• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Sunday, August 3, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News Science

UTSA launches open source software to secure the cloud for users

Bioengineer by Bioengineer
July 17, 2019
in Science
Reading Time: 3 mins read
0
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

IMAGE

Credit: UTSA

(San Antonio, July 17, 2019) — The University of Texas at San Antonio (UTSA) has launched Galahad, an open source revolutionary user computer environment (UCE) for the Amazon Cloud. The technology, which is named after the Arthurian knight that ultimately secured the Holy Grail, will fight to protect people using desktop applications running on digital platforms such as Amazon Web Services (AWS). Galahad will leverage nested virtualization, layered sensing and logging to mitigate cloud threats. These layers will allow individual users to host their applications seamlessly and securely within the cloud avoiding both known and unknown threats.

Galahad takes a holistic approach to creating a secure, interactive UCE. The software leverages role-based isolation, attack surface minimization practices, operating system (OS) and application hardening techniques, real-time sensing, and maneuver / deception approaches to reduce the risk associated with cloud deployments. Galahad makes no attempt to establish trust, nor does it require specialized, more costly services provided by AWS, e.g., dedicated servers. Instead, the software impedes the ability of adversaries to operate within the AWS by making it more difficult to co-locate (either through the use of insiders, compromised hypervisors, witting or unwitting peers, or remote access) with targets, while also requiring adversaries consume more resources. Such an increase in complexity and cost means Galahad also increases the accuracy, rate, and speed with which threats are detected.

With the use of role-based isolation and real-time sensors, Galahad will integrate machine learning to develop unique user profiles that will immediately help spot malicious activity or other anomalies like malware in a typical workload. This determination will be based on log events and user actions at the application, virtual machine and hypervisor level.

“Galahad can develop a profile of how each application is used so if an instance of Microsoft Word or Outlook uses an unusually high amount of network bandwidth, we can determine if something has been infected,” said James Benson, a technology research analyst at the UTSA Institute for Cyber Security (ICS).

The Galahad software will be deployed to AWS and provides a nested hypervisor on AWS instances. There, it will monitor role-based virtual machines virtually across all levels of the application stack including the docker container: the basic unit of software that packages an application to run quickly between computing environments.

Galahad’s strengths include the use of migration, where cloud applications are dynamically moved to different hosts.

“It’s almost like frequency band hopping,” said Benson. “If your host is compromised in the AWS environment but you keep on moving, the malicious actor will only get snippets of you at most.”

Farhan Patwa, ICS assistant director and chief architect, added, “With Galahad, you’re now a moving target.” Patwa will oversee the deployment of Galahad at UTSA.

Galahad is one of four solutions built by industry through the sponsorship of the Intelligence Advanced Research Projects Activity (IARPA), a division of the Office of National Intelligence. UTSA, which is home to the nation’s top cybersecurity program, was selected to host Galahad to increase its adoption by the wider cyber defense research community.

In 2017, IARPA tapped industry leaders such as Star Lab Corp. to develop Virtuous User Environments (VirtUEs), a dynamic cloud-based environment that reduces threats while serving as a secure place to migrate government user applications. Star Lab developed Galahad and transitioned it to UTSA on at the end of May of this year for further development and research.

Now, researchers at UTSA are seeking other academic partners to make the system an advanced research platform. The UTSA researchers want to innovate additional protection capabilities in field areas such as user access control, privilege chains, decision engines, and blockchain or “smart contracts” that run distributed across different virtual machines. It’s believed that Galahad can also be leveraged toward better integration of IoT systems, and securing Linux operating systems and hypervisors, which make virtual machine computing environments a possibility.

“Galahad is here to be a research ecosystem,” said Patwa.

Like Arthur’s round table, Galahad will be a platform that seeks collaboration with those that are motivated by the single goal to run applications securely in the cloud.

###

Media Contact
Milady Nazir
[email protected]

Original Source

https://www.utsa.edu/today/2019/07/story/Galahad-Software.html

Tags: Computer ScienceInternetMultimedia/Networking/Interface DesignResearch/DevelopmentRobotry/Artificial IntelligenceSoftware EngineeringSystem Security/HackersTechnology TransferTechnology/Engineering/Computer Science
Share12Tweet8Share2ShareShareShare2

Related Posts

Five or more hours of smartphone usage per day may increase obesity

July 25, 2019
IMAGE

NASA’s terra satellite finds tropical storm 07W’s strength on the side

July 25, 2019

NASA finds one burst of energy in weakening Depression Dalila

July 25, 2019

Researcher’s innovative flood mapping helps water and emergency management officials

July 25, 2019
Please login to join discussion

POPULAR NEWS

  • Blind to the Burn

    Overlooked Dangers: Debunking Common Myths About Skin Cancer Risk in the U.S.

    60 shares
    Share 24 Tweet 15
  • Neuropsychiatric Risks Linked to COVID-19 Revealed

    49 shares
    Share 20 Tweet 12
  • Dr. Miriam Merad Honored with French Knighthood for Groundbreaking Contributions to Science and Medicine

    46 shares
    Share 18 Tweet 12
  • Study Reveals Beta-HPV Directly Causes Skin Cancer in Immunocompromised Individuals

    38 shares
    Share 15 Tweet 10

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Imaging and Surgery of Retroperitoneal Vascular Leiomyosarcoma

Low-Cost Liquid Optical Waveguide Boosts Augmented Reality

Predicting Colorectal Cancer Using Lifestyle Factors

  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.