<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:admin="http://webns.net/mvcb/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:content="http://purl.org/rss/1.0/modules/content/">

    <channel>
    
    <title>{weblog_name} &#45; Posts by spaf</title>
    <link>{weblog_url}</link>
    <description>{weblog_description}</description>
    <dc:language>{weblog_language}</dc:language>
    <dc:creator>webmaster@cerias.purdue.edu</dc:creator>
    <dc:rights>Copyright 2023</dc:rights>
    <dc:date>2023-11-02T20:29:47+00:00</dc:date>
    <admin:generatorAgent rdf:resource="http://www.expressionengine.com/" />
    

	
    <item>
      <title>Ch&#45;ch&#45;ch&#45;changes</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/ch-ch-ch-changes</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/ch-ch-ch-changes#When:01:24:00Z</guid>
      <description><![CDATA[
	<p>Tomorrow, July 1, 2025, ushers in two significant changes.</p>

<p>For the first time in over 25 years, our fantastic administrative assistant, <a href="https://www.cerias.purdue.edu/site/people/staff/view/9" title="Lori Floyd">Lori Floyd</a>, will not be present to greet us as she has retired.  Lori joined the staff of CERIAS in October of 1999 and has done a fantastic job of helping us keep moving forward. Lori was the first person people would meet when visiting us in our original offices in the Recitation Building, and often the first to open the door at our new offices in Convergence.  At our symposia, workshops, and events of all kinds, Lori helped ensure we had a proper room, handouts, and (when appropriate) refreshments.  She also helped keep all the paperwork and scheduling straight for our visitors and speakers, handled some of our purchasing, and acted as building deputy.  We know she quietly and competently did many other things behind the scenes, and we'll undoubtedly learn about them as things begin to fall apart!</p>

<p>We all wish Lori well in her retirement. She plans to spend time with her partner, kids, and grandkids, travel, and garden. She will be missed at CERIAS, but definitely not forgotten.
</p>
<p>The second change is in the related INSC Interdisciplinary Information Security graduate program, a spin-off of CERIAS.  In 2000, <a href="https://www.linkedin.com/in/melissa-dark-457a4a1a1/" title=" Melissa Dark">Melissa Dark</a>, <a href="https://www.cerias.purdue.edu/site/people/faculty/view/3" title="Victor Raskin">Victor Raskin</a>, and <a href="https://www.cerias.purdue.edu/site/people/faculty/view/1" title="Spaf">Spaf</a> founded the INSC program as the first graduate degree in information/cyber security in the world. The program was explicitly interdisciplinary from the start and supported by faculty across the university.   Students were (and still are) required to take technology ethics and policy courses in addition to cybersecurity courses.   Starting with MS students supported by one of the very first <a href="https://www.nsf.gov/funding/opportunities/sfs-cybercorps-scholarship-service" title="NSF CyberCorp">NSF CyberCorp</a> awards, the program quickly grew and was approved to offer the Ph.D. degree.
</p>
<p>INSC was never formally a part of CERIAS, but students and faculty often saw them as related.  All INSC students were automatically included in CERIAS events, and they were frequently recruited by <a href="https://www.cerias.purdue.edu/site/partners/sponsors/" title="CERIAS partners">CERIAS partners</a> (and still are!).   CERIAS faculty volunteer to serve on INSC committees and to advise the students.  It is a "win&#8211;win" situation that has resulted in some great graduates, many now in some notable positions in industry and government.
</p>
<p>The change coming to INSC is in leadership.  After 25 years as program head, Spaf is stepping into the role of associate head for a while.  Taking on the role of program head is <a href="https://www.cerias.purdue.edu/site/people/faculty/view/4016" title=" Professor Christopher Yeomans">Professor Christopher Yeomans</a>.  Chris has been a long-time supporter of the program with experience as the chair of the Philosophy Department.
</p>
<p>(If you're interested in a graduate degree through INSC visit <a href="https://www.purdue.edu/academics/ogsps/insc/" title="the website">the website</a> describing the program and how to apply.)</p>


		]]></description>
      <dc:subject>General, Infosec Education, Kudos, Opinions and Rants,</dc:subject>
      <dc:date>2025-07-01T01:24:00+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>Reflecting on the Internet Worm at 35</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/reflecting_on_the_internet_worm_at_35</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/reflecting_on_the_internet_worm_at_35#When:20:29:47Z</guid>
      <description><![CDATA[
	<p>Thirty-five  years ago today (November 2nd), the Internet Worm program was set loose to propagate on the Internet.  Noting that now to the computing public (and cybersecurity professionals, specifically) often generates an "Oh, really?" response akin to stating that November 2nd is the anniversary of the inaugural broadcast of the first BBC TV channel (1936), and the launch of Sputnik 2 with Laika aboard (1957).  That is, to many, it is ho-hum, ancient history.</p>

<p>Perhaps that is to be expected after 35 years -- approximately the length of a human generation. (As an aside, I have been teaching at Purdue for 36 years. I have already taught students whose parents had taken one of my classes as a student; in five or so years, I may see students whose grandparents took one of my classes!). In 1988, fewer than 100,000 machines were likely connected to the Internet; thus, only a few thousand people were involved in systems administration and security. For us, the events were more profound, but we are outnumbered by today's user population; many of us have retired from the field...and more than a few have passed on. Thus, events of decades ago have become ancient history for current users.</p>

<p>Nonetheless, the event and its aftermath were profound for those who lived through it. No major security incident had ever occurred on such a scale before.  The Worm was the top news story in international media for days. The events retold in Cliff Stoll's <a href="https://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg_(book)">Cuckoo's Egg</a> were only a few years earlier but had affected far fewer systems. However, that tale of computer espionage heightened concern by authorities in the days following the Worm's deployment regarding its origin and purpose. It seeded significant changes in law enforcement, defense funding and planning, and how we all looked at interconnectivity. In the following years, malware (and especially non-virus malware) became an increasing problem, from <a href="https://en.wikipedia.org/wiki/Code_Red_(computer_worm)">Code Red</a> and <a href="https://en.wikipedia.org/wiki/Nimda">Nimda</a> to today's botnets and ransomware. All of that eventually led to a boom in add-on security measures, resulting in what is now a multi-billion dollar cybersecurity industry. </p>

<p>At the time of the Worm, the study of computing security (the term "cybersecurity" had not yet appeared) was primarily based around cryptography, formal verification of program correctness, and limiting covert channels.  The Worm illustrated that there was a larger scope needed, although it took additional events (such as the aforementioned worms and malware) to drive the message home.  Until the late 1990s, many people still believed  cybersecurity was simply a matter of attentive cyber hygiene and not an independent, valid field of study. (I frequently encountered this attitude in academic circles, and was told it was present in the discussion leading to my tenure. That may seem difficult to believe today, but should not be surprising: Purdue has the oldest degree-granting CS department [60 years old this year], and it was initially viewed by some as simply glorified accounting! It is often the case that outsiders dismiss an emerging discipline as trivial or irrelevant.) </p>

<p>The Worm provided us with an object lesson about many issues that, unfortunately, were not heeded in full to this day.  That multi-billion dollar cybersecurity industry is still failing to protect far too many of our systems.  Among those lessons:</p>
<ul>
<li>Interconnected systems with long-lasting access (e.g., <code>.rshrc</code> files) created a playground for lateral movement across enterprises.  We knew then that good security practice involved fully mediated access (now often referred to as "Zero Trust") and had known that for some time.  However, convenience was viewed as more important than security...a problem that continues to vex us to this day.  We continue to build systems that both enable effortless lateral movement, and  make it difficult or annoying for users to reauthenticate, thus leading them to bypass the checks.</li>

<li>Systems without separation of privilege facilitated the spread of malware.  Current attackers who manage to penetrate key services or privileged accounts are able to gain broader access to entire networks, including the ability to shut off monitoring and updates.  We have proven methods of limiting access (<a href="https://en.wikipedia.org/wiki/Security-Enhanced_Linux">SELinux</a> is one example) but they are too infrequently used. </li>

<li>Sharing information across organizations can result in a more robust, more timely response.  Today, we still have organizations that refuse to disclose if they have been compromised, thus delaying our societal response; information obtained by government agencies has too often been classified, or at least closely held.. The information that is shared is frequently incomplete or not timely. </li>

<li>The use of type-unsafe languages with minimal security features can lead to flaws that may be exploited.  One only needs to survey recent <a href="https://cve.mitre.org">CVE</a> entries and attack reports to see buffer overflows, type mismatches, and other well-known software flaws leading to compromise.  Many organizations are still producing or reusing software written in C or C++ that are especially prone to such errors.  Sadly, higher education is complicit by teaching those languages as primary, mainly because their graduates may not be employable without them.</li>

<li>Heterogenity of systems provides some bulwark against common attacks.  Since 1988, the number of standard operating systems in use has <em>decreased</em>, as has the underlying machine architectures. There are clearly economic arguments for reduced numbers of platforms, but the homogeneity facilitates common attacks. Consideration of when to reuse and when to build new is sadly infrequent.</li>


<li>The Worm incident generated conflicting signals about the propriety of hacking into other people's systems and writing malware.  Some people who knew the Worm's author rose to his defense, claiming he was demonstrating security problems and not doing anything wrong. Malware authors and system attackers commonly made that same claim in the decades following, with mixed responses from the community. It still colors the thinking of many in the field, justifying some very dubious behavior as somehow justified by results. Although there is nuance in some discussions, the grey areas around pen testing, companies selling spyware, and "ethical" hacking still enable plausible explanations for bad behavior.</li>
</ul>
<p>That last point is  important as we  debate the dangers and adverse side-effects of machine learning/LLM/AI systems.  Those are being refined and deployed by people claiming they are not responsible for the (mis)use of (or errors in) those systems and that their economic potential outweighs any social costs.  We have failed to clearly understand and internalize that not everything that <em>can be</em> done <em> should be</em> done, especially in the Internet at large.  This is an issue that keeps coming up and we continue to fail to address it properly.</p>

<p>As a field, cybersecurity is relatively young.  We have a history that arguably starts in the 1960s with the Ware Report.  We are still discovering what is involved in protecting systems, data privacy, and safety.  Heck, we still need a commonly accepted definition of what cybersecurity entails! (Cf. Chapter 1 of the Cybersecurity Myths book, referenced below.). The <a href="https://www.cerias.purdue.edu/site/education/graduate_program/#interdisciplinary">first cybersecurity degree program</a> wasn't established until 2000 (at Purdue).  We still lack useful metrics to know whether we are making significant progress and titrate investment. And we are still struggling with tools and techniques to create and maintain secure systems.  All this while the market (and thus need) is expanding globally.</p>

<p>In that context of growth and need, we should not dismiss the past as "Ho-hum, history." Members of the military study historic battles to avoid future mistakes: mentioning the Punic Wars or The Battle of Thermopylae to such a scholar will not result in dismissal with "Not relevant."  If you are interested in cybersecurity, it would be advisable to study some history of the field and think about lessons learned -- and unlearned.</p>

<hr />
<h3>Further Reading</h3>
<dl>
<dt><a href="https://archive.org/details/ware70">The Ware Report</a></dt>
<dd>This can be seen as one of the first descriptions of cybersecurity challenges, needs and approaches.</dd>

<dt><a href="https://ieeexplore.ieee.org/document/1451869">The protection of information in computer systems</a></dt>
<dd>A paper from 1975 by J.H. Saltzer and M.D. Schroeder.  This paper refers to basic design principles, in large part inspired by Multics, that include <em>complete mediation</em> (now somewhat captured by "Zero Trust") and <em>least privilege</em>.  These are most often violated by software rather than designed in, especially <em>economy of mechanism</em>. <br /> (Versions of this paper may be found outside the paywall via web search engines.)</dd>

<dt><a href="https://seclab.cs.ucdavis.edu/projects/history/seminal.html">Historical papers archive</a></dt>
<dd>A collection of historical papers presenting the early foundation of cybersecurity.  This includes the Ware Report, and its follow-on, the Anderson Report.  Some other, hard-to-find items <a href="https://seclab.cs.ucdavis.edu/projects/history/CD-1/">are here.</a></dd>

<dt><a href="https://dl.acm.org/toc/cacm/1989/32/6">The Communications of the ACM Worm Issue</a><dt>
<dd>An issue of CACM was devoted to papers about the Worm.</dd>

<dt><a href="https://dl.acm.org/doi/10.1145/66093.66095">The Internet Worm: An Analysis</a></dt>
<dd>My full report analyzing what the Worm program did and how it was structured.</dd>

<dt><a href="https://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1792&context=cstech">The Internet Worm Incident</a></dt>
<dd>A report describing the timeline of the Worm release, spread, discovery, and response.</dd>

<dt><a href="https://doi.org/10.1126/science.1140909">Happy birthday, dear viruses</a></dt>
<dd>This is a short article in <cite>Science</cite> I coauthored with Richard Ford for the 25th anniversary of the Worm, about malware generally.</dd>

<dt><a href="https://informit.com/cybermyths">Cybersecurity Myths and Misconceptions</a></dt>
<dd>A new book about things the public and even cybersecurity experts mistakenly believe about cybersecurity.  Chapter 1 addresses, in depth, how we do not have an accepted definition of cybersecurity or metrics to measure it.  Other items alluded to in this blog post are also addressed in the book.</dd>

<dt><a href="https://www.cerias.purdue.edu/site/blog/post/cyber_security_challenges_and_windmills/">Cyber security challenges and windmills</a></dt>
<dd>One of my blog posts, from 2009, about how we continue to generate studies of what would improve cybersecurity and then completely fail to heed them.  The situation has not improved in the years since then. </dd>
</dl>
		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2023-11-02T20:29:47+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>AI and ML Sturm und Drang</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/ai_and_ml_sturm_und_drang</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/ai_and_ml_sturm_und_drang#When:02:07:44Z</guid>
      <description><![CDATA[
	&#65279;I recently wrote up some thoughts on the current hype around ML and AI. I sent it to the Risks Digest. Peter Neumann (the moderator) published a much-abbreviated version.   This is the complete set of comments.


There is a massive miasma of hype and misinformation around topics related to AI, ML, and chat programs and how they might be used&#8230;or misused. I remember previous hype cycles around 5th-generation systems, robotics, and automatic language translation (as examples). The enthusiasm each time resulted in some advancements that weren&#8217;t as profound as predicted. That enthusiasm faded as limitations became apparent and new bright, shiny technologies appeared to be chased.

The current hype seems even more frantic for several reasons, not least of which is that there are many more potential market opportunities for recent developments. Perhaps the entities that see new AI systems as a way to reduce expenses by cutting headcount and replacing people with AI are one of the biggest drivers causing both enthusiasm and concern (see, for example, <a href="https://www.businessinsider.com/chatgpt-jobs-at-risk-replacement-artificial-intelligence-ai-labor-trends-2023-02?op=1#teachers-5" title="this article">this article</a>). That was a driver of the robotics craze some years back, too. The current cycle has already had an impact on some creative media, including being an issue of contention in the media writers' strike in the US. It also is raising serious questions in academia, politics, and the military. 

There&#8217;s also the usual hype cycle FOMO (fear of missing out) and the urge to be among the early adopters, as well as those speculating about the most severe forms of misuse. That has led to all sorts of predictions of outlandish capabilities and dire doom scenarios &#8212; neither of which is likely wholly accurate. AI, generally, is still a developing field and will produce some real benefits over time. The limitations of today's systems may or may not be present in future systems. However, there are many caveats about the systems we have now and those that may be available soon that justify genuine concern.

First, LLMs such as ChatGPT, Bard, et al. are <b>not</b> really "intelligent."  They are a form of statistical inference based on a massive ingest of data. That is why LLMs "hallucinate" -- they produce output that matches their statistical model, possibly with some limited policy shaping. They are not applying any form of "reasoning," as we define it. As noted in a footnote in my recent book, <blockquote>Philosophically, we are not fond of the terms 'artificial intelligence' and 'machine learning,' either. Scholars do not have a good definition of intelligence and do not understand consciousness and learning. The terms have caught on as a shorthand for 'Developing algorithms and systems enhanced by repeated exposure to inputs to operate in a manner suggesting directed selection.'  We fully admit that some systems seem brighter than, say, certain current members of Congress, but we would not label either as intelligent.</blockquote>  I recommend reading  <a href="https://medium.com/center-on-privacy-technology/artifice-and-intelligence%C2%B9-f00da128d3cd" title="this">this</a> and <a href="https://garymarcus.substack.com/p/nonsense-on-stilts" title="this">this</a> for some other views on this topic.  (And, of course, buy and read at least one copy of <a href="https://informit.com/cybermyths" title="the book">Cybermyths and Misconceptions</a>. :-)

Depending on the data used to build their models, LLMs and other ML systems may contain biases and produce outright falsehoods.   There are many examples of this issue, which is not new: bias in chatbots (e.g., <a href="https://www.theverge.com/2016/3/24/11297050/tay-microsoft-chatbot-racist)" title="Microsoft Tay turning racist">Microsoft Tay turning racist</a>, <a href="https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing" title="bias in court sentencing recommendation systems">bias in court sentencing recommendation systems</a>, and bias in facial recognition systems such as discussed in the movie <a href="https://www.codedbias.com/" title="Coded Bias">Coded Bias</a> ). More recently, there have been reports showing racial, religious, and gender biases in versions of ChatGPT (as example,<a href="https://www.worthwhileconsulting.com/read-watch-listen/chatgpt-insists-that-doctors-are-male-and-nurses-female" title=" this story"> this story</a>). &#8220;Hallucinations&#8221; of non-existent facts in chatbot output are well-known. Beyond biases and errors in chats, one can also find all sorts of horror stories about autonomous vehicles, including several resulting in deaths and serious injuries because they aren&#8217;t comprehensive enough for their uses.

These limitations are based on how the systems are trained. However, it is also possible to "poison" these systems on purpose by feeding them bad information or triggering the recall of biased information. This is an area of burgeoning study, especially within the security community. Given that encoded systems derived in these large ML models cannot be easily reversed to understand precisely what causes certain decisions to be made (often referred to as "explainable AI"), there are significant concerns about inserting these systems in critical paths.

Second, these systems are not accountable in current practice and law. If a machine learning system (I'll use that term but cf my 2nd paragraph) comes up with an action that results in harm, we do not have a clear path of accountability/responsibility. For instance, who should be held at fault if an autonomous vehicle were to run down a child? It is not an "accident" in the sense that it could not be anticipated.   Do we assign responsibility to the owner of the vehicle? The programmers? The testers? The stockholders of the vendor? We cannot say that "no one" is responsible because that leaves us without recourse to force a fix of any underlying problems, of potential recompense to the victims, and to general awareness for the public.   Suppose we use such systems safety or correctness-critical systems (and I would put voting, healthcare, law enforcement, and finance as exemplars). In that case, it will be tempting for parties to say, "The computer did it," rather than assign actual accountability. That is obviously unacceptable: We should not allow that to occur. The price of progress should not be to absolve everyone of poor decisions (or bad faith). So who <i>do</i> we blame?

Third, the inability of much of the general public to understand the limitations of current systems means that any use may introduce a bias into how people make their own decisions and choices. This could be random, or it could be manipulated; either way, it is dangerous. It could be anything from gentle marketing via recency effects and priming all the way to Newspeak and propaganda. The further towards propaganda we go, the worse the outcome may be. Who draws the line, and where is it drawn?  

One argument is, "If you train humans on rampant misinformation, they would be completely biased as well, so how is this different?"  Well, yes -- we see that regularly, which is why we have problems with Q-anon, vaccine deniers, and sovereign citizens (among other problem groups). They are social hazards that endanger all of us. We should seek ways to reduce misinformation rather than increase it. The propaganda that is out there now is only likely to get worse when chatbots and LLMs are put to work, producing biased and false information. This has already been seen (e.g., <a href="https://www.nytimes.com/2023/02/07/technology/artificial-intelligence-training-deepfake.html" title="this story">this story</a> about deepfakes), and there is considerable concern about the harm this can bring. Democracy is intended to work best when the voters have access to accurate information. The rising use of these new generative AI systems is already raising the specter of more propaganda, including deep-fake videos.

Another problem with some generative systems (artwork, generating novels, programming) is that they are trained on information that might have restrictions, such as copyright. This raises some important questions about ownership, creativity, and our whole notion of issues of rule of law; the problems of correctness and accountability remain. There is some merit to the claim that systems trained on (for example) art by human artists may be copying some of that art in an unauthorized manner. That may seem silly to some technologists, but we&#8217;ve seen lawsuits successfully executed against music composers alleged to have heard a copyrighted tune at some point in the past. The point is the law (and perhaps more importantly, what is fair) is not yet conclusively decided in this realm.

And what of leakage? We&#8217;re already seeing cases where some LLM systems are ingesting the questions and materials people give them to generate output. This has resulted in sensitive and trade secret materials being taken into these databases&#8230;and possibly discoverable by others with the right prompting (e.g., <a href="https://www.techradar.com/news/samsung-workers-leaked-company-secrets-by-using-chatgpt" title="this incident at Samsung">this incident at Samsung</a>). What of classified material? Law enforcement sensitive material? Material protected by health privacy laws? What happens for models that are used internationally when the laws are not uniform? Imagine the first &#8220;Right to be forgotten&#8221; lawsuits against data in LLMs. There are many questions yet to be decided, and it would be folly to assume that computing technologists have thoroughly explored these issues and designed around them. 

As I wrote at the beginning, there are potential good uses for some of these systems, and what they are now is different from what they will be in, for example, a decade. However, the underlying problem is what I have been calling "The Trek futurists" -- they see all technology being used wisely to lead us to a future roughly like in Star Trek. However, humanity is full of venal, greedy, and sociopathic individuals who are more likely to use technology to lead us to a "Blade Runner" future ... or worse. And that is not considering the errors, misunderstandings, and limitations surrounding the technology (and known to RISKS readers). If we continue to focus on what the technology <i>might</i> enable instead of the reality of how it <i>will</i> be (mis)used, we are in for some tough times. One of the more recent examples of this general lack of technical foresight is cryptocurrencies. They were touted as leading to a more democratic and decentralized economy. However, some of the highest volumes of uses to date are money laundering, illicit marketplaces (narcotics, weapons, human trafficking,  etc.),  ransomware payments, financial fraud, and damage to the environment. What valid uses of cryptocurrency there might be (<i>if</i> there are any) seem heavily outweighed by the antisocial uses.

We should not dismiss, out of hand, warnings about new technologies and accuse those advocating caution as &#8220;Luddites.&#8221;  Indeed, there are risks to not developing new technologies. However, the more significant risk may be assuming that only the well-intentioned will use them.


		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2023-06-06T02:07:44+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>Reflections on the 2023 RSA Conference</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/reflections_on_the_2022_rsa_conference</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/reflections_on_the_2022_rsa_conference#When:18:26:32Z</guid>
      <description><![CDATA[
	<p>I have attended 14 of the last 22 RSA conferences.  (I missed the last three because of COVID avoidance; many people I know who went became infected and contributed to making them superspreader events.  I saw extremely few masks this year, so I will not be surprised to hear of another surge.  I spent all my time on the floor and in crowds with a mask -- I hope that was sufficient.)

<p>I have blogged here about previous iterations of the conference (<a href="https://www.cerias.purdue.edu/site/blog/tag/rsa-conference" title="2007">2007</a>, <a href="xhttps://www.cerias.purdue.edu/site/blog/post/thoughts_on_the_rsa_conference_boycotts_and_babes/https://www.cerias.purdue.edu/site/blog/post/thoughts_on_the_rsa_conference_boycotts_and_babes/" title="2014">2014</a>, <a href="https://www.cerias.purdue.edu/site/blog/post/another_year_another_rsac/" title="2016">2016</a>, and most recently, <a href="https://www.cerias.purdue.edu/site/blog/post/the_rsa_2019_conference/" title="2019">2019</a>).  Reading back over those accounts makes me realize that little has really changed. Some of the emphasis has changed, but most of what is exhibited and presented is not novel nor does it address root causes of our problems.  

<p>Each year, I treasure meeting with old friends and making some worthwhile new acquaintances with people who actually have a clue (or two). Sadly, the number of people I stop to chat with who don't have the vaguest idea about the fundamentals of the field or its history continue to constitute the majority.  How can the field really progress if the technical people don't really have a clue what is actually known about security (as opposed to known about the products in their market segment)?

<p>I was relieved to not see hype about blockchain (ugh!) or threat intelligence.  Those were fads a few years ago.  Apparently, hype around quantum and LLMs has not yet begun to build in this community.  Zero trust and SBOM were also understated themes, thankfully. I did see more hardware-based security, some on OT, and a little more on user privacy.  All were under-represented. 

<p>My comments on the <a href="https://www.cerias.purdue.edu/site/blog/post/the_rsa_2019_conference/" title="2019 RSAC">2019 RSAC</a> could be used almost word-for-word here.  Rather than do that, I strongly suggest you revisit those comments now.

<p>Why did I go if I think it was so uninspiring?  As usual, it was for people.  Also, this year, I was on a panel for our recent book, <a href="https://www.informit.com/store/cybersecurity-myths-and-misconceptions-avoiding-the-9780137929238" title="Cybersecurity Myths and Misconceptions."<i>Cybersecurity Myths and Misconceptions.</i></a>. Obviously, I have a bias here, but I think the book addresses a lot of the problems I am noting with the conference.  We had a good turnout at the panel session, which was good, but almost no one showed up at the book signings.  I hope that isn't a sign that the book is being ignored, but considering it isn't hyping disaster or a particular set of products, perhaps that is what is happening.  Thankfully, some of the more senior and knowledgable people in the field did come by for copies or to chat, so there is at least that.   (I suggest that after you reread my 2019 comments, you get a copy of the book and think about addressing some of the real problems in the field.)

<p>Will I go to the 2024 RSAC Conference? It depends on my health and whether I can find funds to cover the costs: It is expensive to attend, and academics don't have expense accounts.  If I don't go, I will surely miss seeing some of the people who I've gotten to know and respect over the years. However, judging by how many made an effort to find me and how the industry seems to be going, I doubt will be missed if I am not there.  That by itself may be enough reason to plan an alternate vacation

		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2023-04-28T18:26:32+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>Interview with Spaf at S4x23</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/interview_with_spaf_at_s4x23</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/interview_with_spaf_at_s4x23#When:01:58:00Z</guid>
      <description><![CDATA[
	<p>
    If you didn't get a chance to attend <a href="https://s4xevents.com">S4x23</a> to hear the talks, or you simply haven't heard enough from Spaf yet, <a href="https://m.youtube.com/watch?v=P2WyEiO9thk&feature=youtu.be">here is a recording</a> of the keynote interview with Spaf by Dale Peterson.
The interview covered a lot of ground about the nature of defensive security, the new <a href="https://informit.com/cybermyths">Cybermyths book</a> (got yours yet?), OT security, the scope of security understanding, having too much information, and having a good security mindset.
</p>
<p></p>
<p>
    This and other interviews and talks Spaf has given are on the <a href="https://www.youtube.com/@ProfessorSpaf">Professor Spaf YouTube channel</a>.
</p>
<iframe title="YouTube -Interview with Spaf at S4x23" src="https://www.youtube-nocookie.com/embed/P2WyEiO9thk" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen=""></iframe>
		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2023-04-11T01:58:00+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>Serious CERIAS Recognition</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/cerias_medals</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/cerias_medals#When:01:37:07Z</guid>
      <description><![CDATA[
	
<p>At the 25th anniversary CERIAS Symposium on March 29, we made a special awards presentation.</p>

<p>Unfortunately, I had lost my voice. Joel Rasmus read my remarks (included in what follows). I want to stress that these comments were heartfelt from all of us, especially me.</p>

<p>25 years ago, I agreed to start something new -- something, unlike anything that had existed at Purdue before. I soon discovered that it was unlike any other academic center others had encountered: a <i>multidisciplinary</i> center built around the concept of increasing the security and safety of people by addressing problems from, and with, computing. I note that I wasn't the only faculty member involved. Core faculty at the time were <a href="https://www.cs.purdue.edu/people/faculty/wagstaff.html" title="Sam Wagstaff">Sam Wagstaff</a>,  <a href="https://www.cs.purdue.edu/people/faculty/matallah.html" title="Mike Atallah">Mike Atallah</a>, and  <a href="https://www.khoury.northeastern.edu/people/carla-brodley/" title="Carla Brodley">Carla Brodley</a>, then in our School of ECE.  Sam and Mike have been steady contributors for more than 25 years (stretching back to the pre-CERIAS, <a href= "https://www.cerias.purdue.edu/site/about/history/coast/coast.php" title= "COAST">COAST</a> days); as an Emeritus Professor, Sam is still working with us. </p>

<p>I knew I needed help making the new entity succeed. My first step was hiring some great staff -- Andra Nelson (now Martinez) and Steve Hare were the first two new hires; the late Marlene Walls was already working for me. Those three played a huge role in getting CERIAS running and helping with an initial strategic plan. We have recognized them in the past (and will feature them prominently in the history of CERIAS when I get around to writing it).</p>

<p> I quickly followed those hires by organizing an advisory board. Some of the members were personnel from the organizations that were committed to supporting us. Others were people in senior positions in various agencies and companies. And a few were friends who worked in related areas.</p>

<p>Those choices seem to have worked out pretty well. CERIAS grew from four involved faculty in April 1998 to (as of March 2023) 163. We went from four supporting companies and agencies to two dozen. We have thousands of alumni and worldwide recognition. There is considerable momentum for excellence and growth in the years to come. </p>

 <p> CERIAS has benefited from the counsel, support, and leadership of scores of wonderful people from strategic partner organizations who served on the <a href= "https://www.cerias.purdue.edu/site/partners">External Advisory Board</a> over the years. However, some particularly stand out because they went above and beyond in their efforts to help CERIAS succeed. On this special occasion of our 25th anniversary,  we recognize six exceptional advisors who helped CERIAS succeed and be what it is today.   </p>

<p>(Unfortunately, due to various issues, none were present at the Symposium in person to receive the awards. This post is to share with everyone else how much we value their history with us.)</p>
<h3>Silver Medals</h3>
<p>We are bestowing five silver Foundation Award Medals to these individuals:</p>
<ul><li><a href="https://www.sdsc.edu/~skarin/" title="Dr. Sidney Karin">Dr. Sidney Karin</a>. Sid was a founder of the National Supercomputer Center program and was the founder and director of the Supercomputing Center at San Diego. He was a pioneer in that field and has received numerous recognitions for his leadership in supercomputing and networking. Sid graciously volunteered his time and tremendous expertise to sit on our advisory board for our formative years, providing insight into structuring and running an academic center.</li>

<li><a href="https://www.linkedin.com/in/david-ladd-883145/" title="David Ladd">David Ladd</a>.  David was (and is) with Microsoft, (then) working in university support and cybersecurity. He volunteered for our board and served as one of the rotating chairs. He also organized strong support from Microsoft, ensuring we had equipment, guest speakers, and internships for our students. He was a voice for Microsoft and industry, but more importantly, a strong voice for practical research.</li>

<li><a href="http://luminationllc.com/Lumination,_LLC/About.html" title="John Richardson">John Richardson</a>.  John was with the Intel Corporation and an enthusiastic supporter of CERIAS. He also served as one of the rotating chairs as a member of the EAB. John went above and beyond to help secure guest speakers, equipment, student internships, and other companies' support. He also put strong research and the welfare of the students ahead of his company's interests.
</li>
<li>Dr.Robert E. (Bob) Roberts. Bob was the Chief Scientist for the<a href= "https://ida.org" title=" Institute for Defense Analyses"> Institute for Defense Analyses</a> (IDA), an FFRDC well-known to those in government.  He provided great wisdom as a member of our EAB, including deep insights into understanding some conflicting requirements within the government. By training, he wasn't a computer scientist, but his breadth of knowledge across many scientific disciplines helped us navigate many of our multidisciplinary issues. </li>

<li>The late Emil Sarpa, the Manager of External Relations at Sun Microsystems. Emil did not serve on the board, but he was constantly present, ensuring that CERIAS had every computing resource we could need from Sun Microsystems, including many items in pre-release. He helped make introductions in the industry and got our students into fantastic opportunities. His support began pre-CERIAS with one of the initial grants that started the COAST Laboratory, and he ensured that Sun was CERIAS's biggest founding partner.</li>
</ul>
<p>These five people provided assistance above and beyond what we expected, and we will be forever grateful.

<h3>Gold Medal</h3>
<p>We had one final, special award.</p>

<p>Timothy Grance has been a mainstay at <a href= "https://nist.gov" title= "NIST">NIST</a> (National Institute for Standards and Technology) for decades. You can find his name on many of the reports and standards NIST has issued and other computing and cybersecurity activities. He's not as well known as many of our advisors because he prefers to provide quiet, steady contributions. Most importantly to CERIAS, Tim has great vision and is one of the rare people who can find ways to help others work together to solve problems. He is inspirational, thoughtful, and cares deeply about the future. These qualities have undoubtedly been useful in his job at NIST, but he brought those same skills to work for CERIAS at Purdue and even before as an advisor to COAST.</p>

<p>For the last 25 years, Tim was (and continues to be) an honored member of the External Advisory Board. He has attended countless board meetings and events over the years &#8212;<b> all at his personal expense</b>. He made introductions for us across a wide variety of institutions -- academic, governmental, and commercial -- and hosted some of the EAB meetings. He has always provided sage advice, great direction, and quiet support for all we have done.   Despite being somewhat limited by a significant stroke a few years ago, he fought back courageously and returned to CERIAS for our Symposium and Board meeting. We reserve a chair for him even when he cannot travel to be with us.  </p>

<p> Tim's commitment to the field, especially to CERIAS, make him a national treasure. We are proud also to consider him a CERIAS treasure, and thus award the Gold Foundation Award Medal to Timothy Grance.</p>

<h2>Thank you</h2>
<p> We conclude with sincere thanks, not only to these six wonderful people, but to all those who, over the years, have provided support, advice, time, equipment, funding, problem sets, and simply good cheer. That CERIAS has made it 25 years successfully and continues to grow and innovate is a testament to the importance of the problems and the willingness of such a large community to help address them. Time has only grown the problem set, but everyone associated with CERIAS is ready and willing to take them on. We all look forward to continuing our engagement with the community in doing so!</p>
		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2023-03-31T01:37:07+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>Malicious Compliance: A story</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/malicious_compliance_a_story</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/malicious_compliance_a_story#When:20:05:41Z</guid>
      <description><![CDATA[
	I recently saw an account of malicious compliance recounted in r/eddit and quoted in a Mastodon thread
<blockquote>
Not allowed to work from home so I don't<br>
My job recently told me that even during the snowstorm we got earlier this week, I am not allowed to work from home at all. Even though I work in IT and do everything remotely, they want me in the office.<br>
So I deleted Teams and my email off my phone. I am no longer available after hours.<br>
My boss tried to call me for something urgent last night and couldn't reach me. He asked why today and I explained to him what I was told.<br>
I am not allowed to work from home.
</blockquote>

<p>It prompted me to think of several instances where I have engaged in behavior that might be described as malicious compliance; I prefer to think of them as instances of "security compliance education."   Here's one such instance that my students see  enjoy hearing about.

<p>In 2000, we got some funding from a US federal agency (which will be unnamed) to explore for potential vulnerabilities in a commercial printer/copier combination.  My technical point of contact (POC) told me that we didn't need to file any reports until we had some results.  Apparently, he didn't convey this to the agency business person because the contract specified a long, convoluted monthly report.  I was forcibly reminded of this requirement a week after the contract was finalized, even though it was in the midst of the winter break, and absolutely nothing had happened -- or would happen, for at least another month.

<p>I grumbled a bit but compiled the report with basically "nothing to report" and "nothing spent" in the various sections and uploaded it via FTP to their designated site as a PDF.

<p>Now, it is important to this story that my standard computers for use at the time were Sun workstations and Macintosh systems.  Most of the research we did was on these systems, and our papers and reports were produced using LaTeX.  We avoided Windows because it was usually so buggy (blue screens) and so prone to security problems.  We also avoided Word because (a) it was (and is) annoying, and (b) it was a common vector for computer viruses.  Thus, my monthly report was produced using LaTeX.

<p>Two weeks into the semester, I got an email from some clerk at the sponsoring agency noting that the monthly report <b>must</b> be submitted as a Word document; the contract specified Word and only Word, and I <b>must</b> submit the report as a Word document, with no deviation allowed.  I placed a call to my POC, and he indicated, apologetically, that he could not alter the terms as they were standard for the agency involved: <i>everyone</i> had to abide by them.  

<p>Grrrrr....

<p>So, after a little thought,<sup>1</sup> I produced the next monthly report in LaTeX as before.  I produced a PDF of the report and printed it.  Then, I scanned each sheet individually into a graphic file (.pic, as I recall).  I then rebooted one of our Windows machines<sup>2</sup> into MS-DOS and loaded up the oldest version of MS Word I could locate.  After consulting the manual, I created a document where each page contained an image -- the corresponding image for that page of the report I had prepared.  I saved it out to disk (it was huge), and uploaded it to the sponsor FTP site.  Yes, it was basically a huge file of graphic images, but it was technically a Word file.

<p>
The next day I got an automated response noting the submission.  Three days later, I got an email asking if the report was what I actually intended to upload.  I responded that yes, it was. I indicated it had all the required information and was most definitely a Word document.  I also alerted my POC about the upload (he was amused).

<p>Another few days later and I got email from the original person who had complained about the PDF now complaining they were having difficulty with the file.  I responded that the contract required Word, and that is what I used -- I wasn't responsible for their IT issues.

<p>In month 3, I went through the same procedure but didn't have the email exchanges.

Purdue then got an email from the agency business office stating that they were altering their standard business practices to allow all contractor reports to be submitted in Word <i>-or-</i> PDF.  Would we mind submitting PDF henceforth?   I briefly weighed the idea of continuing my production of Word versions of the report but decided that changing the business practices of a whole federal agency was enough.

<hr />
<p>Footnotes:<br>
1. Someone once asked me why I didn't send them a Word document with some mischevious macros.  I replied "USC 18 &#167; 1030" (that's the Computer Fraud and Abuse Act).

<p>2.  Microsoft was a CERIAS partner at the time.  When their rep visited, he saw that the lab was equipped with only Sun machines and Macintoshes.  A few weeks later, we had several nice servers with Windows preinstalled delivered to the CERIAS lab.   All our existing systems were named after mythical and fictional places (e.g., Amber, Oz, Dorsai, Uqbar), and we wanted to continue that scheme.  We collectively decided to name the new machines Hel, Tartarus, and Niflheim.   When he next visited and saw the machines, with nametags attached, he smiled a little.  Two weeks later, we got another three, and they got related names; I can't recall exactly, but I think they were Underworld, Mictlan, and Jahannam).  At his next visit, he remarked he could send us a lot more machines.  I said we'd find a home for them, and welcome the chance to engage more of our philosophy, history, and literature faculty in the process.

<p>All that said, we actually had a great working relationship with MS, and they hired a lot of our graduates.  The machines did get a lot of use in experiments and classes.


		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2023-02-03T20:05:41+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>Three podcasts with Spaf</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/three_podcasts_with_spaf</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/three_podcasts_with_spaf#When:21:02:07Z</guid>
      <description><![CDATA[
	<p>If you haven't reached your quota yet for hearing from Santa Spaf, here are three recent podcasts where I was interviewed on a variety of topics.  One common theme: The role of people in cybersecurity. A second theme: Some future trends.</p>

<ul>
<li><cite><a href="https://resource.cobalt.io/humans-of-infosec/episode-78-how-todays-technology-choices-could-shape-our-future-eugene-spafford">How Today&#8217;s Technology Choices Could Shape Our Future</a></cite> with Caroline Wong in the Cobalt.io podcast, <u>Humans of Infosec</u>.</li>
<li><cite><a href="https://www.scmagazine.com/podcast-episode/csp-100-cybersecurity-myths-misconceptions-avoiding-the-pitfalls-eugene-spafford">Cybersecurity Myths & Misconceptions: Avoiding The Pitfalls</a></cite> with Todd Fitgerald in the <u>CIS Stories</u> podcast.</li>
<li><cite><a href="https://cisoseries.com/theyre-young-green-and-very-hackable/">They&#8217;re Young, Green, and Very Hackable</a></cite> with David Spark and Mike Johnson in the <u>CISO Series Podcast</u>.</li>
</ul>


		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2022-12-15T21:02:07+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>Spaf Interviewed About His New Book</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/spaf_is_interviewed_about_his_new_book</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/spaf_is_interviewed_about_his_new_book#When:20:18:00Z</guid>
      <description><![CDATA[
	<p>In the 100th episode of CISO Stories: Discussion with <a href="https://spaf.cerias.purdue.edu/">Gene Spafford</a> on some of the common cybersecurity myths and how to better cope with the changing environment. <a href="https://bit.ly/3YsE1V0">Join here.</a></p>
<p>
For those of you interested in more info on the book discussed in the podcast, see <a href="https://informit.com/cybermyths">this InformIT site</a>. If you preorder now, you can get a 35% discount with code CYBERMM.</p>
<p>
A longer info sheet is available <a href="https://www.dropbox.com/s/hci5sqg7obbp23x/Myths.pdf">here</a>. </p>
		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2022-12-13T20:18:00+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>2022 ISSA Honorees</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/2022_issa_honorees</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/2022_issa_honorees#When:19:58:30Z</guid>
      <description><![CDATA[
	<p>Cybersecurity and privacy have several notable professional associations associated with them.  Some, such as ACM, the IEEE Computer Society, and IFIP are more generally about computing.  One of the societies specifically directed to cybersecurity is the ISSA -- the<a href="https://issa.org" title=" Information Systems Security Association International"> Information Systems Security Association International</a>.  ISSA promotes the development and standards of the profession, globally.</p>

<p>Each year, ISSA recognizes individuals who have made significant contributions to the association and to the field overall.  In prior years, both <a href="https://www.cs.purdue.edu/people/faculty/bertino.html" title="Professor Elisa Bertino">Professor Elisa Bertino</a> and <a href="https://www.cs.purdue.edu/people/faculty/spaf.html" title="Professor Eugene Spafford">Professor Eugene Spafford</a> have been recognized by ISSA: both have been inducted into the ISSA Hall of Fame, and Spaf has been named as a Distinguished Fellow of the organization.</p>

<p>ISSA has announced its <a href="https://www.issa.org/issa-international-awards-2022/" title="2022 honorees">2022 honorees</a>.  Our congratulations to all these people for their accomplishments and this recognition!</p>

<p>Of particular note, three of the honorees have spoken in CERIAS seminars and events:</p>
<ul>
<li><a href="https://www.cerias.purdue.edu/news_and_events/events/security_seminar/details/index/28260-GR57o4OPunKv-2250-OUD5e1l3ylS49ltX" title="Matt Bishop">Matt Bishop</a> was named to the ISSA Hall of Fame</li>
<li><a href="https://www.cerias.purdue.edu/news_and_events/events/security_seminar/details/index/7fs2lnel6emk295dsf7qug9tk7" title="Caroline Wong ">Caroline Wong </a>was given the ISSA President&#8217;s Award for Public Service </li>
<li><a href="https://www.cerias.purdue.edu/site/news_and_events/events/symposium/2007/bios.php" title="Dale Meyerrose">Dale Meyerrose</a> was named to the ISSA Hall of Fame</li>
</ul>

<p>We also note the<a href="https://issaef.org" title=" ISSA Education Foundation"> ISSA Education Foundation</a>, which supports scholarships for students in the field.  Two of those scholarships are in memory of individuals who were long-time friends of CERIAS, <a href="https://www.cerias.purdue.edu/site/blog/post/time_passes_and_we_lose_friends/" title="Howard Schmidt ">Howard Schmidt </a>and <a href="https://www.cerias.purdue.edu/site/blog/post/gene_schultz_r._i._p/" title="Gene Schultz">Gene Schultz</a>.  The <a href="https://www.cerias.purdue.edu/site/blog/post/get_some_cerias_and_spaf_swag/" title="recent give-away ">recent give-away </a>of Spaf's coffee mugs raised over $1000 for those scholarships.  We encourage others to consider contributing to the foundation to support worthy students.  Also, the ISSAEF is an Amazon Smile participant, so that is a painless way for you to make ongoing donations (see the <a href="https://issaef.org" title="ISSAEF page ">ISSAEF page </a>for a link).</p>

		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2022-08-09T19:58:30+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>Get some CERIAS and Spaf Swag!</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/get_some_cerias_and_spaf_swag</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/get_some_cerias_and_spaf_swag#When:05:52:00Z</guid>
      <description><![CDATA[
	<hr>
<h2 style="color:red;">
    [This opportunity is now closed.  You can still donate to the listed charities, though!]
</h2>
<hr>
<p>
    Want to get some authentic CERIAS and Spaf swag?  Read on!
</p>
<p>
    CERIAS offices <a href="https://www.cerias.purdue.edu/site/blog/post/cerias_is_on_the_move/">are moving</a> in a matter of weeks.  We don't want to have to box up everything, especially items we aren't likely to use any time soon (if ever) at the new location. Plus, some of these things are items we've heard people might like to have for themselves.
</p>
<p>
    So.... We're going to give some of it away!
</p>
<p>
    What's the catch?  Well, we want to encourage people to do something good for others.  And, as an institute (CERIAS) at a university (<a href="https://purdue.edu">Purdue</a>) and a life-long educator (Spaf), we thought that helping deserving students get cybersecurity education would be the way to do that.
</p>
<div style="width:50%; float:left;">
    <h2>
        Qualifying
    </h2>
    <p>
        To get some of the swag, as listed below, you need to make a donation to one of these charitable scholarships no later than <em>August 5th</em>, and provide proof of the donation and amount.  We'll then package up your gifts and send them (we'll cover shipping inside the United States; if you are outside the U.S. we'll need to negotiate the shipping and any customs).
    </p>
    <p>
        What charities?  Only some of the best for cybersecurity students, and all established in memory of some pioneers in the field:
    </p>
    <div style="padding-left: 12pt;">
        <dl>
            <dt>
                Rebecca Gurley Bace Scholarship ACSA/SWSIS
            </dt>
            <dd>
                You may donate by sending a check to: <br>
                Applied Computer Security Associates, Inc.<br>
                c/o David Balenson<br>
                P.O. Box 1607<br>
                Olney, MD 20830-1607<br>
                <br>
            </dd>
            <dt>
                Philippe Courtot/Gene Schultz/Howard Schmidt/Shon Harris Scholarships
            </dt>
            <dd>
                These are all administered by the ISSA Educational Foundation.  <br>You can donate online or by check; instructions <a href="https://issaef.org/scholarships/donate/">are posted here</a>.
            </dd>
        </dl>
    </div>
    <p>
        We'll note here that these are also worthwhile for regular donations.  As non-profits, there may be tax advantages to your donations.  And be sure to check if your employer has a matching donation program!
    </p>
    <h2>
        Swag
    </h2>
    <p>
         We have established the donation.  What's the swag? While supplies last:
    </p>
    <ul>
        <li>From about 1995-2015, Spaf would collect coffee mugs from places he was invited to speak.  This includes mugs from Facebook and Google to the NRO and NSA.  The collection includes some from locations outside the U.S.A. as well.  Currently, there are over 80 of these in the collection <b>plus</b> about 20 CERIAS coffee mugs, including some of the rare 10th anniversary mugs (from 2008).</li>
        <li>CERIAS branded items that we obtained to give as speaker gifts. We have only a few of each item left, including luggage tags, T-shirts, portfolios, umbrellas, jackets, and some electronic doo-dads.</li>
        <li>CERIAS/Spaf challenge coins!</li>
        <li>Some first-printing, <em>never opened</em>, copies of <span style="font-variant: small-caps;"><a href="https://www.amazon.com/dp/0596000456/ref=cm_sw_em_r_mt_dp_M3N52861E9CDHQB10H34">Web Security, Privacy and Commerce, 2nd Edition</a></span>.   If you get a copy, Spaf will autograph it for you!</li>
    </ul>
</div>
<div style="float:right; width: 50%;">
    <img src="/site/images/uploads/IMG_3019_thumb.jpg" style="border: 0;" alt="image" width="250" height="187">
    <img src="/site/images/uploads/IMG_3018_thumb.jpg" style="border: 0;" alt="image" width="250" height="187">
    <img src="/site/images/uploads/IMG_3017_thumb.jpg" style="border: 0;" alt="image" width="250" height="187">
    <img src="/site/images/uploads/IMG_0661_thumb.jpeg" style="border: 0;" alt="image" width="200" height="266">
    <img src="/site/images/uploads/IMG_0660_thumb.jpeg" style="border: 0;" alt="image" width="200" height="266">
    <img src="/site/images/uploads/51a4Obha4QL._SX379_BO1,204,203,200___thumb.jpg" style="border: 0;" alt="image" width="200" height="261">
</div>
<p>
    <br clear="all">
</p>
<h2>
    How to Get Some
</h2>
<p>
    First, make a qualifying donation to one of the charities.  Send proof of the donation, your address, and your shirt/hoodie/jacket size to: &lt;<a href="mailto:spaf@cerias.purdue.edu">spaf@cerias.purdue.edu</a>&gt;.  You'll get the listed items while supplies last.  If we run out of an item we will substitute an item of equal or better value.
</p>
<table style="caption-side:bottom;">
    <tbody>
        <tr>
            <th>
                Minimum donation
            </th>
            <th>
                Items shipped
            </th>
        </tr>
        <tr>
            <td>
                $150
            </td>
            <td>
                2 of Spaf's coffee mugs plus a CERIAS challenge coin
            </td>
        </tr>
        <tr>
            <td>
                $200
            </td>
            <td>
                An additional item of CERIAS-branded merchandise plus 1 CERIAS mug
            </td>
        </tr>
        <tr>
            <td>
                $300
            </td>
            <td>
                A copy of the book in addition to the above, plus an additional CERIAS item.
            </td>
        </tr>
        <tr>
            <td>
                $500
            </td>
            <td>
                All of the above, plus 2 additional coffee mugs, plus a CERIAS logo fabric briefcase or portfolio.
            </td>
        </tr>
    </tbody>
   
    <caption style="margin:12pt 6pt 6pt 6pt;">
    In the above, items in each line include <em>all</em> the items in the previous rows. So, If you make a donation of $300 you will also get the items listed for $150 and $200.
    </caption>
</table>
<p>
    Remember, these are really all extra gifts. The real value is you making a donation to a worthwhile charity to help some deserving people study cybersecurity!
</p>
<hr break="all">
<h1>
    Surprise Bonus!
</h1>
<figure>
    While cleaning out the storage closet we found a dozen remaining Spaf bobbleheads.  This is the last of this collector's item! <span style="float:left; padding:4;" data-rx-style-cache="float:left; padding:4;"><img src="/site/images/uploads/IMG_0112_thumb.jpeg" style="border: 0;" alt="image" width="200" height="266" data-rx-style-cache="border: 0;"></span>
    To get one, send us a check for a minimum of $100 made out to "Purdue University" with "Donation to CERIAS" on the memo line. (And, to be clear, Purdue University is also a non-profit entity.) Send the check with your return address to:
</figure>
<blockquote>
Bobblehead c/o Shawn Huddy<br>
    CERIAS -- Purdue University<br>
    656 Oval Drive<br>
    West Lafayette, IN 47907-2086
    <blockquote>
        <p></p>
    </blockquote>
</blockquote>
		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2022-06-20T05:52:00+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>CERIAS is on the move!</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/cerias_is_on_the_move</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/cerias_is_on_the_move#When:01:28:32Z</guid>
      <description><![CDATA[
	<p>
In May of 1998, Purdue chartered <a href="https://ceri.as">CERIAS</a> -- the Center of Education and Research In Information Assurance and Security -- as a campus-wide, multidisciplinary center for the new (at the time) field of cybersecurity.  CERIAS grew  out of the COAST Laboratory in the CS department.  Our original core of a half-dozen faculty spanned several of the departments and colleges at Purdue and thus warranted a university-level institute.
</p>
<figure style="float:left; padding:8pt;">
<img src="https://earchives.lib.purdue.edu/digital/api/singleitem/image/pbuildings/1185/default.jpg" width=400 height=212 alt="The Recitation Building"  class="img-fluid"/>
<figcaption>The Recitation Building</figcaption>
</figure>
<p>
As part of its commitment to the new center, Purdue University renovated most of the 2nd floor  of the Recitation Building on the central campus for CERIAS. The 2nd floor was originally classrooms.  We moved into the redone space in early 1999.  The space involved a conference room, a small library, a small kitchen and lounge, offices for 10 faculty and staff, and a half-dozen shared offices for grad students.  We also had two dedicated rooms on the 4th floor -- one as a protected machine room, and one as a lab.
</p><p>
The space in REC has served us well since then.  We were located near the CS, ECE, and CNIT departments, in a building with great character, including flooring made from birds-eye maple planks.  We also had to cope with some of the idiosyncrasies of an older building, including cranky HVAC and leaky pipes. (Recitation was originally completed   in 1923.) CERIAS grew into a world-renowned entity with over 150 associated faculty across campus and many hundreds of their students.
</p>
<figure style="float:right; padding:8pt;">
<img src="https://discoveryparkdistrict.com/wp-content/uploads/2020/08/2020.5-Convergence-8.jpg" width=400 height=267  alt="The Convergence Building" class="img-fluid"/>
<figcaption>The Convergence Center</figcaption>
</figure>
<p>
Over the last few years in particular, Purdue overall has prospered, with increasing prestige and growing enrollment.  Last year, Purdue had over 50,000 students enrolled at the main campus!  Having frozen tuition for a decade has undoubtedly helped to make a Purdue education even more attractive, despite the increasingly-rigorous admission standards.  There has been an associated boom in new buildings -- with over two dozen new dormitories, laboratories, and co-working space for collaborations with companies and national labs.  This has included construction of the <a href="https://discoveryparkdistrict.com">Discovery Park District</a>.
</p><p>
Last year, as part of a master planning process, university administration decreed some reorganization.  Many administrative and academic programs are moving to accomodate growth, move related groups near each other, and make better use of space.  That includes CERIAS!
</p><p>
As of August 15, we are bidding adieu to Recitation. For the following 4 months we will be virtual as our new "galactic headquarters" is being finished.  Meanwhile, our space in Recitation will be renovated info offices and meeting space for the Dean of Students</p>
<p>
In January, we will be moving into our new offices and lab space on the 3rd floor of the <a href="https://carrworkplaces.com/locations/purdue_university/convergence/">Convergence Center</a> on campus.  Convergence is part of the public-private partnerships idea that Purdue has been promoting over the last few years.  It is a building owned and operated by a private company, located on the university and housing several campus departments as well as industry offices.  It was completed in 2020 and presents exciting new possibilities for our next 25 years.
</p>

<p>
Our new space will be bright and airy, with lots of windows.  We'll have more offices, lots of work spaces for students, several labs, and multiple meeting rooms.  We'll also have dedicated space for co-location of researchers of some CERIAS partners (with Sandia National Labs the first such partner).
</p><p>
If you want to visit us between August 15 and January 15, let us know and we'll find a room on campus to meet with you.  After the 15th, come visit us at our new offices!
</p><br clear=all /><p>
Our new address will be:<div style="padding: 0 0 0 24pt;">
101 Foundry Dr STE 3000<br>
West Lafayette IN 47906-3446<br></div>
</p>
<p>
During and after the transition we expect our phone numbers and email addresses to be unchanged.  Our web pages will continue to be active.  Our phones will forward to wherever we are during the build-out phase, so you will be able to reach us as always.</p>
<p>
While we're at it, mark your calendars for March 28 &amp; 29 --- the <a href="https://cerias.purdue.edu/symposium">annual CERIAS Symposium</a>.  We're celebrating our 25th anniversary and you are all invited!</p>

		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2022-06-14T01:28:32+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>Near the Root of Cybersecurity Dysfunction</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/near_the_root_of_cybersecurity_dysfunction</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/near_the_root_of_cybersecurity_dysfunction#When:23:53:18Z</guid>
      <description><![CDATA[
	<p>I&#8217;ve  been missing from the CERIAS blog for much of the last year+ as I enjoyed a long-overdue sabbatical.</p>

<p>While I was away, I was going through some materials in my account and found slides from a talk I was giving many years ago. I referenced those in a post back in February, entitled <a href="https://www.cerias.purdue.edu/site/blog/post/a_common_theme_/"><em>A Common Theme</em></a>. I polished that up a little, gave it a few times, and then presented it in the <a href="https://ceri.as/secsem/">CERIAS Security Seminar</a> when I returned to campus this fall.</p>

<p>Basically, I attribute a large portion of why we continue to have problems in what we call &#8220;cybersecurity&#8221; is that we don&#8217;t have a precise -- and agreed-upon -- definition of &#8220;security.&#8221; Coupled with that, we don&#8217;t have agreed-upon characteristics, nor do we have well-defined metrics. The result is that we can&#8217;t tell if something addresses needs, we have no idea if the money we spent has made a difference that corresponds to the outlay, and we can&#8217;t compare different approaches. That is simply the start!</p>

<p>If you want to watch the presentation then visit <a href="https://www.cerias.purdue.edu/news_and_events/events/security_seminar/details/index/67ct64b544e02t412u8mivto5r">this link</a>. (Note that we have videos of presentations going back 15 years -- over 400 videos -- all available at no charge!)</p>

		]]></description>
      <dc:subject>General,</dc:subject>
      <dc:date>2019-10-10T23:53:18+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>Challenging Conventional Wisdom</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/challenging_conventional_wisdom</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/challenging_conventional_wisdom#When:17:28:42Z</guid>
      <description><![CDATA[
	<p>In IT security ("cybersecurity") today, there is a powerful herd mentality. In part, this is because it is driven by an interest in shiny new things. We see this with the massive pile-on to new technologies when they gain buzzword status: e.g., threat intelligence, big data, blockchain/bitcoin, AI, zero trust. The more they are talked about, the more others think they need to be adopted, or at least considered. Startups and some vendors add to the momentum with heavy marketing of their products in that space. Vendor conferences such as the yearly <a href="https://www.cerias.purdue.edu/site/blog/post/the_rsa_2019_conference/">RSA conference</a> are often built around the latest buzzwords. And sadly, too few people with in-depth knowledge of computing and real security are listened to about the associated potential drawbacks. The result is usually additional complexity in the enterprise without significant new benefits &#8212; and often with other vulnerabilities, plus expenses to maintain them.</p>
<p>Managers are often particularly victimized by these fads as a result of long-standing deficiencies in the security space: we have no sound definition of security that encompasses desired security properties, and we, therefore, have no metrics to measure them. If a manager cannot get some numeric value or comparison of how new technology may make things better vs. its cost, the decision is often made on "best practice." Unfortunately, "best practice" is also challenging to define, especially when there is a lot of talk and excitement by people about vending the next new shiny thing. Additionally, enterprise needs are seldom identical, so &#8220;best&#8221; may not be uniform. If the additional siren call is heard about "See how it will save you money!" then it is nearly impossible to resist, even if the "savings" are only near-term or downright illusory.</p>
<p>This situation is complicated because so much of what we use is defective, broken, or based on improperly-understood principles. Thus, to attempt to secure it (really, to gain greater confidence in it) solutions that sprinkle magic pixie dust on top are preferred because they don't mean sacrificing the sunk cost inherent in all the machines and software already in use. Magic fairy dust is shiny, too, and usually available at a lower (initial) cost than actually fixing the underlying problems. So that is why we have containers on VMs on systems with multiple levels of hypervisor behind firewalls and IPS --and turtles all the way down &#8212; while the sunk costs keep getting larger. This is also why patching and pen testing are seen as central security practices&#8212; they are the flying buttresses of security architecture these days.</p>
<p>The lack of a proper definition and metrics has been known for a while. In part, the old <a href="https://en.wikipedia.org/wiki/Rainbow_Series">Rainbow series</a> from the NCSC (NSA) was about this. The authors realized the difficulty of defining "secure" and instead spoke of "trusted." The series established a set of features and levels of trust assurance in products to meet DOD needs. However, that was with a DOD notion of security at the time, so issues of resilience and availability (among others) weren't really addressed. That is one reason why the Rainbow Series was eventually deprecated: the commercial marketplace found it didn't apply to their needs.<br /></p>
<p>Defining security principles is a hard problem, and is really in the grand challenge space for security research. It was actually stated as such 16 years ago in the CRA security <a href="http://archive.cra.org/Activities/grand.challenges/security/home.html">Grand Challenges report</a> (see #3). Defining accompanying metrics is not likely to be simple either, but we really need to do it or continue to come up against problems. If the only qualities we can reliably measure for systems are speed and cost, the decisions are going to be heavily weighted towards solutions that provide those at the expense of maintainability, security, reliability, and even correctness. Corporations and governments are heavily biased towards solutions that promise financial results in the next year (or next quarter) simply because that is easily measured and understood.</p>
<p>I've written and spoken about this topic before (see <a href="https://www.cerias.purdue.edu/site/blog/post/things_are_not_getting_better/">here</a> and <a href="https://www.cerias.purdue.edu/site/blog/post/spaf_videos_blasts_from_the_past_future_thoughts/">here</a> for instance). But it has come to the forefront of my thinking over the last year, as I have been on sabbatical. Two recent issues have reinforced that:</p>
<ul>
  <li>I was cleaning up my computer storage and came across some old presentations from 10-20 years ago. With minor updating, they could be given today. Actually, I have been giving a slightly updated version of <a href="https://www.cerias.purdue.edu/site/blog/post/a_common_theme_/">one from 11 years ago</a>, and the audiences view it as "fresh." The theme? How we don't define or value security appropriately. (Let me know if you&#8217;d like me to present it to your group; you can also view <a href="https://digitalops.sandia.gov/Mediasite/Play/da8a68140f2941349804d4396cdf6e2a1d">a video</a> of the talk given at Sandia National Laboratories,)</li>
</ul>
<ul>
  <li>I was asked by people associated with a large entity with significant computing presence to provide some advice on cloud computing. They have been getting a strong push from management to move everything to the cloud, which they know to be a mistake, but their management is countering&nbsp;&nbsp;their concerns about security with "it will cost less." I have heard this before from other places and given informal feedback to the parties involved. This time, I provided more organized feedback, now also available as a CERIAS tech report (<a href="https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2019-3.pdf">here</a>). In summary, moving to the cloud is not always the best idea, nor is it necessarily going to save money in the long term.</li>
</ul>
<p>I hope to write some more on the issues around defining security and bucking the "conventional wisdom" once I am fully recovered from my sabbatical. There should be no shortage of material. In the meantime, I invite you to look at the cloud paper cited above and provide your comments below.<br /></p>
<p><br /></p>

		]]></description>
      <dc:subject>General, Kudos, Opinions and Rants, Secure IT Practices,</dc:subject>
      <dc:date>2019-07-08T17:28:42+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

	
    <item>
      <title>An Anniversary of Continuing Excellence</title>
      <link>https://www.cerias.purdue.edu/site/blog/post/an_anniversary_of_continuing_excellence</link>
      <guid>https://www.cerias.purdue.edu/site/blog/post/an_anniversary_of_continuing_excellence#When:21:47:00Z</guid>
      <description><![CDATA[
	<p>In February of 1997, I provided <a href="https://spaf.cerias.purdue.edu/usgov/index.html#H1997">testimony</a> to a Congressional committee about the state of cyber security education. I noted that there were only four major academic programs, with limited resources, in information security at that time. I outlined some steps that could be taken to improve our national posture in the field. Subsequently, I was involved in discussions with staffers of some Congressional committees, with staff at NSF, with National Security Council staff (notably, <a href="https://en.wikipedia.org/wiki/Richard_A._Clarke">Richard Clarke</a>), and people at the Department of Defense. These discussions eventually helped produce<sup><span style="font-size:x-small">1</span></sup> the <a href="https://www.sfs.opm.gov">Scholarship for Service</a> program at NSF, the <a href="https://www.nsf.gov/pubs/2007/nsf07500/nsf07500.htm">NSF CyberTrust</a> program (now known as Secure and Trustworthy Cyberspace, <a href="https://www.nsf.gov/funding/pgm_summ.jsp?pims_id=504709">SaTC</a>), and the <b>Centers of Academic Excellence</b> program.</p>
<p>On 11 May 1999, 20 years ago, <a href="http://www.purue.edu">Purdue University</a> <sup><span style="font-size:x-small">2</span></sup> was <a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/1636090/nsa-designates-first-centers-of-academic-excellence-in-information-assurance-ed/">recognized by the NSA</a> as one of the initial Centers of Academic Excellence (CAE).<sup><span style="font-size:x-small">3</span></sup> There were some notable advocates of enhanced cyber security at each institution, and they had taken steps to institute courses and research to improve the field—notably including Corey Schou (recently inducted into the <a href="https://www.cerias.purdue.edu/site/blog/post/cyber_security_hall_of_fame_2019_inductees/">Cybersecurity Hall of Fame</a>), Matt Bishop, Deborah Frincke, and Doug Jacobson, to name a few.<sup><span style="font-size:x-small">4</span></sup> As I recall, Dick Clarke was one of the prime movers to get the CAE program established under PDD-63; Dr, Vic Maconachy (then) at NSA became the director of the CAE program.</p>
<p>Over the years, the <a href="https://www.nsa.gov/resources/students-educators/centers-academic-excellence/">CAE program</a> has continued to expand, to now encompass several hundred institutions around the US. DHS has become involved as a co-sponsor with the NSA. The main certification has bifurcated into a designation for cyber defense research (CAE-R) and a designation for cyber defense education (CAE-CDE). There ia also a designation for Centers of Academic Excellence in Cyber Operations. The NSA, as a member of the US intelligence community (IC) also helps support a program for IC Centers of Academic Excellence. In addition to the formal external evaluation process to be designated as a CAE, the program has resulted in creation of curricular guidelines and recommended best practices for educational programs. A number of leaders in education in the field have also grown out of this process, creating various resources for the community (some of which are hosted at the <a href="https://clark.center/home">CLARK website</a> for public use).</p>
<p>I have been critical of the overall CAE program in the past (cf. <a href="http://www.cerias.purdue.edu/site/blog/post/centers_of_academic_adequacy/">here</a> and <a href="https://www.cerias.purdue.edu/site/blog/post/centers_of_..._adequacy_revisited/">here</a>). I believe most of the criticisms I made are still valid, particularly the ones concerning the designation of "excellence" and the burden of the application process. Nonetheless, there is no denying that the listed insitutitions have made strides to improve and standardize their programs towards much-needed common goals. There is also continuing (and growing) synergy with efforts such as the NIST <a href="https://www.nist.gov/itl/applied-cybersecurity/nice">National Initiative for Cybersecurity Education</a> (NICE) program and the <a href="https://cisse.info">National Colloquium on Information Systems Security Education</a> (NISSE). Additionally, there has been real progress towards establishing <a href="https://www.acm.org/binaries/content/assets/education/curricula-recommendations/csec2017.pdf">standardized undergraduate curricula</a> in the field, which now includes the potential for <a href="https://www.abet.org/abet-approves-accreditation-criteria-for-undergraduate-cybersecurity-programs/">ABET accreditation</a>.</p>
<p>Those of us at Purdue recently received notice that Purdue has been recertified as a CAE-R through 2024. This is a result—in large part—of efforts by Dr. <a href="https://www.purdue.edu/gradschool/oigp/programs/information-security.php">James Lerums</a> , one of our recent Ph.D. grads. He volunteered his time to sift through all the documentsation, gathered the necessary information, and completed the application process. It was a significant effort and kudos to Jim for taking it on soon after completing a Ph.D. dissertation!</p>
<p>Despite some of my "grumpy old dude" criticisms, I am glad to see Purdue continue to be recognized for the continued excellence of its programs. CERIAS continues to be a focal point for the "R" aspect of the CAE-R as Purdue's designated research institute in the field: that's the "R" in CERIAS. However, it has also been Purdue's center for education for most of its existence: the "E" in CERIAS is for Education. That history includes the establishment of the first designated degree in information security in 2000, still offered as an <a href="https://www.purdue.edu/gradschool/prospective/gradrequirements/westlafayette/insc.html">interdisciplinary MS and PhD</a> (which is the program Jim Lerums completed, btw).</p>
<p>As for the CAE program itself, and for the 5 (out of 6) other programs receiving that initial CAE designation that are still listed as CAEs, congratulations: we've come a long way, but there is still a long way to go!</p>
<p></p>
<hr>
<p><b>Footnotes</b></p>
<ol>
  <li>I always note that I cannot claim sole or primary credit for these initiatives; nonetheless, I was the first to publicly advocate for programs such as these, and was involved in the many of the discussions. Dick Clarke deserves a good deal of credit for his active advocacy for the area at the time, as does Lt. General (ret.) <a href="https://en.wikipedia.org/wiki/Kenneth_Minihan">Ken Minihan</a> (also a recent <a href="https://www.cerias.purdue.edu/site/blog/post/cyber_security_hall_of_fame_2019_inductees/">CSHOF inductee</a>) for his support.</li>

  <li>Via <a href="http://ceri.as/">CERIAS</a>, one year old at the time.</li>

  <li>Also in that group were James Madison University, George Mason University, Idaho State University, Iowa State University, the University of California at Davis, and the University of Idaho.</li>

  <li>My apologies to others whose names I omitted.</li>
</ol>
		]]></description>
      <dc:subject>Infosec Education, Kudos, Opinions and Rants,</dc:subject>
      <dc:date>2019-05-16T21:47:00+00:00</dc:date>
      <dc:author>spaf</dc:author>
    </item>

    
    </channel>
</rss>