UW CSE Systems Security Research

Users have become more dependent on the Internet as their primary source of content, data, and software. As a result, threats such as spyware, worms, and "phishing attacks" are eroding the integrity of the Internet as well as users' confidence in their computing platforms. Our research seeks to tackle emerging systems security threats in our increasingly interconnected computing world.

[ spyware | secure web browsing | other projects ]

Characterizing Spyware

Our NSDI 2004 paper presented the first quantitative study of the extent of the spyware threat. This study used passive network monitoring at the UW campus border routers to spot traffic associated with four specific spyware programs "phoning home." Any IP address within the campus sending such traffic must be infected with the spyware, providing us with a way of characterizing the number and nature of hosts infected with these programs.

Our NDSS 2006 paper characterizes the spyware threat from a different perspective, namely that of the Web. Using a Web crawler, we examined a large number of executable files and Web pages to look for piggy-backed spyware or drive-by download attacks. Our study revealed some startling statistics, including the fact that approximately 1 in 20 executables on the Web contain spyware. This study also examined trends over time, showing that the number of drive-by downloads has been decreasing substantially. Finally, the study examined drive-by download attacks on the Firefox browser, revealing that they exist but at a significantly lower rate than the IE browser.

Papers and press:

Secure Web browsing

While early Web browsers provided simple access to static hypertext documents, modern browsers serve as de facto operating systems that must manage dynamic and potentially malicious applications. Unfortunately, browsers have not properly adapted to their new role, failing to provide adequate isolation and exposing users and Web services to attack. We have been architecting and implementing the Tahoma "browser operating system" (BOS), a trusted software layer that runs the client-side component of each Web application in its own virtual machine.Tahoma limits the harm that compromised browsers can cause, and it provides Web publishers with mechanisms to control the scope of their Web applications when executed at clients.

In another study, we explore the extent to which homograph attacks take place on the Web, and we describe the design and implementation of a system for defending against them. A homograph is a string of letters that is visually confusable with a different string of letters. A homograph attack attempts to mislead the user by presenting her with a domain name that is visually confusable with a trusted domain name.

Papers:

Other projects

We have conducted research on a number of additional topics, including the effectiveness of worm detectors in the presence of background Internet noise, and improving the incentive-compatibility of anonymous P2P sharing systems.

Papers: