The Security Problem

Similar documents
Language-Based Protection

Chapter 15: Security. Operating System Concepts 8 th Edition,

Chapter 14: Security. Operating System Concepts Essentials 8 th Edition

Chapter 15: Security. Chapter 15: Security

Chapter 15: Security. Operating System Concepts 9 th Edition

Security. Reading: Chapter 15, [OSC] (except Section 15.9)

19.1. Security must consider external environment of the system, and protect it from:

Module 20: Security. The Security Problem Authentication Program Threats System Threats Threat Monitoring Encryption. Operating System Concepts 20.

System and Network Security

Protection and Security

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. Lecture 14: Security. 5 March,

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

CIS 21 Final Study Guide. Final covers ch. 1-20, except for 17. Need to know:

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

(2½ hours) Total Marks: 75

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Chapter 19 Security. Chapter 19 Security

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

CHAPTER 8 SECURING INFORMATION SYSTEMS

e-commerce Study Guide Test 2. Security Chapter 10

Security and Authentication

Systems and Network Security (NETW-1002)

INF3700 Informasjonsteknologi og samfunn. Application Security. Audun Jøsang University of Oslo Spring 2015

Cryptography MIS

CS 43: Computer Networks Security. Kevin Webb Swarthmore College December 7, 2017

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

CS System Security 2nd-Half Semester Review

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

CS System Security Mid-Semester Review

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following:

CTS2134 Introduction to Networking. Module 08: Network Security

L13. Reviews. Rocky K. C. Chang, April 10, 2015

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to share so many secrets?!?

Network Security Issues and Cryptography

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Verteilte Systeme (Distributed Systems)

Chapter 10: Security and Ethical Challenges of E-Business

Introduction and Overview. Why CSCI 454/554?

Protection and Security. Sarah Diesburg Operating Systems CS 3430

Protection and Security

From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design. Edition 4 Pearson Education 2005

Computer Security: Principles and Practice

The Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes

Network Security Fundamentals

Security Threats: Network Based Attacks

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Control Flow Hijacking Attacks. Prof. Dr. Michael Backes

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Introduction to Security. Computer Networks Term A15

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

CS Paul Krzyzanowski

Computer Security Exam 2 Review. Paul Krzyzanowski. Rutgers University. Spring 2018

Hacking Terminology. Mark R. Adams, CISSP KPMG LLP

CS Final Exam

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY 2 Mark Questions & Answers

Full file at

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Protection. Disclaimer: some slides are adopted from book authors slides with permission 1

Copyright

Most Common Security Threats (cont.)

Technology in Action

Computer Security. 10. Exam 2 Review. Paul Krzyzanowski. Rutgers University. Spring 2017

KALASALINGAM UNIVERSITY

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Last time. Trusted Operating System Design. Security in Networks. Security Features Trusted Computing Base Least Privilege in Popular OSs Assurance

Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing. International Standard Book Number:

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

Cipher Suite Configuration Mode Commands

CS 333 Introduction to Operating Systems Class 19 - Security

Malware, , Database Security

E-Commerce Security Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al.

Public Key Cryptography

CIS 4360 Secure Computer Systems Symmetric Cryptography

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

1-7 Attacks on Cryptosystems

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Cryptographic Concepts

ISO/IEC Common Criteria. Threat Categories

Home Computer and Internet User Security

Access Controls. CISSP Guide to Security Essentials Chapter 2

Securing Information Systems

Define information security Define security as process, not point product.

Cyber Security Practice Questions. Varying Difficulty

Securing Information Systems

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Overview. SSL Cryptography Overview CHAPTER 1

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

SE420 Software Quality Assurance

Roadmap. Tevfik Koşar. CSC Operating Systems Spring Lecture - XII Main Memory - II. Louisiana State University

Cybersecurity glossary. Please feel free to share this.

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

Authentication Part IV NOTE: Part IV includes all of Part III!

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao

Transcription:

CSC 4103 - Operating Systems Spring 2007 Lecture - XX Protection and Security Tevfik Koşar Louisiana State University April 12 th, 2007 1 The Security Problem Security must consider external environment of the system, and protect the system resources Intruders (crackers) attempt to breach security Threat is potential security violation Attack is attempt to breach security Attack can be accidental or malicious Easier to protect against accidental than malicious misuse

Security Violations Categories Breach of confidentiality (information theft, identity theft) Breach of integrity (unauthorized modification of data) Breach of availability (unauthorized destruction of data ) Theft of service (unauthorized use of resources) Denial of service (crashing web servers) Methods Masquerading (breach authentication) Pretending to be somebody else Replay attack (message modification) Repeating a valid data transmission (eg. Money transfer) May include message modification Session hijacking The act of intercepting an active communication session Man-in-the-middle attack Masquerading both sender and receiver by intercepting messages Standard Security Attacks

Security Measure Levels Security must occur at four levels to be effective: Physical Human Avoid social engineering, phishing, dumpster diving Operating System Network Security is as week as the weakest chain Program Threats Trojan Horse Code segment that misuses its environment Exploits mechanisms for allowing programs written by users to be executed by other users Spyware, pop-up browser windows, covert channels Trap Door Specific user identifier or password that circumvents normal security procedures Could be included in a compiler Logic Bomb Program that initiates a security incident under certain circumstances Stack and Buffer Overflow Exploits a bug in a program (overflow either the stack or memory buffers)

C Program with Buffer-overflow Condition #include <stdio.h> #define BUFFER SIZE 256 int main(int argc, char *argv[]) { char buffer[buffer SIZE]; if (argc < 2) return -1; else { strcpy(buffer,argv[1]); return 0; } } Layout of Typical Stack Frame

Modified Shell Code #include <stdio.h> int main(int argc, char *argv[]) { execvp( \bin\sh, \bin\sh, NULL); return 0; } Hypothetical Stack Frame Before attack After attack

Program Threats (Cont.) Viruses Code fragment embedded in legitimate program Very specific to CPU architecture, operating system, applications Usually borne via email or as a macro Visual Basic Macro to reformat hard drive Sub AutoOpen() Dim ofs Set ofs = CreateObject( Scripting.FileSystemObject ) vs = Shell( c:command.com /k format c:,vbhide) End Sub Program Threats (Cont.) Virus dropper inserts virus onto the system Many categories of viruses, literally many thousands of viruses: File (appends itself to a file, changes start pointer, returns to original code) Boot (writes to the boot sector, gets exec before OS) Macro (runs as soon as document containing macro is opened) Source code (modifies existing source codes to spread) Polymorphic (changes each time to prevent detection) Encrypted (first decrypts, then executes) Stealth (modify parts of the system to prevent detection, eg read system call) Tunneling (installs itself as interrupt handler or device driver) Multipartite (can infect multiple pars of the system, eg. Memory, bootsector, files) Armored (hidden and compressed virus files) Browser virus, keystroke logger..etc

A Boot-sector Computer Virus System and Network Threats Worms use spawn mechanism; standalone program Internet worm (Robert Morris, 1998, Cornell) Exploited UNIX networking features (remote access) and bugs in finger and sendmail programs Grappling hook program uploaded main worm program Port scanning Automated attempt to connect to a range of ports on one or a range of IP addresses Denial of Service Overload the targeted computer preventing it from doing any useful work Distributed denial-of-service (DDOS) come from multiple sites at once

The Morris Internet Worm Cryptography as a Security Tool Broadest security tool available Source and destination of messages cannot be trusted without cryptography Means to constrain potential senders (sources) and / or receivers (destinations) of messages Based on secrets (keys)

Secure Communication over Insecure Medium Encryption Encryption algorithm consists of Set of K keys Set of M Messages Set of C ciphertexts (encrypted messages) A function E : K (M C). That is, for each k K, E(k) is a function for generating ciphertexts from messages. A function D : K (C M). That is, for each k K, D(k) is a function for generating messages from ciphertexts. An encryption algorithm must provide this essential property: Given a ciphertext c C, a computer can compute m such that E(k)(m) = c only if it possesses D(k). Thus, a computer holding D(k) can decrypt ciphertexts to the plaintexts used to produce them, but a computer not holding D(k) cannot decrypt ciphertexts. Since ciphertexts are generally exposed (for example, sent on the network), it is important that it be infeasible to derive D(k) from the ciphertexts

Symmetric Encryption Same key used to encrypt and decrypt E(k) can be derived from D(k), and vice versa DES is most commonly used symmetric block-encryption algorithm (created by US Govt) Encrypts a block of data at a time (64 bit messages, with 56 bit key) Triple-DES considered more secure (repeat DES three times with three different keys) Advanced Encryption Standard (AES) replaces DES Key length upto 256 bits, working on 128 bit blocks Twofish, RC4, RC5.. other symmetric algorithms RC4 is most common symmetric stream cipher (works on bits, not blocks), but known to have vulnerabilities Encrypts/decrypts a stream of bytes (i.e wireless transmission, web browsers) Key is a input to psuedo-random-bit generator Generates an infinite keystream Asymmetric Encryption Encryption and decryption keys are different Public-key encryption based on each user having two keys: public key published key used to encrypt data private key key known only to individual user used to decrypt data Must be an encryption scheme that can be made public without making it easy to figure out the decryption scheme Most common is RSA (Rivest, Shamir, Adleman) block cipher

Encryption and Decryption using RSA Asymmetric Cryptography Any Questions? Hmm.. 22

Reading Assignment Read chapter 14 and 15 from Silberschatz. 23 Acknowledgements Operating Systems Concepts book and supplementary material by Silberschatz, Galvin and Gagne. 24