{"id":8,"date":"2011-09-27T12:08:00","date_gmt":"2011-09-27T12:08:00","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/inside_microsoft_research\/2011\/09\/27\/silicon-valley-talk-focuses-on-security\/"},"modified":"2016-07-20T07:33:36","modified_gmt":"2016-07-20T14:33:36","slug":"silicon-valley-talk-focuses-on-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/research\/blog\/silicon-valley-talk-focuses-on-security\/","title":{"rendered":"Silicon Valley Talk Focuses on Security"},"content":{"rendered":"<p class=\"posted-by\">Posted by <span class=\"author\">Rob Knies<\/span><\/p>\n<p class=\"posted-by\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/msdnshared.blob.core.windows.net\/media\/TNBlogsFS\/prod.evol.blogs.technet.com\/CommunityServer.Blogs.Components.WeblogFiles\/00\/00\/00\/90\/35\/6102.security-card-sm.jpg\" original-url=\"http:\/\/blogs.technet.com\/cfs-filesystemfile.ashx\/__key\/communityserver-blogs-components-weblogfiles\/00-00-00-90-35\/6102.security_2D00_card_2D00_sm.jpg\"><img decoding=\"async\" style=\"max-width: 200px; float: left; margin-left: 10px; margin-right: 10px;\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/TNBlogsFS\/prod.evol.blogs.technet.com\/CommunityServer.Blogs.Components.WeblogFiles\/00\/00\/00\/90\/35\/6102.security-card-sm.jpg\" original-url=\"http:\/\/blogs.technet.com\/cfs-filesystemfile.ashx\/__key\/communityserver-blogs-components-weblogfiles\/00-00-00-90-35\/6102.security_2D00_card_2D00_sm.jpg\" \/><span class=\"sr-only\"> (opens in new tab)<\/span><\/a>Soon after the founding of <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/research.microsoft.com\/en-us\/labs\/siliconvalley\/default.aspx\">Microsoft Research Silicon Valley<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> in 2001, its managing director, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"Roy Levin\" href=\"http:\/\/research.microsoft.com\/en-us\/people\/roylevin\/\">Roy Levin<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, began to bring in a series of researchers with extensive backgrounds in security in computing systems.<\/p>\n<p>Among those security-focused researchers was <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"Mart&iacute;n Abadi\" href=\"http:\/\/research.microsoft.com\/en-us\/people\/abadi\/\">Mart&iacute;n Abadi<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, now a principal researcher at the facility, located in Mountain View, Calif. On Sept. 27, during Microsoft Research Silicon Valley&rsquo;s event marking the 20th anniversary of Microsoft Research, he delivered one of five technical discussions during the day. Abadi&rsquo;s was titled, simply, Security, in which he discussed Microsoft Research efforts to provide it.<\/p>\n<p>Security goes hand in hand with privacy, and both are critical to Microsoft Research Silicon Valley&rsquo;s focus on distributed computing. But, as Abadi&rsquo;s talk made clear, research in this area is far from simple.<\/p>\n<p>&ldquo;One school of thought on security has said that, by and large, we know many mechanisms that could improve security, but that what is lacking is the will to deploy them,&rdquo; he said. &ldquo;There is perhaps some truth to this, but it ignores the fact that computing and computing systems are always changing and that so is the nature of attacks. The defenses must evolve, too.&rdquo;<\/p>\n<p>Abadi invoked <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"Butler Lampson\" href=\"http:\/\/research.microsoft.com\/en-us\/um\/people\/blampson\/\">Butler Lampson<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&rsquo;s &ldquo;gold standard&rdquo; of security, which includes three basic implementation mechanisms: authentication, authorization, and auditing.<\/p>\n<p>One important way to provide authentication, Abadi said, uses cryptographic protocols. This research has a long history, but various attempts exhibit certain subtleties and vulnerabilities, leading to interest in rigorous methods for design and analysis of such protocols. Work at <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"Microsoft Research Cambridge\" href=\"http:\/\/research.microsoft.com\/en-us\/labs\/cambridge\/default.aspx\">Microsoft Research Cambridge<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> and the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"Microsoft Research-INRIA Joint Centre\" href=\"http:\/\/www.msr-inria.inria.fr\/\">Microsoft Research-INRIA Joint Centre<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> has led to tools that enable us to reason about protocol implementation written in languages such as C or <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"F#\" href=\"http:\/\/research.microsoft.com\/en-us\/um\/cambridge\/projects\/fsharp\/\">F#<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. Other authentication efforts utilize user names and passwords, IP addresses, browser cookies, and other browser identifiers.<\/p>\n<p>Whatever the method, authentication often provides input to the authorization process, which occurs at many levels in systems. Of particular importance is control-flow integrity.<\/p>\n<p>&ldquo;If we cannot restrict the control flow of programs,&rdquo; Abadi said, &ldquo;then we cannot guarantee that they do not circumvent checks on which security depends. In fact, many attacks rely on buffer overflows and other low-level vulnerabilities precisely in order to subvert control flow.&rdquo;<\/p>\n<p>Languages such as Java and C# can help, he added, but there is a lot of code not written in those languages. Still, tools such as <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"Sage\" href=\"http:\/\/research.microsoft.com\/en-us\/um\/people\/pg\/public_psfiles\/sage-in-one-slide.pdf\">Sage<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, from <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"Microsoft Research Redmond\" href=\"http:\/\/research.microsoft.com\/en-us\/labs\/redmond\/default.aspx\">Microsoft Research Redmond<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, help fix such vulnerabilities.<\/p>\n<p>In another approach, pursued at Microsoft Research&rsquo;s Silicon Valley, Redmond, and Cambridge facilities, instrumentation provides the desired control-flow guarantees. The instrumentation can be inserted by binary rewriting or with the help of compilers.<\/p>\n<p>Auditing, the third component of Lampson&rsquo;s &ldquo;gold standard,&rdquo; is particularly useful in services in which authentication and authorization are rather rudimentary. Free email, for instance, is easy to get and use, but this is true both for legitimate users and for attackers, and, in addition, passwords can be stolen. So the challenges are to distinguish legitimate users from attackers and to detect compromised accounts. A recent Microsoft Research Silicon Valley project uses Windows Live Hotmail social graphs to distinguish good accounts from bad.<\/p>\n<p>Another Microsoft Research Silicon Valley effort works with <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"Bing\" href=\"http:\/\/www.bing.com\/\">Bing<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> to examine how attackers abuse search engines. <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" title=\"SearchAudit\" href=\"http:\/\/research.microsoft.com\/pubs\/132007\/searchers.pdf\">SearchAudit<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> identifies malicious queries from search-engine logs to enable the analysis and the blocking of attacks.<\/p>\n<p>Abadi closed his presentation by noting that during the French revolution, designer Jean-D&eacute;mosth&egrave;ne Dugourc created a deck of playing cards in which the royal figures&mdash;kings, queens, and jacks&mdash;were replaced by images reflecting revolutionary concepts such as freedom, equality, and &hellip; security.<\/p>\n<p>&ldquo;One does not often think of security as an exciting revolutionary value,&rdquo; Abadi concluded, &ldquo;but certainly some degree of security is crucial for many of the revolutionary applications of computing.&rdquo;<\/p>\n<p>Now, as Microsoft Research&rsquo;s anniversary approaches the home stretch, we head from the coast of the Pacific Ocean to that of the Atlantic.<\/p>\n<p class=\"posted-by\">Photograph attribution: Gallica \/ Biblioth&egrave;que Nationale de France (bnf)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Posted by Rob Knies Soon after the founding of Microsoft Research Silicon Valley in 2001, its managing director, Roy Levin, began to bring in a series of researchers with extensive backgrounds in security in computing systems. Among those security-focused researchers was Mart&iacute;n Abadi, now a principal researcher at the facility, located in Mountain View, Calif. [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[],"msr_hide_image_in_river":0,"footnotes":""},"categories":[1],"tags":[193582,194883,193543,193671,202577,196435,196463,202777,203593,203631,203713],"research-area":[],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-8","post","type-post","status-publish","format-standard","hentry","category-research-blog","tag-20th-anniversary","tag-butler-lampson","tag-f","tag-inria","tag-martn-abadi","tag-microsoft-research-cambridge","tag-microsoft-research-redmond","tag-microsoft-research-silicon-valley","tag-roy-levin","tag-sage","tag-searchaudit","msr-locale-en_us"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"","podcast_episode":"","msr_research_lab":[],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-events":[],"related-researchers":[],"msr_type":"Post","byline":"","formattedDate":"September 27, 2011","formattedExcerpt":"Posted by Rob Knies Soon after the founding of Microsoft Research Silicon Valley in 2001, its managing director, Roy Levin, began to bring in a series of researchers with extensive backgrounds in security in computing systems.Among those security-focused researchers was Mart&iacute;n Abadi, now a principal&hellip;","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/8\/revisions"}],"predecessor-version":[{"id":262272,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/8\/revisions\/262272"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=8"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/categories?post=8"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/tags?post=8"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=8"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=8"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=8"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=8"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=8"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=8"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=8"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}