{"id":6425,"date":"2016-05-23T06:00:50","date_gmt":"2016-05-23T13:00:50","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/msr_er\/?p=6425"},"modified":"2016-07-20T07:28:28","modified_gmt":"2016-07-20T14:28:28","slug":"microsoft-researchers-present-ways-for-securing-technology-old-and-new","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/research\/blog\/microsoft-researchers-present-ways-for-securing-technology-old-and-new\/","title":{"rendered":"Microsoft researchers present ways for securing technology old and new"},"content":{"rendered":"<p><em>By Allison Linn, Senior Writer, Microsoft<\/em><\/p>\n<p>Microsoft researchers are looking at ways to better secure both the latest, cutting-edge consumer technologies and the more traditional tools that we rely on for everyday activities like accessing bank records and identifying ourselves at work.<\/p>\n<p>The researchers will present four papers at the 37th annual <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/www.ieee-security.org\/TC\/SP2016\/\" target=\"_blank\">IEEE Symposium on Security and Privacy<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, a leading security conference that begins Monday in San Jose, Calif.<\/p>\n<p>Here\u2019s a look at some of the papers.<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/mitls.org\/pages\/publications\" target=\"_blank\"><strong>Downgrade Resilience in Key-Exchange Protocols<\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>A group of researchers at Microsoft and the French research organization <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/www.inria.fr\/en\/\" target=\"_blank\">INRIA<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> made <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/www.pcworld.com\/article\/3040203\/latest-attack-against-tls-shows-the-pitfalls-of-intentionally-weakening-encryption.html\" target=\"_blank\">headlines<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> when they discovered and helped fix serious vulnerabilities, including <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"https:\/\/mitls.org\/pages\/attacks\/SMACK#FREAK\" target=\"_blank\">Freak<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> and <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"https:\/\/weakdh.org\/\" target=\"_blank\">Logjam<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, in a popular system for enabling secure Internet transactions.<\/p>\n<p>Now, those same researchers, along with collaborators from Hamburg University of Technology and Johns Hopkins University, are presenting mechanisms that would prevent that type of attack from even being possible.<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/Cedric_Fournet.jpg\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-6456\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/Cedric_Fournet-1024x769.jpg\" alt=\"Cedric Fournet\" width=\"100%\" height=\"100%\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/Cedric_Fournet-1024x769.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/Cedric_Fournet-300x225.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/Cedric_Fournet-768x577.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/Cedric_Fournet-80x60.jpg 80w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>\u201cWe now understand, in a very general way, how to prevent that class of problem,\u201d said <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/research.microsoft.com\/en-us\/um\/people\/fournet\/\" target=\"_blank\">Cedric Fournet<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, principal researcher at Microsoft Research Cambridge.<\/p>\n<p>They are presenting a paper on these attacks and countermeasures at the IEEE security symposium.<\/p>\n<p>Fournet said the researchers expect these new improvements to be included in the next generation of the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"https:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security\" target=\"_blank\">Transport Layer Security<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, or TLS. That\u2019s a system that many of us are using daily, whether we know it or not, for things like buying shoes online or checking corporate e-mail.<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/research.microsoft.com\/pubs\/263819\/cinderella.pdf\" target=\"_blank\"><strong>Cinderella: Turning Shabby X.509 Certi\ufb01cates into Elegant Anonymous Credentials with the Magic of Veri\ufb01able Computation<\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>Every time you scan your key card at work, access your bank records or sign on to a secure Internet server, chances are you are using something called public key infrastructure, or PKI, to authenticate that you are really who you say you are.<\/p>\n<p>These systems are great for figuring out who you are, and they often also transmit a wealth of other information about you.<\/p>\n<p>That\u2019s where Cinderella comes in. It\u2019s a software system that people could run on top of existing PKI infrastructure to disclose only partial information about a person\u2019s identification.<\/p>\n<p>For example, let\u2019s say you want a system that verifies whether a user is at least 21 years old. You could use Cinderella to create a tool that verifies a person\u2019s age without sharing the user\u2019s entire personal data, such as name or address. The system also could be used to verify that a person works for a particular company \u2013 and is therefore eligible for a company discount &#8212; without disclosing other personal information such as that person\u2019s name or job title.<\/p>\n<p>Eventually, such a system could even be used for something like voter identification.<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/Bryan_Parno2.jpg\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-6455\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2016\/05\/Bryan_Parno2-1024x576.jpg\" alt=\"Bryan Parno\" width=\"100%\" height=\"100%\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/Bryan_Parno2-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/Bryan_Parno2-300x169.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/Bryan_Parno2-768x432.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/Bryan_Parno2-343x193.jpg 343w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/05\/Bryan_Parno2.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/research.microsoft.com\/en-us\/people\/parno\/\" target=\"_blank\">Bryan Parno<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, a Microsoft researcher specializing in security and privacy, said computer scientists have long been working on how to do partial identification. Cinderella is unique because the software could run on top of the existing infrastructure most companies and organizations currently use.<\/p>\n<p>It\u2019s a research project for now, and Parno said there are no plans to turn it into a product.<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/research.microsoft.com\/en-us\/um\/people\/livshits\/papers\/pdf\/oakland16.pdf\" target=\"_blank\"><strong>Prepose: Privacy, Security, and Reliability for Gesture-Based Programming<\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>The use of gesture in computing is gradually becoming more mainstream, as developers improve the technology behind it and look at ways to incorporate it into applications beyond gaming.<\/p>\n<p>At the same time, researchers say, it\u2019s becoming more likely that a person could be accurately identified based on things like the exact measurement of certain bones in the body.<\/p>\n<p>A group of Microsoft researchers say those two developments combined mean that it\u2019s time to start thinking more carefully about how to keep people\u2019s personal identities private while they are using gesture-based tools.<\/p>\n<p>The system they are proposing is called Prepose, and it\u2019s built on top of the Microsoft <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/research.microsoft.com\/en-us\/projects\/z3m\/\" target=\"_blank\">theorem prover Z3<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> and the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"https:\/\/developer.microsoft.com\/en-us\/windows\/kinect\" target=\"_blank\">Kinect SDK<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n<p>Prepose adds a layer of security to gesture-based systems by building in a level of abstraction that keeps the system for releasing the exact specifications of the users\u2019 body. Instead, the system shows, for example, that the area of the arm is less than or greater than a certain amount, so it can work without giving out the true measurement.<\/p>\n<p>Prepose also is designed to help users gesture safely and effectively. That includes avoiding poses that may cause them harm, detect conflicting gestures and preventing the user from creating a gesture that overlaps with an existing, reserved gesture, such as one that signals to the system that you want its attention.<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" href=\"http:\/\/research.microsoft.com\/en-us\/people\/margus\/\" target=\"_blank\">Margus Veanes<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, one of several Microsoft researchers who worked on the project, said they don\u2019t know of any attempt to steal private information based on gesture yet \u2013 and that\u2019s a good reason to start building in such security safeguards now.<\/p>\n<p>\u201cI think it will be a potential concern because applications will grow,\u201d Veanes said.<\/p>\n<p><strong>Related:<\/strong><\/p>\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/blogs.microsoft.com\/next\/2015\/11\/18\/how-triple-handshake-freak-and-logjam-discoveries-contributed-to-a-broader-effort-to-safeguard-the-internet\/#sm.0000k81a37qr6dijzdl15reujpheo\">How Triple Handshake, Freak and Logjam discoveries contributed to a broader effort to safeguard the Internet<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/blogs.microsoft.com\/next\/2015\/05\/27\/always-encrypted-sql-server-2016-includes-new-advances-that-keeps-data-safer\/#sm.00093rl291537db6ukm2cwkeif6bv\">Always Encrypted: SQL Server 2016 includes new advances that keep data safer<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/blogs.microsoft.com\/next\/2015\/05\/18\/a-lockbox-in-the-cloud-microsoft-research-project-reveals-new-method-for-keeping-data-private\/#sm.0000k81a37qr6dijzdl15reujpheo\">Lockbox in the cloud: Microsoft research project reveals new method for keeping data private<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/blogs.microsoft.com\/next\/2015\/08\/07\/privacy-and-accuracy-how-cynthia-dwork-is-making-data-analysis-better\/\">Privacy and accuracy: How Cynthia Dwork is making data analysis better<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n<p><em>Allison Linn is a senior writer at Microsoft. <\/em><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/x.com\/allisondlinn\"><em>Follow her on Twitter<\/em><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Allison Linn, Senior Writer, Microsoft Microsoft researchers are looking at ways to better secure both the latest, cutting-edge consumer technologies and the more traditional tools that we rely on for everyday activities like accessing bank records and identifying ourselves at work. The researchers will present four papers at the 37th annual IEEE Symposium on [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[],"msr_hide_image_in_river":0,"footnotes":""},"categories":[194489],"tags":[205449,205459,193671,193572,205471,196435,205517],"research-area":[],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-6425","post","type-post","status-publish","format-standard","hentry","category-security","tag-freak","tag-ieee-symposium-on-security-and-privacy","tag-inria","tag-kinect-sdk","tag-logjam","tag-microsoft-research-cambridge","tag-z3-theorem-prover","msr-locale-en_us"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"","podcast_episode":"","msr_research_lab":[],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-events":[],"related-researchers":[],"msr_type":"Post","byline":"","formattedDate":"May 23, 2016","formattedExcerpt":"By Allison Linn, Senior Writer, Microsoft Microsoft researchers are looking at ways to better secure both the latest, cutting-edge consumer technologies and the more traditional tools that we rely on for everyday activities like accessing bank records and identifying ourselves at work. The researchers will&hellip;","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/6425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/comments?post=6425"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/6425\/revisions"}],"predecessor-version":[{"id":260604,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/6425\/revisions\/260604"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=6425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/categories?post=6425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/tags?post=6425"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=6425"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=6425"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=6425"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=6425"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=6425"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=6425"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=6425"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=6425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}