Advanced search Help
Searching for terms: EXACT: "Mayo, Jackson Ralph, 1982-" in: author
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
What Then Do We Do About Computer Security?
"In November 2010 Jim Gosler, Sandia Fellow, asked several of us several pointed questions about computer security metrics. Never mind that some of the best minds in the field have been trying to crack this nut without success for decades. Jim asked Campbell to lead an informal and unfunded group to answer the questions. With time Jim invited several more Sandians to join in. We met a number of times both with Jim and without him. At Jim's direction we contacted a number of people outside Sandia who Jim thought could help. For example, we interacted with IBM's T.J. Watson Research Center and held a one-day, videoconference workshop with them on the questions. Over the year Jim added more questions to the list upon occasion and upon occasion we provided our then-current answers in the form of short, informal documents, usually about one page each. As we now complete a year on this work we have gathered our now-current answers and present them in this report. The following are Jim's collected questions: (1) I have a million dollars; how should I spend it to maximize my computer security? (2) I am a program manager for computer security. How do I identify the proposals that will increase my computer security? (3) I am a program manager for computer security. When a funded proposal completes how do I determine how much security I got for my money? (4) Why is this problem so hard? (5) How will our civilization's response to this problem play out? (6) How do I address deterrence in this world? The rest of this report is organized as follows. The next section presents the answers for each of us. The subsequent (and last) section presents a summary."
Sandia National Laboratories
Berg, Michael J.; Campbell, Philip L.; Davis, Christopher E. . . .
2012-01
-
Theory of Diversity and Redundancy in Information System Security: LDRD Final Report
"The goal of this research was to explore first principles associated with mixing of diverse implementations in a redundant fashion to increase the security and/or reliability of information systems. Inspired by basic results in computer science on the undecidable behavior of programs and by previous work on fault tolerance in hardware and software, we have investigated the problem and solution space for addressing potentially unknown and unknowable vulnerabilities via ensembles of implementations. We have obtained theoretical results on the degree of security and reliability benefits from particular diverse system designs, and mapped promising approaches for generating and measuring diversity. We have also empirically studied some vulnerabilities in common implementations of the Linux operating system and demonstrated the potential for diversity to mitigate these vulnerabilities. Our results provide foundational insights for further research on diversity and redundancy approaches for information systems."
Sandia National Laboratories
Mayo, Jackson Ralph, 1982-; Armstrong, Robert C.; Allan, Benjamin A.
2010-10
1