+ All Categories
Home > Documents > Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of...

Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of...

Date post: 10-Jul-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
30
Cybersecurity Research and and Online Learning John Mitchell Stanford University
Transcript
Page 1: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Cybersecurity Researchandand 

Online LearningJohn MitchellStanford University

Page 2: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Security and privacy

– We are developing a new class of systems with new uses for new communitiesnew uses for new communities

– Security and privacy are pervasive concerns, central for this area becausecentral for this area because

• Student records are confidential and personal

• Social networks reveal personal, confidentialSocial networks reveal personal, confidential information

• Course material may be owned, shared, licensed, b drecombined, …

• Extensive data collection and analysis is part of the revolutionrevolution

Page 3: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Summer‐Fall 2011

• Sebastian Thrun, AI courseUd it l tf t i l bli it– Udacity platform, controversial publicity

• Fall Stanford coursesJ if Wid D b– Jennifer Widom, Databases

– Andrew Ng, Machine Learning

St ti ti• Statistics– Approx 350,000 registered interest onlineT f h d l d– Tens of thousands completed courses

– Statement of Accomplishment

Page 4: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Excitement in the news

• Public concern over the cost of education– Education debt exceeds credit card debt

• Stanford offerings are– Free

– Available to everyoney

• The numbers have been phenomenal– More than 1 5 million Coursera users to dateMore than 1.5 million Coursera users to date 

Page 5: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Larry Diamond, Comparative Democratic Development

Security Workshop John Mitchell      5

Page 6: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Maya Adam, Nutrition

Security Workshop John Mitchell      6

Page 7: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Yoav Shoham, Game Theory

Security Workshop John Mitchell      7

Page 8: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability
Page 9: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Tremendous Opportunity• Evolving technology give us an opportunity to expand and reinvent education at all levelsand reinvent education at all levels

– Interactive video: embedded questions• 15 min segments question every 3 5 minutes auto graded• 15 min segments, question every 3‐5 minutes, auto‐graded

– Automated assessment: quizzes, exercises• Can we grade calculus? Software design? English papers?

– Social networking: online discussion, collaboration• Schedule and timeline have huge effect• Peer evaluation, reputation rankings

– Simulated environments: • Computer‐simulated physics, chemistry, economic phenomena,…

Page 10: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability
Page 11: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Some personal history …

l k b dSocial Network based Course Management System

Built summer 2009 with 6 undergrads

Page 12: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Fully Customizable 

User Dashboard Security Workshop 12

Page 13: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability
Page 14: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

University system: WebAuth

• Web‐based Single Sign‐On protocol

• WebAuth and a similar protocol, Central Authentication Service (CAS), are deployed at over 80 universities worldwide

• We analyzed and improved WebAuthy p– Formal model of the web, using Alloy

– Found exploitable vulnerabilityFound exploitable vulnerability

– Verified the same vulnerability in CAS

– Provided and verified practical repairProvided and verified practical repair

Page 15: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

WebAuthProtocol

Page 16: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

WebAuthAttack

Page 17: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Learning analytics => “Lytics Lab”

Tea hTeach Course

Collect Data

Refine Learning 

d l Datamodels

Analyze Data 

John Mitchell      17Security Workshop

Page 18: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Clustered patterns of engagement p g g

Very Involved

Dropped OutInvolved

Explored

Audited

Not including registrants that never watched a video or did a quiz.

Security Workshop John Mitchell      18

Page 19: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Simple Visualization of Seek DataLearning Analytics

Skip

Repeat

John Mitchell       19

S. Halawa, R. Kizilcec, E. Schneider, and John Mitchell (Stanford University)

Security Workshop

Page 20: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Comparison of student groupsLearning Analytics

High seek back activityAvg question score > 0.9 A

B

Low videoengagement

Question #1 Question #3

Security Workshop John Mitchell      20

Page 21: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Peer Grading NetworkHCI assignment 5

Dummyassignment

One student is highlighted  student she gradedstudent who graded her 

Security Workshop John Mitchell      21

Page 22: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Improved Accuracy From Modeling Graders

99% h

Some students 

within 10pp

were getting very erroneous gradesgrades

‐100 ‐80 ‐60 ‐40 ‐20 0 20 40 60 80-100 -80 -60 -40 -20 0 20 40 60 80

Corrections involve weighting reliable graders and additive correction for bias.

Security Workshop John Mitchell      22

Page 23: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Group ML programs by similarity metric

3000 nodes shownshown, connected if similar

Red = IncorrectRed   IncorrectBlue = Correct

John Mitchell   23Security Workshop

Page 24: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Find Prototypical Solutions

Similar clusteringSimilar clustering in CS106A logs of students solving their homework

24Security Workshop

Page 25: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Basic Security Requirements

• Student records are confidential and personal

• Social networks reveal personal, confidential information

• Course material may be owned, shared, licensed, recombined, …, ,

• Various forms of cheating are pervasive

• Extensive data collection and analysis is part• Extensive data collection and analysis is part of the revolution

Page 26: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Sample challenges   (1)

• User annotation of learning materialT diti l it i ti it t– Traditional cross‐site scripting, cross‐site request forgery, … for web applications that allow user input such as executable code (e.g., in p ( g ,programming classes), annotation and modification of content, ….

• Reputation in group projects, peer evaluation– Integrity of reputation mechanisms and 

b t i t lf i i i li irobustness against self‐maximizing malicious behavior

Page 27: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Sample challenges   (2)

• Assessment and stand‐alone credentials– Can we develop ways of assessing student skills that are more informative to employers than A, B, C, …

How do we make these robust against various forms– How do we make these robust against various forms of “cheating”?

• Data sharing and educational researchData sharing and educational research– What anonymization and privacy measures are appropriate?pp p

• Students may want to demonstrate their knowledge publicly

• Known attacks on social network graph may apply

Page 28: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Sample challenges   (3)

• Beyond the “course”– Learning objects can be combined to support hybrid and fully online learning

– How do we support integrity and provenance in this environment?

Sh ld l i bj i f– Should a learning object repository enforce licenses governing combination and reuse?

Interesting instance of sec re information sharing– Interesting instance of secure information sharing

Page 29: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

Conclusion• Education is a new frontier for computing

– Interdisciplinary research area involving new learningInterdisciplinary research area involving new learning models and new technology to support and evaluate them

• New systems new security requirements• New systems  new security requirements• Student records are confidential and personal• Social networks reveal personal, confidential information• Course material may be owned, shared, licensed, recombined, …

• Various forms of cheating are pervasiveE i d ll i d l i i f h• Extensive data collection and analysis is part of the revolution

Page 30: Cybersecurity Research - Stanford University · Cybersecurity Research and ... – Formal model of the web, using Alloy – Found exploitableexploitable vulnerabilityvulnerability

online.stanford.edu

Security Workshop John Mitchell      30


Recommended