Institute for CyberScience co-hire hunts security flaws in software
Posted on April 9, 2018UNIVERSITY PARK, PA. — Whether someone is streaming an episode of their favorite show on their laptop or banking online, software systems are unavoidable. While the use of software has grown dramatically over the past two decades, these systems are not always secure.
Gang Tan sits at his desk gazing at his computer, deeply involved in his work. An associate professor for the department of computer science and engineering and an Institute for CyberScience (ICS) co-hire, Tan spends his time researching software issues within systems such as web browsers, web servers and operating systems that can compromise user security.
“Anyone who uses a computer can be affected by software bugs. An old 2002 study estimated that buggy software costs $60 billion annually,” Tan said.
The price of buggy software is considerably higher now than it was in 2002. A 2016 study by the Austrian software testing firm Tricentis estimates the expenses are now $1.1 trillion. These errors can affect various government organizations or industries such as the automotive, aerospace, and financial sectors. To avoid these expensive problems and improve security, detection of errors is pertinent.
Utilizing high-performance computing, Tan and his colleagues at the Security of Software lab are constructing tools to lessen the impact of software errors in society.
Bugging out
“People demand new features from software systems to be added instantaneously with a fancy user interface, but there is no way to build correct systems automatically. This is where human error comes into play,” Tan said. “Software engineers have to build these systems, so the process is error-prone.”
Bugs — errors, failures or faults in code — can cause a computer program or system to produce an incorrect or unanticipated result, or to perform in unintentional ways.
Tan asserted that software engineers are bound to make mistakes. On average, he said, there is one bug for every 1,000 lines of code. Programmers test the behavior of their code, but even extensive testing can’t get rid of all the bugs.
Some bugs aren’t so serious and will simply cause a computer to crash, which can be fixed by rebooting the machine or the program. However, other bugs are critical because they allow malicious users to access personal information.
Take a browser, for example. When most people log into their email, they can see just their own messages. Only certain admin accounts can log into the email system and see all user information within the database.
“The problem can begin when the browser forgets to authenticate the user,” Tan said. “Some bugs may allow malicious users to bypass memory protection and log in as an admin user, which can permit them to access sensitive memory.”
A prominent case occurred in September 2017 when Equifax, a major credit reporting agency, was breached. Hackers were able to access the data of about 143 million Americans, including personally identifiable information such as Social Security numbers and driver’s license numbers.
Researchers can either employ dynamic testing or static analysis when trying to find errors, said Tan. For example, dynamic testing consists of executing programs and trying to find any possible errors while it is running, whereas static program analysis typically involves examining the source code for errors without running the program.
While useful, dynamic testing does not account for all situations that a user may encounter, which can allow bugs to hide in untested parts of code, said Tan. Oftentimes software bugs are not fixed before being released into the public. Rather, companies will release updates or patches later on.
Utilizing static analysis, Tan’s research aims to make software systems more secure by finding as many bugs as possible in software programs — bugs that dynamic testing might not uncover.
“Our tools take in a source code to abstract it, analyze it, and alert us to any potential errors or issues within the code that need to be reviewed,” Tan said. “Microsoft has adopted some static analysis methods, but it is still not as well-known as dynamic testing.”
When analyzing these massive amounts of code, Tan requires significant computational power. ICS provides access to the Advanced CyberInfrastructure (ICS-ACI) high-performance research cloud to Tan and other computation-enabled researchers at Penn State.
His main focus is on the detection of the errors. Using Tan’s tools, software engineers are more likely to find errors and fix them before they are released.
“The biggest challenge I face is trying to engineer a system that is very efficient,” Tan said. “Any security program in the industry that slows down software by more than five percent will not be used.”
Tan asserted that we still lack the resources to understand how software will behave in every possible situation. This means that we can’t have total confidence in software security, he said.
“Currently, we build software but don’t have confidence in how it will run,” Tan said. “In an ideal world, we would know how it runs and where its weaknesses lie, along with its behaviors. We are working towards having a complete map.”
Tech wiz
Tan hasn’t always researched security, but computers have always been a part of his life.
Tan’s appreciation for computers and computer science began at a young age. He enjoyed computers so much that he joined a computer interest group when he was in middle school.
Computer science came naturally for him, Tan said. Throughout high school, he spent his spare time entering programming competitions. Tan’s successful competing record led to his national entrance exam for university being waived.
He received his bachelor’s degree with honors from Tsinghua University in 1999, his master’s from Princeton University in 2001, and his doctorate from Princeton in 2005, all in computer science.
Tan said it was when he became a faculty member that he realized the security domain had a lot of problems requiring solutions. He and his team enjoy their work because they are helping defend computer systems by designing software error detection, and in doing so, they are making a real-world impact.
“When it comes to technology, you make the universe and its laws because it is man-made. With other areas, such as physics, the laws are already made and you are trying to understand them. With computer science, you are only constrained by the hardware,” Tan said. “It is a fast-evolving field. Due to rapid changes, I need to learn new things, which I find very exciting.”
Share
Related Posts
- Featured Researcher: Nick Tusay
- Multi-institutional team to use AI to evaluate social, behavioral science claims
- NSF invests in cyberinfrastructure institute to harness cosmic data
- Center for Immersive Experiences set to debut, serving researchers and students
- Distant Suns, Distant Worlds
- CyberScience Seminar: Researcher to discuss how AI can help people avoid adverse drug interactions
- AI could offer warnings about serious side effects of drug-drug interactions
- Taking RTKI drugs during radiotherapy may not aid survival, worsens side effects
- Cost-effective cloud research computing options now available for researchers
- Costs of natural disasters are increasing at the high end
- Model helps choose wind farm locations, predicts output
- Virus may jump species through ‘rock-and-roll’ motion with receptors
- Researchers seek to revolutionize catalyst design with machine learning
- Resilient Resumes team places third in Nittany AI Challenge
- ‘AI in Action’: Machine learning may help scientists explore deep sleep
- Clickbait Secrets Exposed! Humans and AI team up to improve clickbait detection
- Focusing computational power for more accurate, efficient weather forecasts
- How many Earth-like planets are around sun-like stars?
- Professor receives NSF grant to model cell disorder in heart
- SMH! Brains trained on e-devices may struggle to understand scientific info
- Whole genome sequencing may help officials get a handle on disease outbreaks
- New tool could reduce security analysts’ workloads by automating data triage
- Careful analysis of volcano’s plumbing system may give tips on pending eruptions
- Reducing farm greenhouse gas emissions may plant the seed for a cooler planet
- Using artificial intelligence to detect discrimination
- Four ways scholars say we can cut the chances of nasty satellite data surprises
- Game theory shows why stigmatization may not make sense in modern society
- Older adults can serve communities as engines of everyday innovation
- Pig-Pen effect: Mixing skin oil and ozone can produce a personal pollution cloud
- Researchers find genes that could help create more resilient chickens
- Despite dire predictions, levels of social support remain steady in the U.S.
- For many, friends and family, not doctors, serve as a gateway to opioid misuse
- New algorithm may help people store more pictures, share videos faster
- Head named for Ken and Mary Alice Lindquist Department of Nuclear Engineering
- Scientific evidence boosts action for activists, decreases action for scientists
- People explore options, then selectively represent good options to make difficult decisions
- Map reveals that lynching extended far beyond the deep South
- Gravitational forces in protoplanetary disks push super-Earths close to stars
- Supercomputer cluster donation helps turn high school class into climate science research lab
- Believing machines can out-do people may fuel acceptance of self-driving cars
- People more likely to trust machines than humans with their private info
- IBM donates system to Penn State to advance AI research
- ICS Seed Grants to power projects that use AI, machine learning for common good
- Penn State Berks team advances to MVP Phase of Nittany AI Challenge
- Creepy computers or people partners? Working to make AI that enhances humanity
- Sky is clearing for using AI to probe weather variability
- ‘AI will see you now’: Panel to discuss the AI revolution in health and medicine
- Privacy law scholars must address potential for nasty satellite data surprises
- Researchers take aim at hackers trying to attack high-value AI models
- Girls, economically disadvantaged less likely to get parental urging to study computers
- Seed grants awarded to projects using Twitter data
- Researchers find features that shape mechanical force during protein synthesis
- A peek at living room decor suggests how decorations vary around the world
- Interactive websites may cause antismoking messages to backfire
- Changing how government assesses risk may ease fallout from extreme financial events
- Symposium at U.S. Capitol seeks solutions to election security
- ICS co-sponsors Health, Environment Seed Grant Program
- Tracking inheritance of human mitochondrial DNA
- Using social media to solve social problems- study funded by ICS seed grant