About Us Our Work Employment News & Events
MITRE Remote Access for MITRE Staff and Partners Site Map

Technology Symposium banner

 

» Complete Project List

» Table of Contents

»

Projects Featured in Information Assurance:

Cross-Boundary Information Sharing (XBIS)

Encrypted Dynamic Privacy for RFID

Information Sharing Risk Assessment

Information Sharing via Trusted Intermediaries

Malware Phylogenetics

Protected Sharing of Controlled Information

Security Information Management for Enclave Networks (SIMEN)

System Security and Privacy Engineering

TRIDENT (Trust Research in Distributed & Emerging Network Technology

Trust and Adaptability in Web Services

Using Honeyclients for Detection and Response Against New Attacks

blue line

Information Assurance

Information Assurance investigates security vulnerabilities in distributed information systems and develops architectures, systems and techniques for providing protection from attack, and exploitation. Existing tools for system protection will be tested and evaluated.


Cross-Boundary Information Sharing (XBIS)

Luanna Notargiacomo, Principal Investigator

Problems:
The CIIS Cross Boundary Information Sharing (XBIS) Initiative is a coordinated set of activities at MITRE to address critical information sharing problems facing the Intelligence Community, DoD, and other MITRE sponsors. We are currently focused on developing an integrated technical laboratory that allows us to define and implement key scenarios that illustrate enablers for and impediments for to effective information sharing.

Objectives:
XBIS combines MITRE's expertise in current and emerging information and security technologies, encourages new ideas and innovations from the research and development R&D community, and, most importantly, taps domain experts (analysts and other users) in order to explore information sharing solutions to this problem. Within the context of the technology we will also examine non-technological factors that impede or enable sharing, such as organizational, cultural, political, and social issues, will also be explored within the context of the technology.

Activities:
A national counterterrorism scenario adapted from the Markle Foundation’s Visualization: A Trusted Information Network for Homeland Security developed by the Markle Foundation has been demonstrated to and shared with many sponsors. A second coalition-warfare scenario, focusing on coalition warfare, has been developed and will debut at the 2007 Technology Symposium. Its focus is on coalition warfare in Afghanistan, involving the United States and the NATO-commanded International Security Assistance Forces (ISAF).

Impact:
The XBIS Laboratory integrates different technologies that enhance information sharing across organizational and classification security boundaries. To demonstrate the capabilities of these technologies, the laboratory provides the ability to simulate many domains and to share information among them. The laboratory architecture supports both integrated scenarios and stand-alone demonstrations, and allowing the facility to is showcasing solutions available today and in the near future.

Approved for Public Release: 07-0242

Presentation [PDF]


Encrypted Dynamic Privacy for RFID

Steve Barry, Principal Investigator

Problems:
RFID may be used to speed processing at U.S. ports of entry by enabling pre-fetch of information about the traveler. However, any third party having the proper equipment can observe RFID transactions at a distance. There is a need to enhance the security and privacy of these transactions economically and efficiently so that they cannot be misused by unauthorized observers.

Objectives:
This research will enhance security and privacy for users of RFID tags in portal access applications. We will provide a standard RFID tag that changes ID numbers regularly without losing the association between the tag and its authorized user. Among candidates for use of this technology are border management programs such as US-VISIT, Free and Secure Trade, NEXUS, and Transportation Worker Identification Credential.

Activities:
We will acquire standard RFID hardware and development software and use these materials to implement a secure method to associate an RFID tag with a user. We will then implement and evaluate a reliable protocol to read the tag and identify the associated user without disclosing this information to outside observers.

Impact:
The results of this project will protect the identity of users of RFID tags from disclosure to third parties and will prevent fraudulent use of any information overheard by third parties. Thus, the findings can improve security and privacy in programs in DHS, DOS, and anywhere a standards-compliant RFID implementation is used for personal identification.

Approved for Public Release: 07-0276

Presentation [PDF]


Information Sharing Risk Assessment

Deb Bodeau, Principal Investigator

Problems:
While information sharing is recognized as mission-critical, obstacles to adoption of increasingly mature technologies to enable information sharing remain. Many obstacles are due to incomplete understanding of the risks - to a variety of stakeholders - associated both with sharing and with not sharing. This leads to an inability to manage those risks via appropriate policy, technical, and procedural controls.

Objectives:
This project will create a methodology for identifying risk-appropriate enablers for information sharing. The methodology will elicit concerns of information sharing stakeholders, to facilitate community risk management. The methodology will include an information sharing risk model, so that risk-appropriate levels of sharing-enabling technologies and processes can be determined.

Activities:
We will define a risk-appropriate information sharing enablers (RAISE) methodology. The methodology will include information sharing principles that motivate the selection of types of sharing enablers; risk models to elicit stakeholder concerns and to determine appropriate levels of enablers; and an overall process. We will apply the methodology to specific MITRE sponsor situations as feasible.

Impact:
Standards and guidelines for use of technical and procedural controls are key enablers for information sharing. A risk-based foundation for such standards and guidance will speed acceptance and implementation by enabling stakeholders to balance the risks of sharing with the risks of not sharing, and by allowing those risks to be managed in an informed way.

Approved for Public Release: 07-0348

Presentation [PDF]


Information Sharing via Trusted Intermediaries

Vipin Swarup, Principal Investigator

Problems:
A first responder arrives at a medical emergency scene. Data such as terrorist warnings (DHS) and infectious diseases data (CDC) may be relevant to what he faces, but today he is often not told. This cross-boundary information sharing problem is faced in many environments, e.g., by soldiers, marines, policemen, and border guards.

Objectives:
Our research hypothesis is that a new class of trusted intermediaries with adaptive sharing policies will enable enhanced cross-boundary information sharing. We will develop a secure infrastructure for sharing via trusted intermediaries, and will develop fine-grained, adaptive sharing policy mechanisms for trusted intermediaries.

Activities:
We will design a language for specifying sharing transactions and a sharing decision capability for authorizing transactions. This will include techniques to find appropriate trusted intermediaries when necessary. We will develop fine-grained, adaptive sharing policy mechanisms that trusted intermediaries can use to share information further. Finally, we will build an infrastructure to execute and enforce sharing transactions and policies.

Impact:
Inadequate information sharing is recognized as a critical problem across government agencies. Our proposed solutions, based on trusted intermediaries and risk-adaptive policies, will solve many pressing sharing policy problems. We will impact government agencies via papers that describe our concepts and techniques, and software that demonstrates the feasibility and benefits of our novel approach.

Approved for Public Release: 05-1203

Presentation [PDF]


Malware Phylogenetics

Melissa Chase, Principal Investigator

Problems:
The nature of malware threats has evolved from widespread outbreaks for the sake of notoriety to large numbers of targeted attacks motivated by economic gain. In this environment it is critical for end-users, researchers, investigators, and security tool vendors to have a better understanding of the relationships between malware families and variants in order to improve detection, protection, and response.

Objectives:
We will seek to understand the evolutionary relationships between malware threats by applying phylogenetic modeling algorithms to malware.

Activities:
We will create a data set of malware samples, extract features from these samples, use these features to create phylogenetic models, develop an experimental workbench, and run experiments with this workbench. We will initially focus on features extracted from malware samples, first from variants of a single family and then from multiple families. Later, we will consider incident-based features.

Impact:
Understanding the evolutionary relationships between malware threats may provide improved prediction and protection for end-users. It may suggest attribution leads and facilitate the reuse of previous analyses by malware analysts and criminal investigators. It could provide a more rigorous basis for naming malware by security vendors, thereby reducing confusion during malware outbreaks and promoting correlation across security tools.

Approved for Public Release: 06-1158

Presentation [PDF]


Protected Sharing of Controlled Information

Rich Pietravalle, Principal Investigator

Problems:
In homeland security applications, sensitive but unclassified (SBU) information sharing among federal, state, local, and private entities needs additional technology-assisted controls. As the sharing exchanges carry the information further from the originator, securing the information consistent with the originator's constraints presents increasing challenges. Current technical implementations make it difficult to ensure that policies and regulations concerning SBU information are followed.

Objectives:
The project will implement a prototype approach to secure automated information sharing that supports fine-grained access and usage controls. We will incorporate policies and rules for accurate sharing of controlled, unclassified information, basing them upon operational scenarios from the Department of Homeland Security (DHS) and State and Local Fusion Centers. We will validate the prototype, scenarios, and policies and rules.

Activities:
Research activities include modeling the sponsor environment, information flow, and CONOPS and building an initial scenario based on a subset of that model. We will create a prototype based on COTS software, augmented by needed information sharing functions; test, validate, and demonstrate the prototype using the XBIS (Cross-Boundary Information Sharing) lab; and iterate the process as time and resources allow.

Impact:
The research will help form the requirements for the next iteration of information sharing systems for DHS and other SBU environments. These requirements will assist in focusing sponsor and COTS supplier dialogue for future acquisitions and information system planning, especially for those users with complex cross-domain needs.

Approved for Public Release: 06-1516


Security Information Management for Enclave Networks (SIMEN)

Rosalie McQuaid, Principal Investigator

Problems:
The Air Force enterprise contains networks that are bandwidth limited, intermittently attached, and/or internally constrained enclaves. These constrained network environments will not support commercial security information management (SIM) feeds and sensors. Recent threat activities have highlighted the need for an information assurance solution that provides consistent SIM-centric monitoring for these enclave networks.

Objectives:
Our objective is to research and prototype a solution to address information assurance (IA) monitoring for constrained enclave networks. We will prototype a light sensor net footprint and an intelligent gateway to collect, queue, and prioritize raw security data locally for intelligent transmission to the enterprise SIM. The prototype will reduce resource impact and increase data integration to the SIM system.

Activities:
This project will identify an efficient sensor net architecture by mapping priority threat categories to critical data sources contained in AF enclave networks. We will develop prioritization state-aware algorithms and apply them near the data sources. We will investigate and implement bandwidth-efficient techniques for transmission to the enterprise SIM, and implement and validate a lab prototype to produce a robust proof of concept.

Impact:
This research will improve current SIM deployments within the Air Force by addressing limitations in commercial products. It will influence commercial SIM vendors and the Air Force SIM strategy. By providing IA monitoring to networks that cannot benefit from a centralized SIM, this research will extend the power of SIM technology to the edge of the Air Force enterprise.

Approved for Public Release: 06-0169

Presentation [PDF]


System Security and Privacy Engineering

Cathy McCollum, Principal Investigator


TRIDENT (Trust Research in Distributed & Emerging Network Technology

Justin Sheehy, Principal Investigator

Problems:
The DoD has committed to an increasingly net-centric approach to warfare. The many systems on our networks are interdependent in critical ways, but are unable to determine when a peer that they are relying upon is compromised or vulnerable. In the context of determined and capable adversaries, this is a critical gap.

Objectives:
We will demonstrate that it is possible and worthwhile to invest successfully in methods for resilient networks. We will develop methods for enabling trust decisions that help hosts to interact only with "good" peers. Our combined approach will take advantage of emerging COTS capabilities, of MITRE's experience in protocol and trust engineering, and of MITRE's understanding of web services.

Activities:
We will build an experimentation platform using Trusted Computing (TC) components. On this, we will implement an architecture that uses virtualization to enable web services to execute and simultaneously makes useful measurements of the services available to their peers. We will also develop a web services-based scheme to communicate this evidence between measured services, their appraisers, and their peers.

Impact:
Our work should demonstrate the value of TC components in building attestable systems, show that attestable systems are possible, and illustrate some useful methods for building such systems. We also intend to demonstrate that attestation and appraisal indicate an approach to making distributed systems more resilient. This may also point to worthwhile technology areas in which sponsors might invest.

Approved for Public Release: 06-1435

Presentation [PDF]


Trust and Adaptability in Web Services

Joshua Guttman, Principal Investigator

Problems:
Widespread sharing and interpretation of richly structured data objects is a central motivation for Web services, and an underlying architectural idea in the Global Information Grid (e.g., Net-Centric Enterprise Services), the Distributed Common Ground System (DCGS), etc. However, access control must reflect the trust between authorities, the data shared, and associated metadata. Moreover, cryptographic protocols must establish authentication and confidentiality.

Objectives:
We will develop techniques to secure Web services, meeting uniform but adaptable security goals. Web services create demanding requirements for security, but their transparency and uniform data model provide opportunities. We will adapt previous MSR-funded results connecting cryptographic protocols and trust management. Incorporating an XML-style data model will lead to a flexible framework for authentication, access control, and controlled sharing of semistructured data.

Activities:
We will enrich our protocol/trust framework with an XML data model. A compiler will support demonstrations of controlled information sharing. Products annotated with metadata cryptographically bound to elements of these XML products will pass through a distribution system modeling DCGS. Access control decisions will be based on the certified characteristics of parts of the product, as well as attributes of the recipients.

Impact:
We will demonstrate a compiler-based implementation of our method to secure service-oriented architectures. We will transfer the software as well as the underlying techniques to industry (via collaboration with vendor research labs), to MITRE direct-funded projects (via proposals for improved Web service security architectures), and to the Air Force (via the resulting software and the vision it embodies).

Approved for Public Release: 05-1412

Presentation [PDF]


Using Honeyclients for Detection and Response Against New Attacks

Kathy Wang, Principal Investigator

Problems:
Exploits targeting vulnerabilities in client-side applications are a growing threat on today's Internet. Commonly deployed detection technologies such as honeypots and Intrusion Detection Systems (IDSs) are useful for detecting server-side attacks, but are not effective at detecting client-side attacks. We lack a proactive client-side attack detection technology.

Objectives:
The project has two main objectives. First, we will develop a honeyclient prototype with capabilities for interaction with servers, client-side exploit detection, and exploit characterization and categorization. Second, since honeyclient technology is new and not well understood, we will research and document the capabilities and limitations of honeyclients for improving organizational situational awareness.

Activities:
In the first two quarters, we will develop the initial honeyclient prototype's capabilities, including security enhancements and secure logging. By the end of the third quarter, we will have created honeyclients capable of supporting additional protocols, including DNS and peer-to-peer. In the fourth quarter, we will focus on exploring the theoretical capabilities and limitations of honeyclient technology.

Impact:
By using honeyclient technology, our sponsors will gain the capability to proactively detect client exploits in the wild. This project will develop a baseline honeyclient capability and document the ongoing costs of running a honeyclient installation so that sponsors can make informed decisions about how best to apply honeyclient technologies as part of their security awareness strategies.

Approved for Public Release: 05-1320

Presentation [PDF]


^TOP

Last Updated:05/02/2007

Homeland Security Center Center for Enterprise Modernization Command, Control, Communications and Intelligence Center Center for Advanced Aviation System Development

 
 
 

Solutions That Make a Difference.®
Copyright © 1997-2013, The MITRE Corporation. All rights reserved.
MITRE is a registered trademark of The MITRE Corporation.
Material on this site may be copied and distributed with permission only.

IDG's Computerworld Names MITRE a "Best Place to Work in IT" for Eighth Straight Year The Boston Globe Ranks MITRE Number 6 Top Place to Work Fast Company Names MITRE One of the "World's 50 Most Innovative Companies"
 

Privacy Policy | Contact Us