Vulnerabilities / Threats
10/1/2010
12:48 PM
Connect Directly
RSS
E-Mail
50%
50%

Security Researcher Wins Prestigious MacArthur "Genius" Grant

Dawn Song, head of the Berkeley lab that developed BitBlaze, will get $500,000 for more research

A security researcher was among 23 individuals who received the prestigious MacArthur "genius" Fellow awards yesterday.

The award winners, which each receive $500,000 to spend over five years of research in a promising field, come from all disciplines, ranging from economics to science. The award is given by the John D. and Catherine T. MacArthur Foundation.

Dawn Song, 35, an associate professor in the Department of Electrical Engineering and Computer Sciences at the University of California-Berkeley, is being recognized for her innovative work on protecting computer systems from malware.

The MacArthur Foundation cited Song's approach of identifying security breaches by identifying underlying patterns of computer system behavior that can be applied across whole classes of security vulnerability, rather than focusing on specific errors in programming logic.

"The call was out of the blue and such a pleasant surprise," said Song, about learning the news. In an interview with the MacArthur Foundation, she discussed the potential impact of the award on her ability to pursue unconventional research.

"To me, life is about creating something truly beautiful, and in order to do that, often it involves taking a path that is less traveled," she said. "The MacArthur fellowship will allow me to take that path to explore new territory that other people have not walked."

One of Song's project topics is analogous to biological defenses against infection. Much like our human immune system is constantly on the lookout for invaders, the BitBlaze program developed by Song's lab scans and analyzes binaries of vulnerable software and malicious code, and automatically identifies the root cause of attacks to generate defenses.

Song's lab is now working on the next generation of BitBlaze, making it more scalable and powerful than its predecessor. Her group is also exploring how to extend this technology to other areas, such as networked medical devices and systems.

Another area Song plans to pursue is better protection of users' privacy when they go online. "A lot of sensitive data about people are being collected on the Internet, such as users who use online social networks or cloud-based services," Song said. "A big question is how we can protect users' privacy without hindering their ability to use these services."

Song's work in security and privacy issues has already garnered her quite a bit of attention, earning her a National Science Foundation CAREER Award for young faculty, an MIT Technology Review Award for being among the world's top young innovators, a Guggenheim fellowship, an Alfred P. Sloan Research Fellowship, and the IBM Faculty Award, among many others.

Before coming to UC Berkeley, Song was an assistant professor at Carnegie Mellon University. She obtained her Bachelor's degree in physics from Tsinghua University in China in 1996, her Master's in computer science from Carnegie Mellon University in 1999, and her Ph.D. in computer science from UC Berkeley in 2002.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1503
Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

CVE-2014-0600
Published: 2014-08-29
FileUploadServlet in the Administration service in Novell GroupWise 2014 before SP1 allows remote attackers to read or write to arbitrary files via the poLibMaintenanceFileSave parameter, aka ZDI-CAN-2287.

CVE-2014-0888
Published: 2014-08-29
IBM Worklight Foundation 5.x and 6.x before 6.2.0.0, as used in Worklight and Mobile Foundation, allows remote authenticated users to bypass the application-authenticity feature via unspecified vectors.

CVE-2014-0897
Published: 2014-08-29
The Configuration Patterns component in IBM Flex System Manager (FSM) 1.2.0.x, 1.2.1.x, 1.3.0.x, and 1.3.1.x uses a weak algorithm in an encryption step during Chassis Management Module (CMM) account creation, which makes it easier for remote authenticated users to defeat cryptographic protection me...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.