Professor tackles internal Cybersecurity threats
Assessing whether it’s theoretically possible to create a truly secure access and authorization system
Assessing whether it’s theoretically possible to create a truly secure access and authorization system
By Julie Stauffer Faculty of EngineeringThe biggest Cybersecurity threat most organizations face doesn’t come from an anonymous hacker halfway around the world.
Instead, it’s someone within their own walls: a disgruntled employee who wants to wreak havoc, a “trusted” third-party contractor, or even a well-meaning worker inadvertently exposing the company to dangerous malware.
For smaller organizations, keeping sensitive material out of the wrong hands is a pretty straightforward process.
But companies with thousands of employees can’t avoid delegating authority and access to restricted files. So how do they safeguard sensitive material from internal breaches?
Mahesh Tripunitara loves sinking his teeth into these kinds of big, complex questions.
After working in industry for nine years, the electrical and computer engineering professor was lured to the University of Waterloo in 2009 by the opportunity to tackle tough challenges with a team of talented graduate students. Addressing Cybersecurity insider threats certainly falls in that category.
“We don’t do things that are easy,” says Tripunitara.
His team started by assessing whether it’s theoretically possible to create a truly secure access and authorization system: one that gives each employee access to the specific resources they need, but prevents them from colluding with other users to tap into unauthorized files.
“Just because you have a problem doesn’t mean you can write a program,” Tripunitara points out.
And even if you can theoretically create an algorithm to solve that problem, you need to make sure it will work from a practical perspective. After all, there’s no point in developing software that grinds operations to a halt or falls apart if a key employee is out of commission.
A number of researchers have categorized the so-called “user authorization query problem” as intractable, but that didn’t deter Tripunitara.
By treating it as a joint optimization problem, he and his students were able to transform it into a solvable problem. Not only that, they pinpointed existing algorithms that could be applied, giving enterprises usable tools to strengthen their authorization and access systems.
Tripunitara describes his work as bridging the gap between theory and practice. That often means assessing how commercial software stacks up.
A few years ago, he and his team tested the authorization systems of Oracle’s Database Management system — a program used by millions of customers around the world — and uncovered a flaw that affected a fundamental component.
Tripunitara shrugs off the achievement, dismissing it as “low-hanging fruit.”
“When somebody like me and my students who have expertise go in and we look at things in a systematic way… it’s very easy for us to find issues,” he says.
Indeed, working with a talented bunch of graduates and undergraduates is his favourite part of the job. He credits Canada’s educational system with producing outstanding students – and notes that Waterloo Engineering attracts the cream of the crop.
“They are fantastic,” Tripunitara says. “I’m very lucky to be at Waterloo.”
Waterloo researchers develop techniques modelled on the human brain to improve how self-driving cars work
Waterloo welcomes emerging postdoctoral scholars to receive funding from Provost fellowship programs
Innovative device could power electronics with your body movements while you use them
Read
Engineering stories
Visit
Waterloo Engineering home
Contact
Waterloo Engineering
The University of Waterloo acknowledges that much of our work takes place on the traditional territory of the Neutral, Anishinaabeg, and Haudenosaunee peoples. Our main campus is situated on the Haldimand Tract, the land granted to the Six Nations that includes six miles on each side of the Grand River. Our active work toward reconciliation takes place across our campuses through research, learning, teaching, and community building, and is co-ordinated within the Office of Indigenous Relations.