{"title":"2016年ACM主动网络防御自动化决策研讨会论文集","authors":"Nicholas J. Multari, A. Singhal, David O. Manz","doi":"10.1145/2994475","DOIUrl":null,"url":null,"abstract":"It is our great pleasure to welcome you to the SafeConfig'16 Workshop. This workshop is in its 9th year, each one focusing on different aspect of cyber systems. The 2016 workshop focuses on the testing and validation of cyber systems, specifically those involving active security and resilient systems. The premise is existing tools and methods for security assessments are necessary but insufficient for scientifically rigorous testing and evaluation of resilient and active cyber systems. This workshop will explore and discuss scientifically sound testing regimen(s) that will continuously and dynamically probe, attack, and \"test\" the various resilient and active technologies. This concept necessitates potentially wholesale new developments to ensure that resilientand agile-aware security testing is available to the research community. All testing, validation and experimentation must also be repeatable, reproducible, subject to scientific scrutiny, measurable and meaningful to both researchers and practitioners. \n \nThe call for papers attracted submissions from Asia, Europe, and the United States. Of the 13 papers submitted, the program committee recommended acceptance of 6 for an overall acceptance rate of 46%. In addition to the six accepted papers, we are also excited to have one keynote and a panel to examine this topic from an academic, business, and government point of view. \n \nThe first keynote, Configuring Software and Systems for Defense-in-Depth will be given by Dr. Trent Jaeger from Penn State University. He will discuss how achieving defense in depth has a significant component in configuration. In particular, he advocates configuring security requirements for various layers of software defenses (e.g., privilege separation, authorization, and auditing) and generating software and systems defenses that implement such configurations (mostly) automatically. Dr. Jaeger will focus mainly on the challenge of retrofitting software with authorization code automatically to demonstrate the configuration problems faced by the community, and discuss how we may leverage these lessons to configuring software and systems for defense in depth. \n \nThe second keynote, From Cyber Security to Collaborative Cyber Resilience, will be given by Dr. George Sharkov, the Cybersecurity Coordinator for the Bulgarian Government. Dr. Sharkov will discuss his view of a holistic approach to cyber resilience as a means of preparing for the \"unknown unknowns\". He will also discuss the multi-stakeholder engagement needed and the complementarity of governance, law, and business/industry initiatives. He will end with an example of the collaborative model in the Bulgarian national strategy and its multi-national engagements. \n \nFinally, we will have a panel of experts from diverse backgrounds to discuss their perspective of the subject of this workshop. The specific participants include: \nEhab Al-Shaer, University of North Carolina Charlotte \nBob Cowles, BrightLite Information Security \nJorge Cuellar, Siemens Corporation \nChristopher Oehmen, Pacific Northwest National Lab \nGregory Shannon, White House Office of Science and Technology Policy","PeriodicalId":343057,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense\",\"authors\":\"Nicholas J. Multari, A. Singhal, David O. Manz\",\"doi\":\"10.1145/2994475\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is our great pleasure to welcome you to the SafeConfig'16 Workshop. This workshop is in its 9th year, each one focusing on different aspect of cyber systems. The 2016 workshop focuses on the testing and validation of cyber systems, specifically those involving active security and resilient systems. The premise is existing tools and methods for security assessments are necessary but insufficient for scientifically rigorous testing and evaluation of resilient and active cyber systems. This workshop will explore and discuss scientifically sound testing regimen(s) that will continuously and dynamically probe, attack, and \\\"test\\\" the various resilient and active technologies. This concept necessitates potentially wholesale new developments to ensure that resilientand agile-aware security testing is available to the research community. All testing, validation and experimentation must also be repeatable, reproducible, subject to scientific scrutiny, measurable and meaningful to both researchers and practitioners. \\n \\nThe call for papers attracted submissions from Asia, Europe, and the United States. Of the 13 papers submitted, the program committee recommended acceptance of 6 for an overall acceptance rate of 46%. In addition to the six accepted papers, we are also excited to have one keynote and a panel to examine this topic from an academic, business, and government point of view. \\n \\nThe first keynote, Configuring Software and Systems for Defense-in-Depth will be given by Dr. Trent Jaeger from Penn State University. He will discuss how achieving defense in depth has a significant component in configuration. In particular, he advocates configuring security requirements for various layers of software defenses (e.g., privilege separation, authorization, and auditing) and generating software and systems defenses that implement such configurations (mostly) automatically. Dr. Jaeger will focus mainly on the challenge of retrofitting software with authorization code automatically to demonstrate the configuration problems faced by the community, and discuss how we may leverage these lessons to configuring software and systems for defense in depth. \\n \\nThe second keynote, From Cyber Security to Collaborative Cyber Resilience, will be given by Dr. George Sharkov, the Cybersecurity Coordinator for the Bulgarian Government. Dr. Sharkov will discuss his view of a holistic approach to cyber resilience as a means of preparing for the \\\"unknown unknowns\\\". He will also discuss the multi-stakeholder engagement needed and the complementarity of governance, law, and business/industry initiatives. He will end with an example of the collaborative model in the Bulgarian national strategy and its multi-national engagements. \\n \\nFinally, we will have a panel of experts from diverse backgrounds to discuss their perspective of the subject of this workshop. The specific participants include: \\nEhab Al-Shaer, University of North Carolina Charlotte \\nBob Cowles, BrightLite Information Security \\nJorge Cuellar, Siemens Corporation \\nChristopher Oehmen, Pacific Northwest National Lab \\nGregory Shannon, White House Office of Science and Technology Policy\",\"PeriodicalId\":343057,\"journal\":{\"name\":\"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2994475\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2994475","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
我们非常高兴地欢迎您参加16年安全经济研讨会。这个研讨会已经是第9个年头了,每次都关注网络系统的不同方面。2016年研讨会的重点是网络系统的测试和验证,特别是那些涉及主动安全和弹性系统的系统。前提是现有的安全评估工具和方法是必要的,但不足以对有弹性和活跃的网络系统进行科学严格的测试和评估。本次研讨会将探索和讨论科学合理的测试方案,将持续和动态地探测,攻击和“测试”各种弹性和主动技术。这个概念需要潜在的大规模新开发,以确保研究社区可以使用弹性和敏捷性安全测试。所有的测试、验证和实验也必须是可重复的、可再现的、接受科学审查的、可测量的、对研究人员和从业者都有意义的。论文征集活动吸引了来自亚洲、欧洲和美国的投稿。在提交的13篇论文中,计划委员会建议接受6篇,总体录取率为46%。除了六篇被接受的论文外,我们还很高兴有一个主题演讲和一个小组从学术、商业和政府的角度来研究这个话题。第一个主题演讲“配置纵深防御的软件和系统”将由宾夕法尼亚州立大学的Trent Jaeger博士发表。他将讨论如何实现纵深防御在配置中具有重要组成部分。特别是,他提倡为软件防御的各个层配置安全需求(例如,特权分离、授权和审计),并生成自动实现这些配置的软件和系统防御。Jaeger博士将主要关注使用授权代码自动改造软件的挑战,以演示社区面临的配置问题,并讨论我们如何利用这些经验来配置软件和系统以进行深度防御。第二个主题演讲,从网络安全到协同网络弹性,将由保加利亚政府网络安全协调员George Sharkov博士发表。Sharkov博士将讨论他对网络复原力的整体方法的看法,这是为“未知的未知”做准备的一种手段。他还将讨论所需的多方利益相关者参与以及治理、法律和商业/行业倡议的互补性。最后,他将举例说明保加利亚国家战略及其多国参与中的合作模式。最后,我们将邀请来自不同背景的专家小组讨论他们对本次研讨会主题的看法。具体与会者包括:Ehab Al-Shaer、北卡罗来纳大学Charlotte Bob Cowles、BrightLite信息安全Jorge Cuellar、西门子公司Christopher Oehmen、太平洋西北国家实验室Gregory Shannon、白宫科技政策办公室
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense
It is our great pleasure to welcome you to the SafeConfig'16 Workshop. This workshop is in its 9th year, each one focusing on different aspect of cyber systems. The 2016 workshop focuses on the testing and validation of cyber systems, specifically those involving active security and resilient systems. The premise is existing tools and methods for security assessments are necessary but insufficient for scientifically rigorous testing and evaluation of resilient and active cyber systems. This workshop will explore and discuss scientifically sound testing regimen(s) that will continuously and dynamically probe, attack, and "test" the various resilient and active technologies. This concept necessitates potentially wholesale new developments to ensure that resilientand agile-aware security testing is available to the research community. All testing, validation and experimentation must also be repeatable, reproducible, subject to scientific scrutiny, measurable and meaningful to both researchers and practitioners.
The call for papers attracted submissions from Asia, Europe, and the United States. Of the 13 papers submitted, the program committee recommended acceptance of 6 for an overall acceptance rate of 46%. In addition to the six accepted papers, we are also excited to have one keynote and a panel to examine this topic from an academic, business, and government point of view.
The first keynote, Configuring Software and Systems for Defense-in-Depth will be given by Dr. Trent Jaeger from Penn State University. He will discuss how achieving defense in depth has a significant component in configuration. In particular, he advocates configuring security requirements for various layers of software defenses (e.g., privilege separation, authorization, and auditing) and generating software and systems defenses that implement such configurations (mostly) automatically. Dr. Jaeger will focus mainly on the challenge of retrofitting software with authorization code automatically to demonstrate the configuration problems faced by the community, and discuss how we may leverage these lessons to configuring software and systems for defense in depth.
The second keynote, From Cyber Security to Collaborative Cyber Resilience, will be given by Dr. George Sharkov, the Cybersecurity Coordinator for the Bulgarian Government. Dr. Sharkov will discuss his view of a holistic approach to cyber resilience as a means of preparing for the "unknown unknowns". He will also discuss the multi-stakeholder engagement needed and the complementarity of governance, law, and business/industry initiatives. He will end with an example of the collaborative model in the Bulgarian national strategy and its multi-national engagements.
Finally, we will have a panel of experts from diverse backgrounds to discuss their perspective of the subject of this workshop. The specific participants include:
Ehab Al-Shaer, University of North Carolina Charlotte
Bob Cowles, BrightLite Information Security
Jorge Cuellar, Siemens Corporation
Christopher Oehmen, Pacific Northwest National Lab
Gregory Shannon, White House Office of Science and Technology Policy