Wrapup. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger.

Similar documents
Advanced Systems Security: Ordinary Operating Systems

CSE 565 Computer Security Fall 2018

Integrity Policies. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger.

CSE 544 Advanced Systems Security

Advanced Systems Security: Multics

CSE Computer Security

Secure Programming Techniques

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

Computer Security. 04r. Pre-exam 1 Concept Review. Paul Krzyzanowski. Rutgers University. Spring 2018

Advanced Systems Security: Integrity

CSE543 - Introduction to Computer and Network Security. Module: Operating System Security

Topics in Systems and Program Security

Advanced Systems Security: Security Goals

Access Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger.

Advanced Systems Security: Ordinary Operating Systems

Computer Security Course. Midterm Review

CIS433/533 - Introduction to Computer and Network Security. Access Control

Module: Spam and Wrapup. Professor Patrick McDaniel Fall CSE543 - Introduction to Computer and Network Security

Last time. Security Policies and Models. Trusted Operating System Design. Bell La-Padula and Biba Security Models Information Flow Control

Advanced Systems Security: Integrity

CSCI 420: Mobile Application Security. Lecture 7. Prof. Adwait Nadkarni. Derived from slides by William Enck, Patrick McDaniel and Trent Jaeger

Trusted Computing and O/S Security

Access Control. Discretionary Access Control

Advanced Systems Security: Principles

Protection and Security. Sarah Diesburg Operating Systems CS 3430

Lecture Embedded System Security Introduction to Trusted Computing

Department of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus

Advanced Systems Security: Integrity

Security Architecture

Trusted Computing and O/S Security. Aggelos Kiayias Justin Neumann

Old, New, Borrowed, Blue: A Perspective on the Evolution of Mobile Platform Security Architectures

Data Security and Privacy. Unix Discretionary Access Control

Lecture Embedded System Security Introduction to Trusted Computing

ViryaOS RFC: Secure Containers for Embedded and IoT. A proposal for a new Xen Project sub-project

Last time. User Authentication. Security Policies and Models. Beyond passwords Biometrics

Lecture 4 - Authorization

Mobile Platform Security Architectures A perspective on their evolution

CPSC 481/681 SPRING 2006 QUIZ #1 7 MAR 2006 NAME:

CSE543 - Computer and Network Security Module: Virtualization

CS 161 Computer Security

Lecture 7 - Applied Cryptography

Advanced Systems Security: Securing Commercial Systems

Systems View -- Current. Trustworthy Computing. TC Advantages. Systems View -- Target. Bootstrapping a typical PC. Boot Guarantees

Security Principles and Policies CS 136 Computer Security Peter Reiher January 15, 2008

Information Security: Principles and Practice Second Edition. Mark Stamp

CS 356 Lecture 7 Access Control. Spring 2013

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Operating Systems CMPSC 473. Introduction January 15, Lecture 1 Instructor: Trent Jaeger

CSE543 - Computer and Network Security Module: Intrusion Detection

CSE543 - Computer and Network Security Module: Intrusion Detection

Lecture 6 - Cryptography

Access control models and policies. Tuomas Aura T Information security technology

Operating System Security, Continued CS 136 Computer Security Peter Reiher January 29, 2008

Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006)

The Evolution of Secure Operating Systems

Advanced Systems Security: Principles

Administrative Details. CS 140 Final Review Session. Pre-Midterm. Plan For Today. Disks + I/O. Pre-Midterm, cont.

Virtual Machine Security

CSE 127: Computer Security. Security Concepts. Kirill Levchenko

CSE Computer Security

Module: Introduction. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

Lecture 3 MOBILE PLATFORM SECURITY

Information Security Theory vs. Reality

Symlink attacks. Do not assume that symlinks are trustworthy: Example 1

CSE Computer Security (Fall 2007)

SELinux Protected Paths Revisited

Access control models and policies

Module: Operating System Security. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

CIS 4360 Secure Computer Systems Applied Cryptography

Operating System Security: Building Secure Distributed Systems

CIS 5373 Systems Security

Computer Security. 10. Exam 2 Review. Paul Krzyzanowski. Rutgers University. Spring 2017

Protection and Security

19.1. Security must consider external environment of the system, and protect it from:

1. CyberCIEGE Advanced VPNs

Information Security CS 526

Management Information Systems. B15. Managing Information Resources and IT Security

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Advanced Systems Security: Virtual Machine Systems

DAC vs. MAC. Most people familiar with discretionary access control (DAC)

Access Control. Steven M. Bellovin September 13,

About Me. Office Hours: Tu 4-5, W 1-2, or by appointment Office: 346A IST Bldg

Lecture 3 - Passwords and Authentication

Dawn Song

Explicit Information Flow in the HiStar OS. Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières

Security for the Xen Hypervisor Status Quo & Perspective 2006

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski

RISCV with Sanctum Enclaves. Victor Costan, Ilia Lebedev, Srini Devadas

Advanced Systems Security: Virtual Machine Systems

Operating System Security

Confinement. Steven M. Bellovin November 1,

CIS 6930/4930 Computer and Network Security. Topic 6.2 Authentication Protocols

CSE Computer Security (Fall 2006)

Module: Cloud Computing Security

Outline. Operating System Security CS 239 Computer Security February 23, Introduction. Server Machines Vs. General Purpose Machines

CSE543 - Computer and Network Security Module: Virtualization

Malware, , Database Security

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Inevitable Failure: The Flawed Trust Assumption in the Cloud

Transcription:

Wrapup CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

Final 2 The final is on Tuesday, May 8, 8:00 in 160 Willard (here) Be late at your own peril (We may lock the door at 8:10) You will have the full time to take the test, but no more Coverage: Anything we talked about in class or appeared in the readings Mainly topics since mid-term Types of questions Constructive (here is scenario, design X and explain it) Philosophical (why does Z argue that ) Explanatory (what is the key tradeoff between A and B )

Prior Topics Terminology Any term defined in the early lectures Crypto Algorithms Diffie-Hellman and RSA Keys Crypto protocols Public key Secret key Integrity, Authenticity, Secrecy 3

Topics Since Midterm Code Security Access Control Principles UNIX Security Windows Security Trusted Computing Secrecy Integrity Intrusion Detection MAC systems Virtual machine systems 4

Code Security Problems Buffer overflows, printf, integer overflows, names, characters Considerations for writing and deploying secure code Validate input (prevent vulnerabilities) Minimize attack surface (number of points of potential vulnerabilities) Minimize permissions Safe transition of privilege via invocation Return little information Type safety Implications to attacks above 5

Access Control Principles Protection System Protection State State Enforcer Access Matrix Use it Variants (RBAC) Security guarantees from policies Protection and Security Know the difference Reference Monitor Know the guarantees Know how to apply them to other systems How does X satisfy RM guarantees? 6

UNIX and Windows Subjects UNIX: users; Windows: more complex Objects UNIX: files; Windows: more complex User Authentication Access Enforcement Process Implications for security Transitions UNIX: Setuid; Windows: Windows Services Constrained execution UNIX: chroot, nobody; Windows: Restricted contexts General vulnerabilities 7

Trusted Computing Palladium TPM Know the difference Mechanisms Protected Storage Attestation How TPM supports Boot guarantees 8

Secrecy and Integrity Secrecy Secrecy and security Multilevel security, Chinese Wall Security Secrecy properties Miscellaneous Trojan horses, covert channels Program secrecy (Denning) Integrity Integrity and security Biba and LOMAC Integrity realization Privilege separation 9

Intrusion Detection Anomaly and misuse detection Relation to access control Network and host IDS Positives/Negatives Bayes Rule Analysis 10

MAC Systems and VM Systems Relation to Reference Monitors Mandatory Access Control Multics Transitions (all) SELinux/LSM architecture Virtual Machine architectures VM principles Xen enforcement VM vs OS enforcement Java enforcement 11

The state of security 12 issues are in public consciousness Press coverage is increasing Losses mounting (billions and billions) Affect increasing (ATMs, commerce) What are we doing? sound and fury signifying nothing - W. Shakespeare (well, its not quite that bad)

The problems What is the root cause? Security is not a key goal and it never has been so, we need to figure out how to change the way we do engineering (and science) to make computers secure. Far too much misunderstanding about basic security and the use of technology This is also true physical security 13

The current solutions 14 Make better software we mean it - B. Gates (2002) no really - B. Gates (2003) Linux is bad too - B. Gates (2005) it s in longhorn... - B. Gates (2006) CERT/SANS-based problem/event tracking Experts tracking vulnerabilities Patch system completely broken Destructive research Back-pressure on product developers Arms-race with bad guys Problem: reactive, rather than proactive

The real solutions 15 Fix the economic incentive equation Eventually, MS/Sun/Apple/*** will be in enough pain that they change the way they make software Education Things will get better when people understand when how to use technology Fix engineering practices Design for security Apply technology What we have been talking about

The bottom line 16 The Web/Internet and new technologies are being limited by their ability to address security and privacy concerns it is incumbent in us as scientists to meet these challenges. Evangelize importance of security Provide sound technologies Define better practices

Thank You!!! 17 tjaeger@cse.psu.edu