Biography:Justin Cappos

From HandWiki
Revision as of 04:39, 9 February 2024 by JOpenQuest (talk | contribs) (linkage)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Justin Cappos
Born (1977-02-27) February 27, 1977 (age 47)
NationalityAmerican
Alma materUniversity of Arizona
Scientific career
FieldsSecurity, operating systems, networks
Thesis (2008)
Doctoral advisorJohn Hartman
Websiteengineering.nyu.edu/people/justin-cappos
ssl.engineering.nyu.edu/personalpages/jcappos/

Justin Cappos (born February 27, 1977) is a computer scientist and cybersecurity expert whose data-security software has been adopted by a number of widely used open-source projects. His research centers on software update systems, security, and virtualization, with a focus on real-world security problems.[1][2][3]

Cappos has been a faculty member at New York University Tandon School of Engineering since 2011, and was awarded tenure in 2017. Now an associate professor in the Department of Computer Science and Engineering, he has introduced a number of new software products and system protocols as head of the school's Secure Systems Laboratory. These include technologies that detect and isolate security faults,[4] secure private data,[5] provide a secure mechanism for fixing software flaws in different contexts,[6] and even foster a deeper understanding about how to help programmers avoid security flaws in the first place.[7]

Recognizing the practical impact of his work, Popular Science selected Cappos as one of its Brilliant 10 in 2013,[8] naming him as one of 10 brilliant scientists under 40. His awareness of the risks of today's connected culture—a knowledge strong enough to keep him from owning a smartphone or other connected device,[9] or from using social media like Facebook and Twitter—has led to numerous requests to serve as an expert commentator on issues of cyber security and privacy for local, national, and international media.

Education and early research initiatives

The topic of Cappos' Ph.D. dissertation at the University of Arizona was the Stork Project,[10] a software package manager he built with John H. Hartman, a professor in the Department of Computer Science. Stork is still used today in some applications, but, more importantly, the project called attention to the need for improved security for software update processes, a research area Cappos has continued to pursue.

While a post-doctoral researcher at the University of Washington in 2009, Cappos also developed a peer-to-peer computing platform called Seattle,[11][12] which allows device-to-device connectivity in a decentralized network. Seattle is currently used by thousands of developers, who can access, download, and use the program on any type of smart device. In addition, spin-off technologies, such as Sensibility Testbed,[13] have extended the use of Seattle's security and enforced privacy protection strategies, allowing researchers to collect data from sensors at no risk to the privacy of the device owner.

Compromise-resilient strategies

In 2010, Cappos developed The Update Framework (TUF),[14][15] a flexible software framework that builds system resilience against key compromises and other attacks that can threaten the integrity of a repository.[16][17] TUF was designed for easy integration into the native programming languages of existing update systems, and since its inception, it has been adopted or is in the process of being integrated by a number of high-profile open-source projects. One of the more significant earlier adoptions was Docker Content Trust.[18][19] an implementation of the Notary project from Docker that deploys Linux containers.[20] Notary, which is built on TUF, can certify the validity of the sources of Docker images.[21] In October 2017, Notary and TUF were both adopted as hosted projects by the Linux Foundation as part of its Cloud Native Computing Foundation.[22] In December 2019, TUF became the first specification and first security-focused project to graduate from CNCF.[23] TUF has also been standardized in Python,[24][25] and been independently implemented in the Go language by Flynn, an open-source platform as a service (PaaS) for running applications in production.[26][27][28] To date, the list of tech companies and organizations using TUF include Foundries.io[29],IBM,[30] VMware,[31] Digital Ocean,[32] Microsoft,[33] Google,[34] Amazon,[35] Leap,[36] Kolide,[37] Docker,[38] and Cloudflare.[39]

Another significant compromise-resilient software update framework by Cappos is the 2017 launch of a TUF-adapted technology called Uptane.[40][41] Uptane is designed to secure software updates for automobiles, particularly those delivered via over-the-air programming.[42][43][44] Developed in partnership with the University of Michigan Transportation Research Institute and the Southwest Research Institute, and in collaboration with stakeholders in industry, academia, and government, Uptane modifies the TUF design to meet the specific security needs of the automotive industry. These needs include accommodating computing units that vary greatly in terms of memory, storage capability, and access to the Internet, while preserving the customizability manufacturers need to design cars for specific client usage.[45] To date, Uptane has been integrated into OTA Plus and ATS Garage, two over-the-air software update products from Advanced Telematic Systems, and is a key security component of the OTAmatic program created by Airbiquity.[46][47] The Airbiquity project was honored with a BIG Award for Business in the 2017 New Product Category in January 2018, and Popular Science magazine named Uptane one of the top 100 inventions for 2017.[48] The first standard volume issued for the project, entitled IEEE-ISTO 6100.1.0.0 Uptane Standard for Design and Implementation, was released on July 31, 2019.[49] Uptane is now a Joint Development Foundation project of the Linux Foundation, operating under the formal title of Joint Development Foundation Projects, LLC, Uptane Series.

Other significant research projects

In 2016, Cappos introduced in-toto,[50] an open metadata standard that provides documentation of the end-to-end security of a software supply chain. The framework gathers both key information and signatures from all who can access a piece of software through the various stages of coding, testing, building and packaging, thus making transparent all the steps that were performed, by whom and in what order. By creating accountability, in-toto can prevent attackers from either directly introducing malicious changes into the code, or from altering the metadata that keeps the record of those changes along the supply chain.[51] in-toto has collaborated with open source communities such as Docker and OpenSUSE. Datadog utilizes both in-toto and TUF.[52] In December 2020, the framework released its first major version.

While working on in-toto, Cappos and the SSL research group identified metadata manipulation as a new threat against Version Control Systems like Git. His team has developed several new approaches to address this problem, including a defense scheme that mitigates these attacks by maintaining a cryptographically-signed log of relevant developer actions.[53] By documenting the state of the repository at a particular time when an action is taken, developers are given a shared history, so irregularities are easily detected. One recent accomplishment in this research arena is Arch Linux integrating a patch to check for invalid tags in git into the next release of its pacman utility.[54] More recently, Cappos and his collaborators have focused on development of a browser extension that can ensure users of convenient web-based hosting services, such as GitHub or GitLab, that the server will faithfully carry out their requested actions.

Another Cappos project, developed in 2014, introduced a method to make passwords for databases harder to crack. PolyPasswordHasher,[55] is a secure scheme that interrelates stored password data, forcing hackers to crack passwords in sets.[56][57] By making it significantly harder for attackers to figure out the necessary threshold of passwords needed to gain access, PolyPasswordHasher-enabled databases become very difficult to breach. PPH is currently used in several projects, including the Seattle Clearinghouse and BioBank. Implementations are available for seven languages, including Java,[58] Python,[59] C,[60] and Ruby.[61]

References

  1. Cappos, Justin; Samuel, Justin; Baker, Scott; Hartman, John H. (1 January 2008). "A look in the mirror". A Look in the Mirror: Attacks on Package Managers. ACM. pp. 565–574. doi:10.1145/1455770.1455841. ISBN 9781595938107. 
  2. Cappos, J.; Wang, L.; Weiss, R.; Yang, Y.; Zhuang, Y. (1 February 2014). "BlurSense: Dynamic fine-grained access control for smartphone privacy". 2014 IEEE Sensors Applications Symposium (SAS). pp. 329–332. doi:10.1109/SAS.2014.6798970. ISBN 978-1-4799-2179-9. 
  3. Kuppusamy, Trishank Karthik; Torres-Arias, Santiago; Diaz, Vladimir; Cappos, Justin (March 2016). Diplomat: Using Delegations to Protect Community Repositories. Usenix. pp. 567–581. ISBN 9781931971294. https://www.usenix.org/conference/nsdi16/technical-sessions/presentation/kuppusamy. 
  4. Li, Yiwen; Dolan-Gavitt, Brendan; Weber, Sam; Cappos, Justin (2017). "Lock-in-Pop:Securing Privileged Operating System Kernels by Keeping on the Beaten Path". USENIX Association. pp. 1–13. http://www.usenix.org/system/files/conference/atc17/atc17-li_yiwen.pdf. 
  5. Zhuang, Yanyan; Rafetseder, Albert; Hu, Yu; Tian, Yuan; Cappos, Justin (2018). "Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps". ACM. http://www.cs.uccs.edu/~yzhuang/CS4930_5930/spring2018/slides/hotmobile18.pdf. 
  6. Kuppusamy, Trishank; Diaz, Vladimir; Cappos, Justin (2017). Mercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories. USENIX Association. pp. 673–688. ISBN 9781931971386. https://www.usenix.org/conference/atc17/technical-sessions/presentation/kuppusamy. 
  7. Gopstein, Dan; Iannacone, Jake; Yan, Yu; DeLong, Lois; Zhuang, Yanyan; Yeh, Martin K.-C.; Cappos, Justin (2017). "Understanding Misunderstandings in Source Code". Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2017. ACM. pp. 129–139. doi:10.1145/3106237.3106264. ISBN 9781450351058. 
  8. Greenwood, Veronique (16 October 2013). "How Justin Cappos Created A New Way To Cloud Compute". Popular Science. http://www.popsci.com/science/article/2013-09/justin-cappos. Retrieved 1 October 2016. 
  9. "Staying Safe Online". Al Jazeera America. 28 September 2013. https://vimeo.com/75900188. Retrieved 15 May 2019. 
  10. Cappos, Justin (11 November 2007). Stork: Package Management for Distributed VM Environments. pp. 79–94. https://www.usenix.org/legacy/event/lisa07/tech/full_papers/cappos/cappos_html/. Retrieved 1 October 2016. 
  11. Cappos, Justin; Beschastnikh, Ivan; Krishnamurthy, Arvind; Anderson, Tom (1 January 2009). "Seattle". Seattle: A Platform for Educational Cloud Computing. ACM. pp. 111–115. doi:10.1145/1508865.1508905. ISBN 9781605581835. 
  12. Cappos, Justin. "NSF Award Search: Award#1205415 - CI-ADDO-EN: Enhancing and Supporting a Community Testbed". National Science Foundation. https://www.nsf.gov/awardsearch/showAward?AWD_ID=1205415. Retrieved 1 October 2016. 
  13. "Sensibility Testbed.com". https://sensibilitytestbed.com/projects/project. Retrieved 19 October 2017. 
  14. Cappos, Justin. "NSF Award Search: Award#1345049 – TTP: Securing Python Package Management with The Update Framework (TUF)". https://www.nsf.gov/awardsearch/showAward?AWD_ID=1345049&HistoricalAwards=false. Retrieved 2 October 2016. 
  15. Samuel, Justin; Mathewson, Nick; Cappos, Justin; Dingledine, Roger. "Survivable Key Compromise in Software Update Systems". ACM. pp. 61–72. https://justinsamuel.com/papers/survivable-key-compromise-ccs2010.pdf. Retrieved 13 November 2017. 
  16. Li, Ying; Lawrence, David. "Presentation: When the going gets tough, get TUF going". Python Software Foundation. https://us.pycon.org/2016/schedule/presentation/2187/. Retrieved 2 October 2016. 
  17. Seifried, Kurt. "TUF Love". Linux Pro Magazine. http://www.linux-magazine.com/Issues/2014/160/Security-Lessons-TUF. Retrieved 3 October 2016. 
  18. Monica, Diogo (12 August 2015). "Introducing Docker Content Trust – Docker Blog". Docker. https://blog.docker.com/2015/08/content-trust-docker-1-8/. Retrieved 2 October 2016. 
  19. "Docker Content Trust Protects Integrity of Dockerized Content". CIO Review. http://www.cioreview.com/news/docker-content-trust-protects-integrity-of-dockerized-content-nid-8372-cid-92.html. Retrieved 2 October 2016. 
  20. Fulton III, Scott M. (12 August 2015). "Docker: With Content Trust, You Can Run Containers on Untrusted Networks – The New Stack". The New Stack. http://thenewstack.io/docker-content-trust-can-run-containers-untrusted-networks/. Retrieved 3 October 2016. 
  21. Vaughan-Nichols, Steven J.. "Docker 1.8 adds serious container security ZDNet". CBS Interactive. http://www.zdnet.com/article/docker-1-8-adds-serious-container-security/. Retrieved 3 October 2016. 
  22. Jackson, Joab (24 October 2017). "CNCF Brings Security to the Cloud Native Stack with Notary, TUF Adoption". The New Stack. https://thenewstack.io/cncf-brings-security-cloud-native-stack-notary-tuf-adoption/. 
  23. Melanson, Mike (19 December 2019). "TUF Is First Security Project to Graduate the Cloud Native Computing Foundation". The New Stack. https://thenewstack.io/tuf-is-first-security-project-to-graduate-the-cloud-native-computing-foundation/. 
  24. Kuppusamy, Trishank Karthik; Diaz, Vladimir; Stufft, Donald; Cappos, Justin (27 September 2013). "PEP 458—Surviving a Compromise of PyPI". https://www.python.org/dev/peps/pep-0458/. Retrieved 2 April 2018. 
  25. Kuppusamy, Trishank Karthik; Diaz, Vladimir; Stufft, Donald; Cappos, Justin (8 October 2014). "PEP 480—Surviving a Compromise of PyPI: The Maximum Security Model". https://www.python.org/dev/peps/pep-0480/. Retrieved 2 April 2018. 
  26. Yegulalp, Serdar (28 July 2016). "Open source Flynn takes the headaches out of app deployment". IDG. http://www.infoworld.com/article/3101765/open-source-tools/open-source-flynn-takes-the-headaches-out-of-app-deployment.html. Retrieved 3 October 2016. 
  27. "Security – Flynn". https://flynn.io/docs/security. Retrieved 3 October 2016. 
  28. "flynn/go-tuf". GitHub, Inc.. https://github.com/flynn/go-tuf#install. Retrieved 3 October 2016. 
  29. "FoundriesFactory TUF Keys Rotation" (in en). 2020-03-05. https://foundries.io/insights/blog/20200305-key-rotation/. 
  30. "Signing images for trusted content". IBM Cloud Docs. 13 February 2020. https://cloud.ibm.com/docs/services/Registry?topic=registry-registry_trustedcontent#registry_trustedcontent. Retrieved 13 April 2020. 
  31. "Error: no |title= specified when using {{Cite web}}". VMware. https://www.vmware.com/. Retrieved 13 April 2020. 
  32. "Error: no |title= specified when using {{Cite web}}". Digital Ocean. https://www.digitalocean.com/. Retrieved 13 April 2020. 
  33. "Content trust in Azure Container Registry". Microsoft. 6 September 2019. https://docs.microsoft.com/en-us/azure/container-registry/container-registry-content-trust. Retrieved 13 April 2020. 
  34. "Fuchsia Project". 2 April 2020. https://fuchsia.dev/. Retrieved 13 April 2020. 
  35. "AWS Tough Repository". Amazon. 9 April 2020. https://github.com/awslabs/tough. Retrieved 13 April 2020. 
  36. "New releases for a new year". Leap Encryption Action Project. 23 December 2014. https://leap.se/en/2014/darkest-night. Retrieved 13 April 2020. 
  37. "Kolide Updater". Kolide. 1 November 2014. https://github.com/kolide/updater/blob/master/README.md. Retrieved 13 April 2020. 
  38. "Docker Trusted Registry". Mirantis.com. https://www.mirantis.com/software/docker/image-registry/. Retrieved 13 April 2020. 
  39. Sullivan, Nick (16 March 2018). "A container identity bootstrapping tool". Cloudflare Blog. https://blog.cloudflare.com/pal-a-container-identity-bootstrapping-tool/. Retrieved 13 April 2020. 
  40. Detsch, Jack (18 January 2017). "Are software updates key to stopping criminal car hacks?". Christian Science Monitor. http://www.csmonitor.com/World/Passcode/2017/0118/Are-software-updates-key-to-stopping-criminal-car-hacks. Retrieved 20 February 2017. 
  41. Rowe, Martin (23 January 2017). "Automotive ECU Updates: Keeping the Hackers Out". EE Times. http://www.eetimes.com/document.asp?doc_id=1331232. Retrieved 20 February 2017. 
  42. "Remote Software Update: Future growth business". IHS.com. 14 January 2015. http://blog.ihs.com/remote-software-update%3A-future-growth-business. Retrieved 13 November 2017. 
  43. Merian, Lucas (15 March 2016). "Cybersecurity and recalls will mean over-the-air updates for 203M cars by 2022". Computerworld. https://www.computerworld.com/article/3044499/emerging-technology/cybersecurity-and-recalls-will-mean-over-the-air-updates-for-203m-cars-by-2022.html. Retrieved 13 November 2017. 
  44. Sage, Alexandria (29 September 2017). "Big Auto look to tech companies to fix cars over the air". Reuters. https://www.reuters.com/article/us-autos-wireless/big-auto-look-to-tech-companies-to-fix-cars-over-the-air-idUSKCN0RT0BV20150929. Retrieved 29 January 2018. 
  45. Kuppusamy, Trishank Karthik; DeLong, Lois Anne; Cappos, Justin (Summer 2017). Securing Software Updates for Automobiles Using Uptane. 42. login. https://ssl.engineering.nyu.edu/papers/kuppusamy_login_2017.pdf. 
  46. "ATS is Integrating the Uptane Security Framework for Over-the-air Software Updates to Connected Vehicles". World News.com. 13 June 2017. https://article.wn.com/view/2017/06/13/ATS_is_Integrating_the_Uptane_Security_Framework_for_Overthe/. 
  47. "Airbiquity introduces OTAmatic for connected vehicle Over-The-Air (OTA) software updates and data management". Airbiquity.com. 18 May 2017. https://www.airbiquity.com/jp/news-press/press-releases/airbiquity-introduces-otamatic-connected-vehicle-over-air-ota-software-updates-and-data-management. Retrieved 16 March 2018. 
  48. Atherton, Kelsey D.; Feltman, Rachel (17 October 2017). "The Year's Most Important Innovations in Security". Popular Science. https://www.popsci.com/top-security-innovations-2017. 
  49. "IEEE-ISTO 6100.1.0.0 Uptane Standard for Design and Implementation". IEEE/ISTO. 31 July 2019. https://uptane.github.io/papers/ieee-isto-6100.1.0.0.uptane-standard.pdf. Retrieved 8 January 2020. 
  50. "in-toto website". https://in-toto.github.io/. Retrieved 19 October 2017. 
  51. "in-toto Specification". 11 April 2017. https://github.com/in-toto/docs/blob/v0.9/in-toto-spec.pdf. Retrieved 6 April 2018. 
  52. "Secure Publication of Datadog Agent Integrations with TUF and in-toto". 3 June 2019. https://www.datadoghq.com/blog/engineering/secure-publication-of-datadog-agent-integrations-with-tuf-and-in-toto/. Retrieved 14 December 2020. 
  53. Torres-Arias, Santiago; Ammula l, Anil Kumar; Curtmola, Reza; Cappos, Justin. "On omitting commits and committing omissions: Preventing git metadata tampering that (re)introduces software vulnerabilities". 25th USENIX Security Symposium Proceedings. pp. 379–395. https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_torres-arias.pdf. 
  54. "libmakepkg: check for invalid tags in git". Arch Linux<. https://git.archlinux.org/pacman.git/commit/?id=39319c1860d200a9b4a3cc2c6975e3cece502f2d. Retrieved 13 September 2017. 
  55. "PolyPasswordHasher website". Secure Systems Lab at NYU. https://polypasswordhasher.github.io/PolyPasswordHasher/. Retrieved 14 December 2020. 
  56. Prince, Brian. "New Protection Scheme Makes Weak Passwords Virtually Uncrackable". Wired Business Media. https://www.securityweek.com/new-protection-scheme-makes-weak-passwords-virtually-uncrackable. Retrieved 14 December 2020. 
  57. "Interview With NYU-Poly's Professor Justin Cappos: Security Lessons From Retail Breaches". Varonis Blog. 6 January 2015. https://blog.varonis.com/conversation-nyu-polys-professor-justin-cappos-data-security-lessons-tips-companies/. Retrieved 3 October 2016. 
  58. "PolyPasswordHasher-Java implementation". Secure Systems Lab at NYU. 6 October 2015. https://github.com/PolyPasswordHasher/PolyPasswordHasher-Java/. Retrieved 19 October 2017. 
  59. "PolyPasswordHasher/python-reference-implementation". Secure Systems Lab at NYU. https://github.com/PolyPasswordHasher/PolyPasswordHasher/tree/master/python-reference-implementation/. Retrieved 19 October 2017. 
  60. "PolyPasswordHasher-C". Secure Systems Lab at NYU. 26 January 2017. https://github.com/PolyPasswordHasher/PolyPasswordHasher-C/. Retrieved 19 October 2017. 
  61. "PolyPasswordHasher/PolyPasswordHasher-Ruby/". Secure Systems Lab at NYU. https://github.com/PolyPasswordHasher/PolyPasswordHasher-Ruby/. Retrieved 19 October 2017. 

External links

Selected publications

Media citations and commentary