Uva2013 PDF
Uva2013 PDF
Uva2013 PDF
Security Research
Another Turn of the Wheel: Mainframe, Desktop, Cloud, Peer
Christian Grotho
Technische Universitat M unchen
02.07.2013
Never doubt your ability to change the world. Glenn Greenwald
Everybody Has Secrets
Political opinions
Illegal activities
Keeping Secrets
Encryption: baseline
Practice today?
Send everything to US in plaintext
Keeping Secrets
Encryption: baseline
Practice today?
Send everything to US in plaintext
65 MW power consumption
SuperMuc: < 3 MW, 155,656 cores, 3 Peta FLOPS
Likely able to store and process all communication
Cyberwar
Presidential Policy Directive 20, issued October 2012 and released
by Edward Snowden, outlines U.S. cyberwar policy:
Oensive Cyber Eect Operations (OCEO) can oer unique and
unconventional capabilities to advance U.S. national objectives around
the world with little or no warning to the adversary or target and with
potential eects ranging from subtle to severely damaging. (...)
The United States Government shall identify potential targets of national
importance where OCEO can oer a favorable balance of eectiveness
and risk as compared with other instruments of national power, establish
and maintain OCEO capabilities integrated as appropriate with other
U.S. oensive capabilities, and execute those capabilities in a manner
consistent with the provisions of this directive.
Technical Cooperation
Bloomberg reports:
Hack back?
Monitor them?
Hack back?
Monitor them?
Hack back?
Monitor them?
Hack back?
Monitor them?
Hack back?
Monitor them?
Decentralized PKI
No servers
No authorities
No jucy targets for APTs
Decentralize Everything
Decentralized PKI
No servers
No authorities
No jucy targets for APTs
Decentralized vs. Centralized
Decentralized: Centralized:
Slower
No economics of scale
More complex to use
More complex to develop
Hard to secure
Hard to evolve
Decentralized vs. Centralized
Decentralized: Centralized:
Slower Compromised
No economics of scale
More complex to use
More complex to develop
Hard to secure
Hard to evolve
My Research and Development Agenda
Make decentralized systems:
e
r
s
P
e
t
n
a
m
e
S
y
s
t
e
m
s
m
n
e
m
o
n
i
c
U
R
L
s
c
e
r
t
i
c
a
t
e
s
S
D
S
I
Zookos Triangle
1
Joint work with Martin Schanzenbach and Matthias Wachs
The GNU Alternative Domain System (GADS)
Decentralized PKI that can also replace DNS/DNSSEC:
Decentralized resolution (R
5
N DHT)
Pseudonymous le-sharing
Programs using the previous version may use the new version
as drop-in replacement, and programs using the new version
can also work with the previous one. In other words, no
recompiling nor relinking is needed. In this case, bump
revision only, dont touch current nor age.
Programs using the previous version may use the new version
as drop-in replacement, but programs using the new version
may use APIs not present in the previous one. In other
words, a program linking against the new version may fail with
unresolved symbols if linking against the old version at
runtime: set revision to 0, bump current and age.
Syntax is extensible
Stateful multicast
History
Dierence-based updates
name
name rst
address
address street
address country
The data format for each state is xed for each top-level label.
PSYC Methods: Example
A PSYC method has a name which follows the same structure as
keys:
message
message private
message public
message announcement
f and (ab|cd)e
fg
with
corresponding DFAs
q0
a
a
c
c
(ab|cd)e*
b
d
e
(ab|cd)e*f
f
q0
a
a
c
c
(ab|cd)e*
b
d
e
(ab|cd)e*fg*
f
g
Problem: Merging of DFAs
Merged NFA for regular expressions (ab|cd)e
fg
and (ab|cd)e
f
q0
a
a
c
c
(ab|cd)e*
b
d
e
(ab|cd)e*f
f
(ab|cd)e*fg*
f
g
Evaluation
Implementation in GNUnet
Network search
Glenn Greenwald and Ewen MacAskill. NSA Prism program taps in to user data of Apple, Google and
others. In The Guardian, June 7 2013.
George Zornick. Remember When NSA Surveillance Was Used to Help Launch the Iraq War?. In The
Nation, June 11, 2013.
Michael Riley. U.S. Agencies Said to Swap Data With Thousands of Firms. In Bloomberg, Jun 14, 2013.
Rudolf Wagner. US-Spionage: Lauschangri auf die Konkurrenz in Europa. In Der Spiegel, Jan 7, 2001.
Gerhard Schmid. Report on the existence of a global system for the interception of private and commercial
communications (ECHELON interception system) (2001/2098(INI)). In European Parliament Session
Document, July 11, 2001.
Martin Asser. Echelon: Big brother without a cause? In BBC News Online, July 6, 2000.
Nathan Evans and Christian Grotho. R5N. Randomized Recursive Routing for Restricted-Route Networks.
5th International Conference on Network and System Security, 2011.
M. Schanzenbach Design and Implementation of a Censorship Resistant and Fully Decentralized Name
System. Masters Thesis (TUM), 2012.
defg
h and k = 4.
abc*
c
abc*defg*
def
g
abc*defg*h
h
q0
ab
abcc
c
def
abcd
ef
abde
f
GNUnet: Framework Architecture
fs
dht
core
datastore mesh
ats
block nse datacache
peerinfo
hello
transport
exit
tun
vpn
regex
pt
dns
dv
set
gns
namestore
nat fragmentation
topology hostlist
consensus
GNUnet: Envisioned Applications
secushare
psyc voting gns fs reuters
messaging multicast consensus
mesh
dotproduct core
regex dht
ats
set
vpn exit