Sponsored by FAMU-FSU Engineering Department of Electrical & Computer Engineering
Friday, Jan. 17 3:00 p.m.
Room 120, CAPS
The 2010 “axioms” of insecurity for commodity software systems explain
why such systems are likely to remain vulnerable for the foreseeable future.
Recent reports of security breaches confirm this long-standing trend, illustrating
high-value penetrations of both business enterprises and government agencies by
state-sponsored adversaries, originating primarily from China and Russia. To counter penetrations
of endpoint systems (e.g., laptops, desktops, mobile phones) and embedded applications (e.g.,
energy distribution subsystems and robotic applications), we designed GreenBox, a low-cost trustworthy
software platform that withstands any remote adversary attack – even when the underlying operating systems
(e.g., Windows, Linux, MacOS, ROS) are fully compromised by zero-day attacks. GreenBox never requires security
patches, and all its updates are formally specified and verified; it retains its secure usability on legacy systems and applications;
and it is not vulnerable to social engineering attacks that insert malicious software into the underlying operating system
and applications. We argue that the one-time cost of achieving GreenBox’s trustworthiness via formal specification and verification is
modest and much below the recurrent cost of recovery from typical software breaches.
Speaker(s): Dr. Virgil Gligor,
Room: 120, Bldg: BLDG A, 2000 Levy Ave, Tallahassee, Florida, United States, 32310