{"131791":{"#nid":"131791","#data":{"type":"event","title":"Ph.D. Defense of Dissertation:  Italo Dacosta","body":[{"value":"\u003Cp\u003EPh.D. Defense of Dissertation Announcement\u003Cbr \/\u003E\u003Cbr \/\u003ETitle: \u003Cstrong\u003EPractical Authentication in Large-Scale Internet Applications\u003C\/strong\u003E \u003Cbr \/\u003E\u003Cbr \/\u003EItalo Dacosta\u003Cbr \/\u003ESchool of Computer Science\u003Cbr \/\u003ECollege of Computing\u003Cbr \/\u003EGeorgia Institute of Technology\u003Cbr \/\u003E\u003Cbr \/\u003EDate: Friday, June 1st, 2012\u003Cbr \/\u003ETime: 9:00 AM - 11:00 AM\u003Cbr \/\u003ELocation: Klaus 3126 (GTISC War Room)\u003Cbr \/\u003E\u003Cbr \/\u003E\u003Cstrong\u003ECommittee:\u003C\/strong\u003E\u003C\/p\u003E\u003Cul\u003E\u003Cli\u003EProf. Mustaque Ahamad, School of Computer Science (Advisor)\u003C\/li\u003E\u003Cli\u003EProf. Patrick Traynor,\u0026nbsp; School of Computer Science (Advisor)\u003C\/li\u003E\u003Cli\u003EProf. Jonathon Giffin, School of Computer Science\u003C\/li\u003E\u003Cli\u003EProf. Alexandra Boldyreva, School of Computer Science\u003C\/li\u003E\u003Cli\u003EProf. Raheem A. Beyah, School of Electrical \u0026amp; Computer Engineering\u003C\/li\u003E\u003C\/ul\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003Cstrong\u003EAbstract:\u003C\/strong\u003E\u003Cbr \/\u003EThe rapid adoption of Internet applications such as VoIP and Web applications has resulted in systems with high performance and scalability requirements.\u0026nbsp; Such systems typically need to support millions of users located in different geographical areas -- a scenario no other system has faced before. Due to these requirements, application architects and developers have made performance and scalability their primary goals while giving less importance to security. As a result, many large-scale Internet applications rely on weak-but-efficient security mechanisms, particularly authentication protocols. However, the increasing popularity and importance of Internet applications have also raised their risk to attacks. For example, weaknesses on authentication protocols have being actively exploited by a variety of adversaries, including criminal organizations and governments. While more robust authentication protocols have been proposed, most of them fail to address the unique requirements of large-scale Internet applications and, therefore, such protocols have not been widely deployed.\u003Cbr \/\u003E\u003Cbr \/\u003ETherefore, the unprecedented performance and scalability requirements of large-scale Internet applications have hindered the use of more robust authentication mechanisms. We can build efficient and scalable authentication mechanisms with stronger integrity guarantees and resistance to active attacks by better understanding the specific requirements of such class of applications.\u003Cbr \/\u003E\u003Cbr \/\u003EThis dissertation presents the following contributions. First, we show how even a simple authentication mechanism such as SIP Digest authentication can significantly impact the performance and scalability of a highly distributed VoIP infrastructure. Hence, we propose Proxychain, a SIP authentication protocol that not only provides better security guarantees than Digest authentication but also improved performance and scalability. Second, we propose One-Time Cookies (OTC), an alternative to the use of HTTP cookies as session authentication tokens. OTC is inherently robust against active attacks such as session hijacking while preserving the efficiency of cookies. Third, we develop Direct Validation of SSL\/TLS Certificates (DVCert), a practical mechanism that offers more robust validation of SSL\/TLS server certificates to prevent MITM attacks without requiring external third-parties or additional infrastructure.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Practical Authentication in Large-Scale Internet Applications"}],"uid":"1","created_gmt":"2012-05-21 15:39:36","changed_gmt":"2016-10-08 01:58:57","author":"Jupiter","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2012-06-01T10:00:00-04:00","event_time_end":"2012-06-01T12:00:00-04:00","event_time_end_last":"2012-06-01T12:00:00-04:00","gmt_time_start":"2012-06-01 14:00:00","gmt_time_end":"2012-06-01 16:00:00","gmt_time_end_last":"2012-06-01 16:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:idacosta@gatech.edu\u0022\u003EItalo Dacosta\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}