Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY 14850-1250

37
DARPA PI Meeting July 17-21, 2000 SL00-0006 1 Odyssey Research Associates Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY 14850-1250 (607) 257-1975 David Rosenthal Odyssey Research Associates July 17-21, 2000 Semantic Data Integrity DARPA PI Meeting

description

Semantic Data Integrity. DARPA PI Meeting. David Rosenthal Odyssey Research Associates July 17-21, 2000. Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY 14850-1250 (607) 257-1975. Team Members. - PowerPoint PPT Presentation

Transcript of Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY 14850-1250

Page 1: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 1

Odyssey Research Associates

Cornell Business & Technology Park33 Thornwood Drive, Suite 500

Ithaca, NY 14850-1250(607) 257-1975

David RosenthalOdyssey Research Associates

July 17-21, 2000

Semantic Data Integrity

DARPA PI Meeting

Page 2: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 2

Odyssey Research Associates

Team Members

• Odyssey Research Associates (a subsidiary of Architecture Technology Corporation)– David Rosenthal, Matt Stillerman, David

Guaspari, Francis Fung• WetStone

– Chet Hosmer, Milica Barjaktarovic, Mike Duren• SUNY Binghamton

– Jiri Fridrich

Page 3: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 3

Odyssey Research Associates

Technical Objectives

• Support intrusion tolerance by developing improved data integrity methods to identify and recover attacked data– localize possible alterations– provide partial recovery, where feasible– provide policy-based selection of mechanisms

• Emphasis is on imagesForgery Detected

Page 4: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 4

Odyssey Research Associates

Technical Approach

• Develop techniques for identifying and protecting data subsets

• Develop new watermarking/self-embedding techniques

• Explore how to recover data subsets using secondary data (DSI Marks)

• Develop software to test the effectiveness of approach

Page 5: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 5

Odyssey Research Associates

Technical ApproachSoftware

ExtractSemanticSegments

DSIMark

Generation

DSIMarkVerification

DataReconstruction

IntegrityPolicy

DSI MarkDB

SuspectData

Page 6: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 6

Odyssey Research Associates

I-FIRE Segmentation

Original Image Segmented Image

Page 7: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 7

Odyssey Research Associates

I-FIRE Segment Verification

Forged Image Segment LevelImage Verification

Page 8: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 8

Odyssey Research Associates

I-Fire Segment Recovery

• Set parameters for very fast recovery

• Streak suggesting aircraft fire was repaired

• White rectangles indicate where recovery did not succeed

Page 9: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 9

Odyssey Research Associates

I-FIRE Anomalous Pixel Detection

Impossible Data Identification

Page 10: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 10

Odyssey Research Associates

Technical ApproachHierarchical Subsets

• Develop algorithms for automatically subsetting images based on uniformity criteria (combination of color, intensity, texture similarity)

• Split image into quadrants, test quadrants for uniformity; if a quadrant is uniform, do not subdivide it further. Otherwise, continue subdividing

• Then, merge all “adjacent” segments that share the same uniformity characteristics (or possibly some other desirable characteristics such as a common edge)

Page 11: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 11

Odyssey Research Associates

Technical ApproachHierarchical Subsets (cont.)

• Impose different integrity mechanisms at different layers of the decomposition, to achieve policy goals more efficiently

Page 12: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 12

Odyssey Research Associates

Intersecting Hash Methods

• Intersecting hashes– Each hash covers some set of set cells– Permit the sets of covered cells for two different

hashes to intersect– Hierarchical decomposition and hashing is a

special case of this• Intersecting hash techniques permit a tradeoff

between – strength of protection,– diagnostic ability / damage isolation

Page 13: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 13

Odyssey Research Associates

Forgery Strategies and Strength of Protection

• Assume that Cell 2 is modified

• Compensating with Cell 2 costs |h1| * |h2 |

• Compensating with Cell 1 and then Cell 3 costs |h1| + |h2|

Hash 1 Hash 2Cell 1 Cell 2 Cell 3

Hash 1 Hash 2Cell 1 Cell 2 Cell 3

Hash 1 Hash 2Cell 1 Cell 2 Cell 3

Page 14: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 14

Odyssey Research Associates

Example: Sequential Forgery Repair with Hierarchical Hashes

• Fix hashes in two stages– First Correction: Fix three hashes of left branch– Second Correction: Fix two hashes of right branch

To be forged

Page 15: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 15

Odyssey Research Associates

Strength of Intersecting Hashes

• Strength of protection can be defined in terms of the cost of the attacker’s best strategy.

• Can be difficult to compute for arbitrary intersecting hashes

• For hierarchical hashes, we believe we have identified an effective algorithm for computing the best strategy

Page 16: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 16

Odyssey Research Associates

Identifying Damaged Area

• Regard segment as nn grid of cells• Compare two different kinds of protection strategies• Compute 2n (weak) hash values for sets of cells

– “Linear” strategy• Hash disjoint blocks of n/2 cells• Entire block is suspicious if its hash check fails

– “Quadratic” strategy• Hash each row and each column• Cell is suspicious if both its row and its column

fail

Page 17: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 17

Odyssey Research Associates

Quadratic vs. Linear Hashing

• On average, a quadratic hash identifies a smaller suspicious area in the following situations (with n rows and n columns)– Sparse random errors

• Where there are up to (approx.)0.96n bad cells• Note: this asymptotic result, converges rapidly

– Concentrated random errors• Errors confined to at most n/2 rows or columns

(Verified analytically for many n, conjectured for all)

Page 18: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 18

Odyssey Research Associates

Reconstruction

• Compute strong hash for the whole image, use weaker hashes on subsets

• Brute force reconstruction – Use weak hashes to identify suspicious area– Search suspicious area for candidate

reconstructions solving all weak hashes– Check candidates against strong hash

Page 19: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 19

Odyssey Research Associates

Feasibility of Reconstruction

• Basic questions for brute force reconstruction– Reliability: probability we are not deceived by

answer– Adequacy: probability the answer is in the search

space– Computational cost of reconstruction

• Reliability: lower bound set by strong hash• Can estimate adequacy and cost, assuming

– Random errors– Independence of row and column hashes.

Page 20: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 20

Odyssey Research Associates

Adequacy

.9999996030200

.9996020200

.9999998030100

.9998020100

Adequacy exceeds

# hash bitsWidth of cell

Page 21: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 21

Odyssey Research Associates

Computational Cost

• Search space constrained by– Initial identification of suspicious area– Homogeneity of the image, limiting the number of

candidate values per cell– “Crossword puzzle” style of reconstruction (only

available with quadratic hashing)• Search grows rapidly, but feasible in some limited

cases

Page 22: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 22

Odyssey Research Associates

Estimates of reconstruction cost

• Cost: Assuming 16 candidate values (homogeneity), 32 hash bits

10342010

10131010

1081005

107105

# “check hash” ops# bad columns# bad rows

Page 23: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 23

Odyssey Research Associates

Self-Embedding

• Self-Embedding: Save important information about an image in the picture

• Developing techniques that are unobtrusive, survive JPEG compression, and resistant to some classes of attack

• Before and after embedding

Page 24: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 24

Odyssey Research Associates

Technical Approach Secure Fragile Authentication

Watermark

• Investigated some attacks that affect several proposed fragile watermark schemes

• Developed a secure fragile watermark that is resistant to these attacks– Uses secret key and the watermark is difficult to

forge– Resistant to collage attack

Original image Forgery using a collage attack

Page 25: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 25

Odyssey Research Associates

Technical ApproachPolicy

• Provide simple layer at the level of mechanism• Help to bridge user needs to the mechanisms that are

available– Provide mapping from typical needs to default

assignments for how mechanisms should work• Would eventually like to have a better connection

between mechanisms and more characteristics– Importance of the data or sub-data, threats that

need to be countered, recovery time constraints, resource limitations, detectability of integrity measure, current situation

Page 26: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 26

Odyssey Research Associates

Technical ApproachPolicy (cont.)

• A critical data policy at the mechanism layer

DigitalSignature

CRC Robustwatermark

FragileWatermark

Selfembedding

Entire image XImportant Segments X X X XNon-importantsegments -adjacent toimportant segments

X X

Important segmentwith adjacentsegments

X

Segments that containself-embeddinginformation

X

Non-important objectsegments

X

Top-level segments X

Page 27: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 27

Odyssey Research Associates

Technical ApproachDemonstration Environment

• We have developed a tool, called I-FIRE for demonstrating and testing our methodology

• Current features include:– Split-and-merge with parameters– Damage detection– Reconstruction and pixel verification– Partial reconstruction with self-embedded data– Policy-based integrity mechanism selection

Page 28: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 28

Odyssey Research Associates

Major Risks and Planned Mitigation

• Previous Risk– Partial recovery of subsets may not be very

practical (too resource-intensive)• Mitigation

– Have developed some other techniques that may make data useable in the case where recovery is not feasible

– Detection features can be useful even without recovery

Page 29: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 29

Odyssey Research Associates

Accomplishments to Date

• Prototype Tool– Demonstrates hierarchical subset methods– Implements current detection and recovery

methods• Developed new watermarking methods• Linear vs. Quadratic method analysis• Some initial results on assurance with incomplete

recovery with hierarchical methods• Some initial analysis of a scenario

Page 30: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 30

Odyssey Research Associates

Quantitative Metrics

• Metrics that may be used are– Size of DSI mark– Time to apply integrity protection– Time for partial reconstruction techniques– Area of “known” correct part of image– Cost of recovery for a given class of attacks– Strength of protection

Page 31: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 31

Odyssey Research Associates

Expected Major Achievements

• A method and tool to facilitate the use of altered data, by– recognizing unharmed subsets– supporting partial recovery techniques

Page 32: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 32

Odyssey Research Associates

Task schedule

• Feb 2000: – First version of I-FIRE

• July 2000: – Second version of I-FIRE– Some analysis results

• December 2000– Final version of software– Extended analysis results

Page 33: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 33

Odyssey Research Associates

Key outstanding issues and recommended resolution

• None

Page 34: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 34

Odyssey Research Associates

Tech Transfer -- Military

• Integrity enhancement for expensive transmissions, e.g., air-to-ground targeting data -– For Air Combat Command and Air Material

Command– Planned for small part of JFX2000 experiment

(Sept. 2000)

Page 35: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 35

Odyssey Research Associates

JFX 2000 and I-FIRE

• I-FIRE and JFX2000

IFGRL-Band

IFGR

L-BandSecure

Message

SIPERNET

Aircraft

I-FIRE

DSI

SecureMessage

DSI

Ground

Page 36: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 36

Odyssey Research Associates

Tech Transfer -- Commercial

• Possible commercial transitions– Injection of key technologies into WetStone’s

SMARTWatch integrity checker• Investigating some other possibilities

Page 37: Cornell Business & Technology Park 33 Thornwood Drive, Suite 500 Ithaca, NY  14850-1250

DARPA PI MeetingJuly 17-21, 2000

SL00-0006 37

Odyssey Research Associates

What do you need from the DARPA PM?

• No pending requirements