flow integrity and prove that it achieves these goals. We prove how a remote party can verify useful information flow integrity properties using PRIMA. A PRIMA prototype has been built based on the open-source Linux Integrity Measurement Architecture (IMA)using SELinux policies to provide the information flow.


IEEE Computer | 2012

Cloud Data Protection for the Masses

Dawn Song; Elaine Shi; Ian Fischer; Umesh Shankar

Offering strong data protection to cloud users while enabling rich applications is a challenging task. Researchers explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.


recent advances in intrusion detection | 2002

Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay

David L. Donoho; Ana Georgina Flesia; Umesh Shankar; Vern Paxson; Jason Coit; Stuart Staniford

Computer attackers frequently relay their attacks through a compromised host at an innocent site, thereby obscuring the true origin of the attack. There is a growing literature on ways to detect that an interactive connection into a site and another outbound from the site give evidence of such a stepping stone. This has been done based on monitoring the access link connecting the site to the Internet (Eg. [7,11, 8]). The earliest work was based on connection content comparisons but more recent work has relied on timing information in order to compare encrypted connections. Past work on this problem has not yet attempted to cope with the ways in which intruders might attempt to modify their traffic to defeat stepping stone detection. In this paper we give the first consideration to constraining such intruder evasion. We present some unexpected results that show there are theoretical limits on the ability of attackers to disguise their traffic in this way for sufficiently long connections. We consider evasions that consist of local jittering of packet arrival times (without addition and subtraction of packets), and also the addition of superfluous packets which will be removed later in the connection chain (chaff). To counter such evasion, we assume that the intruder has a maximum delay tolerance. By using wavelets and similar multiscale methods, we show that we can separate the short-term behavior of the streams - where the jittering or chaff indeed masks the correlation - from the long-term behavior of the streams - where the correlation remains. It therefore appears, at least in principle, that there is an effective countermeasure to this particular evasion tactic, at least for sufficiently long-lived interactive connections.


usenix security symposium | 2001

Detecting format string vulnerabilities with type qualifiers

Umesh Shankar; Kunal Talwar; Jeffrey S. Foster; David A. Wagner


Lecture Notes in Computer Science | 2002

Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay

David L. Donoho; Ana Georgina Flesia; Umesh Shankar; Vern Paxson; Jason Coit; Stuart Staniford


ieee symposium on security and privacy | 2003

Active mapping: resisting NIDS evasion without altering traffic

Umesh Shankar; Vern Paxson


computer and communications security | 2007

Dynamic pharming attacks and locked same-origin policies for web browsers

Chris Karlof; Umesh Shankar; J. D. Tygar; David A. Wagner


usenix security symposium | 2004

Side effects are not sufficient to authenticate software

Umesh Shankar; Monica Chew; J. D. Tygar


network and distributed system security symposium | 2006

Toward Automated Information-Flow Integrity Verification for Security-Critical Applications.

Umesh Shankar; Trent Jaeger; Reiner Sailer

Collaboration


Dive into the Umesh Shankar's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chris Karlof

University of California

View shared research outputs
Top Co-Authors

Avatar

Vern Paxson

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

J. D. Tygar

University of California

View shared research outputs
Top Co-Authors

Avatar

Naveen Sastry

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge