Collaborative Research: SaTC: CORE: Small: Improving Decentralized Kernel Patch Ecosystems
协作研究:SaTC:CORE:小型:改善去中心化内核补丁生态系统
基本信息
- 批准号:2155213
- 负责人:
- 金额:$ 25万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2022
- 资助国家:美国
- 起止时间:2022-07-01 至 2025-06-30
- 项目状态:未结题
- 来源:
- 关键词:
项目摘要
The objective of this project is to improve the security of open-source operating system (OS) kernels from the supply chain's perspective. As it is extremely costly to develop a brand new OS, a large number of downstream OS kernels are derived from an upstream OS kernel (e.g., Linux) to save development costs. However, this also means that the security of the downstream kernels are dependent on timely patch propagation from the upstream to downstream. The diversity and decentralized nature of downstreams causes delays or even missed upstream patches altogether. Even worse, due to customizations in the downstreams, it is time-consuming to infer which bugs are applicable to downstream and worth patching. Finally, even if they know an upstream vulnerability exists in a downstream and a patch is available, it may require additional efforts to port and test upstream patches --- a significant hurdle for many downstream vendors who are wary of breaking things.This project aims to develop a series of automated and novel analyses to reason about patches, bug behaviors, and their impacts. More specifically, the project will include an analysis of upstream patches and infer which ones fix critical bugs; it will automatically infer which downstreams are affected by an upstream bug and what security impact it bears; it will understand whether the corresponding upstream patch can be applied safely and correctly. The results of the project will alleviate the human burden in analyzing, reviewing, and adopting patches. Ultimately, they will improve the security of the entire open-source OS ecosystem.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
该项目的目标是从供应链的角度提高开源操作系统(OS)内核的安全性。由于开发一个全新的操作系统成本极高,因此大量的下游操作系统内核都是从上游操作系统内核(例如Linux)衍生而来,以节省开发成本。然而,这也意味着下游内核的安全依赖于补丁从上游到下游的及时传播。下游的多样性和分散性会导致延迟,甚至完全错过上游补丁。更糟糕的是,由于下游的定制,推断哪些错误适用于下游并且值得修补是非常耗时的。最后,即使他们知道下游存在上游漏洞并且有可用的补丁,也可能需要额外的努力来移植和测试上游补丁——这对于许多担心破坏事物的下游供应商来说是一个重大障碍。该项目的目标开发一系列自动化的新颖分析来推理补丁、错误行为及其影响。更具体地说,该项目将包括对上游补丁的分析,并推断哪些补丁修复了关键错误;它会自动推断哪些下游受到上游 bug 的影响以及带来什么安全影响;它将了解相应的上游补丁是否可以安全正确地应用。该项目的结果将减轻分析、审查和采用补丁的人力负担。最终,它们将提高整个开源操作系统生态系统的安全性。该奖项反映了 NSF 的法定使命,并通过使用基金会的智力价值和更广泛的影响审查标准进行评估,被认为值得支持。
项目成果
期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
数据更新时间:{{ journalArticles.updateTime }}
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Zhiyun Qian其他文献
Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts
最薄弱的环节在哪里?
- DOI:
10.1007/978-3-319-54328-4_8 - 发表时间:
2017 - 期刊:
- 影响因子:0
- 作者:
Arash Alavi;Alan Quach;Hang Zhang;Bryan Marsh;Farhan ul Haq;Zhiyun Qian;Long Lu;Rajiv Gupta - 通讯作者:
Rajiv Gupta
Packet Header Obfuscation Using MIMO
使用 MIMO 进行数据包标头混淆
- DOI:
10.1109/tnet.2020.2998398 - 发表时间:
2020 - 期刊:
- 影响因子:0
- 作者:
Yue Cao;A. Atya;Shailendra Singh;Zhiyun Qian;S. Krishnamurthy;T. L. Porta;P. Krishnamurthy;L. Marvel - 通讯作者:
L. Marvel
Used by device administration to set the maximum screen off timeout . *
由设备管理用来设置最大屏幕关闭超时。
- DOI:
- 发表时间:
2015 - 期刊:
- 影响因子:0
- 作者:
Yuru Shao;Jason Ott;Qi Alfred Chen;Zhiyun Qian;Z. Morley Mao - 通讯作者:
Z. Morley Mao
Who Moves My App Promotion Investment A Systematic Study about App Distribution Fraud
谁动了我的应用推广投资 关于应用分发欺诈的系统研究
- DOI:
- 发表时间:
2021 - 期刊:
- 影响因子:7.3
- 作者:
Shaoyong Du;Minrui Zhao;Jingyu Hua;Hang Zhang;Xiaoyu Chen;Zhiyun Qian;Sheng Zhong - 通讯作者:
Sheng Zhong
Investigation of the 2016 Linux TCP Stack Vulnerability at Scale
对 2016 年 Linux TCP 堆栈漏洞的大规模调查
- DOI:
- 发表时间:
2017 - 期刊:
- 影响因子:0
- 作者:
Alan Quach;Zhongjie Wang;Zhiyun Qian - 通讯作者:
Zhiyun Qian
Zhiyun Qian的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Zhiyun Qian', 18)}}的其他基金
Collaborative Research: SaTC: CORE: Small: Self-Driving Continuous Fuzzing
协作研究:SaTC:核心:小型:自驱动连续模糊测试
- 批准号:
2247881 - 财政年份:2023
- 资助金额:
$ 25万 - 项目类别:
Continuing Grant
SaTC: CORE: Small: Collaborative: Deep and Efficient Dynamic Analysis of Operating System Kernels
SaTC:核心:小型:协作:操作系统内核的深入有效的动态分析
- 批准号:
1953933 - 财政年份:2020
- 资助金额:
$ 25万 - 项目类别:
Standard Grant
SaTC: CORE: Small: Collaborative: The Web Ad Technology Arms Race: Measurement, Analysis, and Countermeasures
SaTC:核心:小型:协作:网络广告技术军备竞赛:测量、分析和对策
- 批准号:
1719147 - 财政年份:2017
- 资助金额:
$ 25万 - 项目类别:
Standard Grant
CAREER: Empowering Attacker-Centric Security Analysis of Network Protocols
职业:支持以攻击者为中心的网络协议安全分析
- 批准号:
1652954 - 财政年份:2017
- 资助金额:
$ 25万 - 项目类别:
Continuing Grant
NeTS: Small: Collaborative Research: Practical HTTPS Traffic Manipulation At Middleboxes
NetS:小型:协作研究:中间盒的实用 HTTPS 流量操纵
- 批准号:
1619391 - 财政年份:2016
- 资助金额:
$ 25万 - 项目类别:
Standard Grant
TWC: Small: Cache-based Side Channel Attacks on Smartphone Graphics Buffers: New Vulnerabilities and Defenses
TWC:小型:针对智能手机图形缓冲区的基于缓存的侧通道攻击:新漏洞和防御
- 批准号:
1619450 - 财政年份:2016
- 资助金额:
$ 25万 - 项目类别:
Standard Grant
CSR: Small: Collaborative Research: Taming Mobile Hardware & OS Diversity for Comprehensive Software Analysis
CSR:小型:协作研究:驯服移动硬件
- 批准号:
1617573 - 财政年份:2016
- 资助金额:
$ 25万 - 项目类别:
Standard Grant
CRII: SaTC: Analyzing and verifying the security of TCP stacks under multi-entity interactions
CRII:SaTC:多实体交互下TCP协议栈的安全性分析与验证
- 批准号:
1464410 - 财政年份:2015
- 资助金额:
$ 25万 - 项目类别:
Standard Grant
TWC: Small: Collaborative: Multipath TCP Side Channel Vulnerabilities and Defenses
TWC:小:协作:多路径 TCP 侧信道漏洞和防御
- 批准号:
1528114 - 财政年份:2015
- 资助金额:
$ 25万 - 项目类别:
Standard Grant
相似国自然基金
离子型稀土渗流-应力-化学耦合作用机理与溶浸开采优化研究
- 批准号:52364012
- 批准年份:2023
- 资助金额:32 万元
- 项目类别:地区科学基金项目
亲环蛋白调控作物与蚜虫互作分子机制的研究
- 批准号:32301770
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
基于金属-多酚网络衍生多相吸波体的界面调控及电磁响应机制研究
- 批准号:52302362
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
职场网络闲逛行为的作用结果及其反馈效应——基于行为者和观察者视角的整合研究
- 批准号:72302108
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
EIF6负调控Dicer活性促进EV71复制的分子机制研究
- 批准号:32300133
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
相似海外基金
Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
- 批准号:
2317232 - 财政年份:2024
- 资助金额:
$ 25万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Using Intelligent Conversational Agents to Empower Adolescents to be Resilient Against Cybergrooming
合作研究:SaTC:核心:中:使用智能会话代理使青少年能够抵御网络诱骗
- 批准号:
2330940 - 财政年份:2024
- 资助金额:
$ 25万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338301 - 财政年份:2024
- 资助金额:
$ 25万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
- 批准号:
2317233 - 财政年份:2024
- 资助金额:
$ 25万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338302 - 财政年份:2024
- 资助金额:
$ 25万 - 项目类别:
Continuing Grant