<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1 plus MathML 2.0 plus SVG 1.1//EN" "http://www.w3.org/2002/04/xhtml-math-svg/xhtml-math-svg.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
  <head>
    <meta http-equiv="Content-Type" content="application/xhtml+xml; charset=utf-8"/>
    <title>Team:TAMIS</title>
    <link rel="stylesheet" href="../static/css/raweb.css" type="text/css"/>
    <meta name="description" content="Research Program - Axis 3: Building a secure network stack"/>
    <meta name="dc.title" content="Research Program - Axis 3: Building a secure network stack"/>
    <meta name="dc.subject" content=""/>
    <meta name="dc.publisher" content="INRIA"/>
    <meta name="dc.date" content="(SCHEME=ISO8601) 2016-01"/>
    <meta name="dc.type" content="Report"/>
    <meta name="dc.language" content="(SCHEME=ISO639-1) en"/>
    <meta name="projet" content="TAMIS"/>
    <script type="text/javascript" src="https://raweb.inria.fr/rapportsactivite/RA2016/static/MathJax/MathJax.js?config=TeX-MML-AM_CHTML">
      <!--MathJax-->
    </script>
  </head>
  <body>
    <div class="tdmdiv">
      <div class="logo">
        <a href="http://www.inria.fr">
          <img style="align:bottom; border:none" src="../static/img/icons/logo_INRIA-coul.jpg" alt="Inria"/>
        </a>
      </div>
      <div class="TdmEntry">
        <div class="tdmentete">
          <a href="uid0.html">Team Tamis</a>
        </div>
        <span>
          <a href="uid1.html">Members</a>
        </span>
      </div>
      <div class="TdmEntry">Overall Objectives<ul><li><a href="./uid3.html">Context</a></li><li><a href="./uid4.html">Approach and motivation</a></li></ul></div>
      <div class="TdmEntry">Research Program<ul><li><a href="uid6.html&#10;&#9;&#9;  ">Axis 1: Vulnerability analysis</a></li><li><a href="uid7.html&#10;&#9;&#9;  ">Axis 2: Malware analysis</a></li><li class="tdmActPage"><a href="uid8.html&#10;&#9;&#9;  ">Axis 3: Building a secure network stack</a></li></ul></div>
      <div class="TdmEntry">Application Domains<ul><li><a href="uid10.html&#10;&#9;&#9;  ">System analysis</a></li><li><a href="uid11.html&#10;&#9;&#9;  ">Cybersecurity</a></li><li><a href="uid12.html&#10;&#9;&#9;  ">Safe Internet</a></li></ul></div>
      <div class="TdmEntry">
        <a href="./uid14.html">Highlights of the Year</a>
      </div>
      <div class="TdmEntry">New Software and Platforms<ul><li><a href="uid16.html&#10;&#9;&#9;  ">MHD</a></li><li><a href="uid21.html&#10;&#9;&#9;  ">PLASMA Lab</a></li><li><a href="uid25.html&#10;&#9;&#9;  ">Quail</a></li><li><a href="uid29.html&#10;&#9;&#9;  ">GNUnet</a></li><li><a href="uid34.html&#10;&#9;&#9;  ">Taler</a></li><li><a href="uid39.html&#10;&#9;&#9;  ">VITRAIL - Visualisation Tool</a></li><li><a href="uid42.html&#10;&#9;&#9;  ">VITRAIL 6 JBInsTrace</a></li><li><a href="uid45.html&#10;&#9;&#9;  ">Platforms</a></li></ul></div>
      <div class="TdmEntry">New Results<ul><li><a href="uid50.html&#10;&#9;&#9;  ">Results for Axis 1: Vulnerability analysis</a></li><li><a href="uid76.html&#10;&#9;&#9;  ">Results for Axis 2: Malware analysis</a></li><li><a href="uid92.html&#10;&#9;&#9;  ">Results for Axis 3: Building a secure network stack</a></li><li><a href="uid96.html&#10;&#9;&#9;  ">Other research results: Information-Theoretical Quantification of Security Properties</a></li></ul></div>
      <div class="TdmEntry">Bilateral Contracts and Grants with Industry<ul><li><a href="uid102.html&#10;&#9;&#9;  ">Bilateral Contracts with Industry</a></li></ul></div>
      <div class="TdmEntry">Partnerships and Cooperations<ul><li><a href="uid107.html&#10;&#9;&#9;  ">Regional Initiatives</a></li><li><a href="uid108.html&#10;&#9;&#9;  ">National Initiatives</a></li><li><a href="uid112.html&#10;&#9;&#9;  ">European Initiatives</a></li><li><a href="uid118.html&#10;&#9;&#9;  ">International Research Visitors</a></li></ul></div>
      <div class="TdmEntry">Dissemination<ul><li><a href="uid127.html&#10;&#9;&#9;  ">Promoting Scientific Activities</a></li><li><a href="uid179.html&#10;&#9;&#9;  ">Teaching - Supervision - Juries</a></li><li><a href="uid206.html&#10;&#9;&#9;  ">Popularization</a></li></ul></div>
      <div class="TdmEntry">
        <div>Bibliography</div>
      </div>
      <div class="TdmEntry">
        <ul>
          <li>
            <a id="tdmbibentyear" href="bibliography.html">Publications of the year</a>
          </li>
          <li>
            <a id="tdmbibentfoot" href="bibliography.html#References">References in notes</a>
          </li>
        </ul>
      </div>
    </div>
    <div id="main">
      <div class="mainentete">
        <div id="head_agauche">
          <small><a href="http://www.inria.fr">
	    
	    Inria
	  </a> | <a href="../index.html">
	    
	    Raweb 
	    2016</a> | <a href="http://www.inria.fr/en/teams/tamis">Presentation of the Team TAMIS</a> | <a href="https://team.inria.fr/tamis/">TAMIS Web Site
	  </a></small>
        </div>
        <div id="head_adroite">
          <table class="qrcode">
            <tr>
              <td>
                <a href="tamis.xml">
                  <img style="align:bottom; border:none" alt="XML" src="../static/img/icons/xml_motif.png"/>
                </a>
              </td>
              <td>
                <a href="tamis.pdf">
                  <img style="align:bottom; border:none" alt="PDF" src="IMG/qrcode-tamis-pdf.png"/>
                </a>
              </td>
              <td>
                <a href="../tamis/tamis.epub">
                  <img style="align:bottom; border:none" alt="e-pub" src="IMG/qrcode-tamis-epub.png"/>
                </a>
              </td>
            </tr>
            <tr>
              <td/>
              <td>PDF
</td>
              <td>e-Pub
</td>
            </tr>
          </table>
        </div>
      </div>
      <!--FIN du corps du module-->
      <br/>
      <div class="bottomNavigation">
        <div class="tail_aucentre">
          <a href="./uid7.html" accesskey="P"><img style="align:bottom; border:none" alt="previous" src="../static/img/icons/previous_motif.jpg"/> Previous | </a>
          <a href="./uid0.html" accesskey="U"><img style="align:bottom; border:none" alt="up" src="../static/img/icons/up_motif.jpg"/>  Home</a>
          <a href="./uid10.html" accesskey="N"> | Next <img style="align:bottom; border:none" alt="next" src="../static/img/icons/next_motif.jpg"/></a>
        </div>
        <br/>
      </div>
      <div id="textepage">
        <!--DEBUT2 du corps du module-->
        <h2>Section: 
      Research Program</h2>
        <h3 class="titre3">Axis 3: Building a secure network stack</h3>
        <p>To evaluate the techniques developed in Axes 1 and 2, we analyze
concrete systems developed not only with industry partners, but also
within the team. By using our own systems, we can co-evolve
best-practices, while externally developed systems provide
realistic challenges especially with respect to analyzing obfuscated
malware in the hardware or complex vulnerabilities. In this context,
Christian Grothoff (ARP Inria) is currently developing a new Internet,
which is supposed to be more secure. This introduces interesting
challenges both in terms of vulnerability and malware analysis, and
hence should be a great opportunity to mix the competences of all the
members of the team.</p>
        <p>More precisely, this system intends to challenge the idea that network
security is an administrative task, where network administrators
shield users with passwords, firewalls, intrusion detection systems
and policies. Instead, we want to eliminate administrators that have
power over user's data, and as such administrators themselves are
liabilities, and because a network design that permits administrative
intrusion inherently adds vulnerabilities. Instead, the system should
ensure secure communication mechanisms without trusted third parties.</p>
        <p>Key challenges we work on include (a) improving scalable secure
ad-hoc decentralized routing, including key-value lookup, unicast and multicast communication, (b) protecting meta-data
in the overlay using advanced decentralized onion routing, (c) a
unified public-key infrastructure and identity management solution that is suitable to replace the
Web-of-Trust, X.509, DNSSEC and other legacy methods for naming and
identifying services, (d) secure synchronous and asynchronous
messaging at scale, providing decentralized alternatives to common
online social applications and addressing challenges in protocol
evolution and compatibility. Finally, we are currently working on GNU
Taler, a new secure privacy-preserving payment system where users
never have to authenticate. This system in particular can be used as
a concrete test case for the methods developed in the team.</p>
        <p>To support this research work, we develop a framework named GNUnet.
It provides a clear separation into layers, which facilitates
testing and verifying the various components. However, we see that
often existing formal verification techniques still do not scale to
typical subsystems encountered in practice. Our objective is thus to
exploit efficient and scalable formal techniques techniques proposed
in Axis 1 together with engineering skills in order to guide the
validation (message synchronization, data protection, ...) and reach
the best compromise. An additional complication is that we need a
validation process that not merely covers the software itself, but also all of
its dependencies (such as database, cryptographic libraries and
networking libraries). For the Taler-specific hardware, we are
envisioning an NFC-powered device, which creates new challenges in
terms of securing cryptographic computations in a setting where the
adversary has control over the power supply. In such a case, the
attacker can drive the environment and modify the behavior of the
system as we have shown in Axis 2. Providing the control of the
environment is a new vector for attackers.</p>
      </div>
      <!--FIN du corps du module-->
      <br/>
      <div class="bottomNavigation">
        <div class="tail_aucentre">
          <a href="./uid7.html" accesskey="P"><img style="align:bottom; border:none" alt="previous" src="../static/img/icons/previous_motif.jpg"/> Previous | </a>
          <a href="./uid0.html" accesskey="U"><img style="align:bottom; border:none" alt="up" src="../static/img/icons/up_motif.jpg"/>  Home</a>
          <a href="./uid10.html" accesskey="N"> | Next <img style="align:bottom; border:none" alt="next" src="../static/img/icons/next_motif.jpg"/></a>
        </div>
        <br/>
      </div>
    </div>
  </body>
</html>
