Skip to content

Commit 2e20076

Browse files
committed
Merge branch 'master' of github.com:secure-systems-lab/ssl-site
2 parents bc1e768 + d153747 commit 2e20076

File tree

3 files changed

+62
-6
lines changed

3 files changed

+62
-6
lines changed

_data/data.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ people:
107107
name: "Sebastien Awwad"
108108
anchor: sebastien_awwad
109109
internal: true
110-
role: "Developer"
110+
role: "Developer, now Security Engineer at Anaconda"
111111
since: "2015"
112112
photo: "img/people/sebastien_awwad.jpg"
113113
interests: "Incentivizing secure code, secure frameworks, computational neuroscience"
@@ -142,7 +142,7 @@ people:
142142
name: "Trishank Kuppusamy"
143143
anchor: trishank_kuppusamy
144144
internal: true
145-
role: "Ph.D. 2017, now Staff Security Engineer at DataDog"
145+
role: "Ph.D. 2017, now Engineering Manager at DataDog"
146146
since: "2011"
147147
photo: "img/people/trishank_kuppusamy.jpg"
148148
site: "https://github.com/trishankkarthik"
@@ -203,7 +203,7 @@ people:
203203
name: "Yiwen Li"
204204
anchor: yiwen_li
205205
internal: true
206-
role: "Ph.D. 2021 (co-advised by Brendan Dolan-Gavitt), now a Cloud Networking Solution Engineer at Intel"
206+
role: "Ph.D. 2021 (co-advised by Brendan Dolan-Gavitt), now a Software Platform Architect at Intel"
207207
since: "2013"
208208
photo: "img/people/yiwen_li.jpg"
209209
interests: "Operating system security, virtualization, network security"
@@ -271,7 +271,7 @@ people:
271271
role: "Research Associate/Technical Writer"
272272
since: "2015"
273273
photo: "img/people/lois_delong.jpg"
274-
interests: "Experimental design involving human subjects; links between natural languages and programming languages"
274+
interests: "Experimental design involving human subjects; links between natural and programming languages; preparation and dissemination of technical standards"
275275
publications:
276276
- name: "Behaviour and Information Security"
277277
link: "/papers/yeh_atoms_eeg_b_it_2021.pdf"
@@ -782,7 +782,7 @@ projects:
782782
program, in which Uptane is a key component of the security package.
783783
<a href=\"https://uptane.github.io/\">Our website</a> contains high level
784784
information about the project, including the
785-
<a href=\"https://uptane.github.io/papers/uptane-standard.1.2.0.html\">Uptane Standard for Design and Implementation v.1.1.0</a>
785+
<a href=\"https://uptane.github.io/papers/uptane-standard.2.0.0.html\">Uptane Standard for Design and Implementation v.2.0.0</a>
786786
and
787787
<a href=\"https://uptane.github.io/papers/uptane-deployment-best-practices-1.1.0.html\">Uptane Deployment Best Practices</a>.
788788
We invite all
@@ -817,7 +817,7 @@ projects:
817817
site: "https://in-toto.io"
818818
description: "Do you know who has handled your software prior to its installation on your machine? Even if developers are careful to secure each step in their products' supply chain, there is little assurance about what happens in-between these steps. The in-toto system holistically enforces the integrity of a software supply chain by gathering and signing information about each step in the process. As such, in-toto provides accountability about how software is written, packaged and distributed...and by who."
819819
products: "The in-toto software has already been integrated into several open
820-
source projects. In 2019, Datadog announced the use of <a href=\"https://www.datadoghq.com/blog/engineering/secure-publication-of-datadog-agent-integrations-with-tuf-and-in-toto/\">TUF and in-toto</a> on their agents integration downloader. In November 23 of 2020, the framework released<a href=\"https://techxplore.com/news/2020-12-free-tool-layer-software-chain.html/\">Version 1.0.0</a>. Also, a <a href=\"https://salsa.debian.org/reproducible-builds/debian-rebuilder-setup\">constellation of rebuilders</a> are generating in-toto metadata so you can check your Debian packages were built reproducibly when using <a href=\"https://github.com/in-toto/apt-transport-in-toto\">apt</a>. We welcome you to download the in-toto instructions, which includes a <a href=\"https://github.com/in-toto/demo/\">demo version</a> of our software, or to clone our <a href=\"https://github.com/in-toto/in-toto/\">repository</a> and follow the directions to integrate in-toto into your software project!"
820+
source projects. In 2019, Datadog announced the use of <a href=\"https://www.datadoghq.com/blog/engineering/secure-publication-of-datadog-agent-integrations-with-tuf-and-in-toto/\">TUF and in-toto</a> on their agents integration downloader. In November 23 of 2020, the framework released <a href=\"https://techxplore.com/news/2020-12-free-tool-layer-software-chain.html/\">Version 1.0.0</a>, and on March 10, CNCF <a href=\"https://www.cncf.io/blog/2022/03/10/supply-chain-security-project-in-toto-moves-to-the-cncf-incubator/\">announced</a> the project had graduated to the incubator. Also, a <a href=\"https://salsa.debian.org/reproducible-builds/debian-rebuilder-setup\">constellation</a> <a href=\"https://r-b.engineering.nyu.edu/\">of</a> <a href=\"https://reproducible.seal.purdue.wtf/\">rebuilders</a> are generating in-toto metadata so you can check your Debian packages were built reproducibly when using <a href=\"https://github.com/in-toto/apt-transport-in-toto\">apt</a>. We welcome you to download the in-toto instructions, which includes a <a href=\"https://github.com/in-toto/demo/\">demo version</a> of our software, or to clone our <a href=\"https://github.com/in-toto/in-toto/\">repository</a> and follow the directions to integrate in-toto into your software project!"
821821
people:
822822
- *santiago_torres
823823
- *lukas_puhringer

_posts/2022-03-28-intoto-incubator.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
layout: article
3+
title: in-toto moves to the CNCF Incubator
4+
subnav: blog
5+
comments: true
6+
tagline: "The in-toto project, a supply chain security solution which provides protection by collecting and verifying relevant data at each step of a software product’s lifecycle, was recently promoted to the incubator of the Cloud Native Computing Foundation."
7+
author: 'Lois Anne DeLong'
8+
categories:
9+
- '<a href="/projects#in-toto">in-toto</a>'
10+
11+
---
12+
13+
The in-toto project, a supply chain security solution which provides protection by collecting and verifying relevant data at each step of a software product’s lifecycle, was recently promoted to the incubator of the [Cloud Native Computing Foundation](https://www.cncf.io/). CNCF, a [Linux Foundation](https://www.linuxfoundation.org/ )-supported program designed to “assist the growth and development of promising new open source technologies applicable to cloud applications,” announced the promotion in a [press release](https://www.cncf.io/blog/2022/03/10/supply-chain-security-project-in-toto-moves-to-the-cncf-incubator/) issued March 10, 2022.
14+
15+
“Born” in the [Secure Systems Laboratory](https://ssl.engineering.nyu.edu/) at NYU’s Tandon School of Engineering in 2015, under the guidance of lab director Dr. Justin Cappos, the move to the CNCF “incubator” is an indication of in-toto’s growing maturity. It marks fulfillment of a number of criteria, including adoption by other projects and active participation from multiple organizations. Incubating projects must also adopt the [CNCF Code of Conduct](https://github.com/cncf/foundation/blob/main/code-of-conduct.md) and achieve and maintain the [Core Infrastructure Initiative Best Practices Badge](https://bestpractices.coreinfrastructure.org/en).
16+
17+
"I am very excited to see in-toto grow into CNCF incubation. Not only because of what it means for the project, but for all the doors that it opens for new contributors, synergies with other CNCF projects and the ability to tackle new and open questions with regards to supply chain security, in the cloud or otherwise,” states [Dr. Santiago Torres Arias](https://www.cerias.purdue.edu/site/people/faculty/view/3153), an assistant professor at Purdue University and a lead developer on in-toto while completing his doctorate at New York University. “On a personal level, I can't overstate the uniqueness of in-toto's case, for it is not only an open source project, but one of the few that come from the academic world into the broader public with fresh ideas and a bold proposition to solve the problem at an ecosystem level. I can't wait to see what's to come for in-toto in the coming years."
18+
19+
The CNCF promotion, and the increased visibility in the open source world that comes with it, arrives at a time when the need for reliable software supply chain security has never been greater. Chris Aniszczyk, CNCF chief technical officer, is quoted in a press release from the Foundation acknowledging this point. “We’re excited to have a project offering innovation in the supply chain security space,” he says, adding, “We look forward to seeing collaboration among the community to continue to make the cloud native ecosystem more secure.” Justin Cormack, who served as a CNCF project sponsor, concurs, noting, “in-toto …provides secure and trustworthy ways to represent and attest all the operations within the cloud native pipeline.”
20+
21+
in-toto works as follows: For every piece of software it protects, it provides a layout that defines for each individual step what actions are to be taken and by who. This data is captured in metadata, as are all the artifacts involved. The designated functionary at each step also affixes a cryptographic signature on the metadata. When the end-user receives the finished product, he or she has a complete record of the product’s journey, and can verify if the software was created according to the designer’s original plans. If there is any divergence from the original layout, a user can pinpoint where the divergence occurred and who is responsible for it.
22+
23+
The in-toto development team also includes NYU Tandon alumnus [Dr. Trishank Karthik Kuppusamy](https://www.linkedin.com/in/trishank-karthik-kuppusamy), now Engineering Manager at Datadog; developer Lukas Pühringer, and current Ph.D. candidate [Aditya Sirish A Yelgundhalli](https://engineering.nyu.edu/student/aditya-sirish-yelgundhalli), all from the Secure Systems Laboratory at NYU Tandon; and Hammad Afzali Nanize, Anil Kumar Ammul, Sangat Vaidya, and Professor, and co-director of the Cybersecurity Research Center [Reza Curtmola](https://web.njit.edu/~crix/), all from the New Jersey Institute of Technology. The project has participated in various initiatives that have attracted other contributors, such as Christian Rebischke of Arch Linux and Qijia “Joy” Liu, a student at the University of Pennsylvania, through Google Summer of Code (GSoC), and several undergraduate students—Alan Chung Ma of Purdue University; Yuanrui Chen, Isha Vipul Dave, Kristel Fung, Cindy Kim, and Benjamin Wu, all from NYU—through various research programs at both universities. Finally, due to in-toto’s relevance and impact in the industry, it has received contributions from employees at various companies through their open source contribution teams. Some significant contributors from this group are Mark Lodato, Tom Hennen, and Sergio Felix of Google, and Joshua Lock, Jussi Kukkonen, Martin Vrachev, and Teodora Sechkova of VMWare.
24+
25+
Since its inception, in-toto has been adopted or integrated into a number of major open source software projects, including several within the CNCF and the [Open Source Security Foundation](https://openssf.org/), and in [Grafeas](https://grafeas), [Kubesec](https://kubesec.io/), [rebuilderd](https://rebuilderd.com), and [Sigstore’s cosign](https://github.com/sigstore/cosign/blob/main/specs/COSIGN_PREDICATE_SPEC.md). It has been implemented in different languages like Python, Golang, Java, and Rust, and is part of crucial security projects, such as [Reproducible Builds](https://reproducible-builds.org/) and [SLSA](https://www.slsa.dev/). The project has been adopted in production by [Datadog](https://www.datadoghq.com/), which has used it to secure its pipelines since 2019, and [SolarWinds](https://static.sched.com/hosted_files/supplychainsecurityconna21/df/SupplyChainCon-TrevorRosen-Keynote.pdf), who redesigned their build pipelines after the SUNBURST attack came to light. In its three years under the umbrella of the CNCF, in-toto has attracted more than 132 contributors from 16 plus different organizations.

_posts/2022-03-29-uptane-v2.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
3+
layout: article
4+
title: "Uptane V.2.0.0: Open source standard for securing automotive computing units releases new version"
5+
subnav: blog
6+
comments: true
7+
tagline: "On March 18, the Uptane project, an open community effort to secure and protect software delivered over-the-air to automobiles, announced the release of *Uptane V.2.0.0 Standard for Design and Implementation*"
8+
author: '<a href="/people#lois_delong">Lois Anne DeLong</a>'
9+
categories:
10+
- '<a href="/projects#uptane">Uptane</a>'
11+
12+
---
13+
14+
On March 18, the [Uptane](https://uptane.github.io/) project, an open community effort to secure and protect software delivered over-the-air to automobiles, announced the release of [*Uptane V.2.0.0 Standard for Design and Implementation*](https://uptane.github.io/papers/uptane-standard.2.0.0.html). This new edition of the Uptane Standard and the companion reference document *Deployment Best Practices* reflect the project’s evolution towards greater adaptability to the needs of legacy systems and the emerging threats of sophisticated and persistent attackers.
15+
16+
In the new Standards volume, the Uptane project mandates a few key added actions — such as improving the process for verifying the authenticity of an image before downloading — while allowing more flexibility in implementations than in previous releases. An example of this latter change was the decision to remove references to the original Uptane-specific time server, instead letting implementers make their own decisions about secure sources of reliable time.
17+
18+
The changes in Uptane V.2.0.0 fall into three categories: design changes, to improve security; language changes, to continue an ongoing commitment to clarity and simplicity; and policy/administrative changes, to bring the Uptane project in line with best practices in Standards development. The administrative changes, which are also intended to help the Uptane project preserve architectural integrity, include the adoption of a formal policy for approving major and minor releases. This new edition of Uptane also reflects the adoption of a style guide to ensure consistency in spelling, capitalization, and the use of punctuation.
19+
20+
As is customary in major releases, there are a few clarifications in Uptane V.2.0.0 worth noting. None of these clarifications significantly change the code base of existing Uptane implementations, so they should not cause compatibility issues. In addition to removing the requirement for use of the Uptane-specific time server and adding a requirement for an enhanced verification process, these Uptane V.2.0.0 changes also include:
21+
22+
- recommending that filenames of images be encoded to prevent a path traversal on the client system.
23+
- requiring monitoring the download speed of image metadata and image binaries to detect and defend against a slow retrieval attack.
24+
- requiring that a vehicle identifier be used when Targets metadata from the Director repository includes no images, to prevent replay attacks.
25+
26+
In terms of language changes, the Uptane Standard now rigorously restricts the use of conformance imperatives — words such as SHALL or MUST that have specific meaning when used in standards — to the cases where they are actually required for interoperation or limiting behavior with the potential for causing harm. Uptane V.2.0.0 also clarifies the functional properties of cryptographic keys, so that signing keys (which must be unique) are not confused with encryption keys (which can be shared-use keys). Uptane V.2.0.0 also clarifies that all primary ECUs always perform full verification on downloaded software update packages.
27+
28+
*Uptane Standard for Design and Implementation* is available for download in HTML and PDF formats through the [Uptane website](https://uptane.github.io/). The companion volume, *Uptane Deployment Best Practices* will be available for download from the website in the next few weeks.
29+
30+
31+
Uptane was developed by a team of engineers that included Dr. Justin Cappos, associate professor of computer science and engineering at NYU Tandon School of Engineering and director of its Secure Systems Lab. Dr. Cappos remains an active contributor to the project, serving as a member of the project’s steering committee. The lab also continues to contribute to the project’s development through the work of Ph.D. candidate Marina Moore, and alumni like Dr. Trishank Karthik Kuppusamy, now engineering manager at Datadog. Uptane is a [Joint Development Foundation](https://www.jointdevelopment.org/) project of the [Linux Foundation](https://www.linuxfoundation.org/).

0 commit comments

Comments
 (0)