Attack graphs represent the ways in which an adversary can exploit vulnerabilities to break into a system. System administrators analyze these attack graphs to understand where their system's weaknesses lie and to help decide which security measures will be effective to deploy. In practice, attack graphs are produced manually by Red Teams. Construction by hand, however, is tedious, error-prone, and impractical for attack graphs larger than a hundred nodes. In this talk I present a technique, based on model checking, for generating attack graphs automatically. I also describe different analyses that system administrators can perform in trading off one security measure for another. These analyses can answer questions such as "Given a set of measures, what is a minimum subset needed to make this system safe?"
This work is joint with Somesh Jha and Oleg Sheyner.
Dr. Jeannette M. Wing is the President's Professor of Computer Science and the Head of the Computer Science Department at Carnegie Mellon University. She received her S.B. and S.M. degrees in Electrical Engineering and Computer Science in 1979 and her Ph.D. degree in Computer Science in 1983, all from the Massachusetts Institute of Technology. Starting July 1, 2007, she will head the Computer and Information Science and Engineering Directorate at the National Science Foundation. Professor Wing's general research interests are in the areas of specification and verification, concurrent and distributed systems, and programming languages. Her current focus is on the foundations of trustworthy computing. Professor Wing has published extensively in top journals and major conferences and has given over 200 invited, keynote, and distinguished lectures. She was or is on the editorial board of nine journals, including the Journal for the ACM. Professor Wing is a member of many advisory boards, including: the Networking and Information Technology (NITRD) Technical Advisory Group to the President's Council of Advisors on Science and Tecbnology (PCAST), the National Academies of Sciences's Computer Science and Telecommunications Board, Microsoft's Trustworthy Computing Academic Advisory Board, the Intel Research Pittsburgh's Advisory Board, Dartmouth's Institute for Security Technology Studies Advisory Committee, and the Idaho National Laboratory and Homeland Security Strategic Advisory Committee. She is a Member-at-Large on ACM Council. She is a member of the Sloan Research Fellowships Program Committee. She was a member of the DARPA Information Science and Technology (ISAT) Board and the National Science Foundation Scientific Advisory Board. She was on faculty at the University of Southern California, and has worked at USC/Information Sciences Institute and Xerox Palo Alto Research Laboratories. She spent sabbaticals at MIT in 1992 and at Microsoft Research 2002-2003. She has consulted for Digital Equipment Corporation, the Mellon Institute (Carnegie Mellon Research Institute), System Development Corporation, and the Jet Propulsion Laboratory. She is a member of AAAS, ACM, IEEE, Sigma Xi, Phi Beta Kappa, Tau Beta Pi, and Eta Kappa Nu. Professor Wing is an ACM Fellow and an IEEE Fellow.