SystemsSec 2016W Lecture 19: Difference between revisions
Line 61: | Line 61: | ||
o Most people should not worry about this sort of attack. There are so many other ways that an attacker can compromise you. | o Most people should not worry about this sort of attack. There are so many other ways that an attacker can compromise you. | ||
===IPhone case=== | |||
• The FBI dropped the case, the excuse they gave was that they did not need their help and had another way to do it | • The FBI dropped the case, the excuse they gave was that they did not need their help and had another way to do it |
Latest revision as of 18:55, 6 April 2016
Data Compression
• Compression and encryption can mess with each other • People can reconstruct VoIP depending on how it was compressed
Reading: Data Compression In Network Services
• Our paper was talking about “zip bombs” and they are everywhere o Compressed archive is trivial to send to a server, but it is computationally demanding on the receiving server to process o The decompression ties up resources o Can be used against an anti-virus, scan a zip file which decompresses and fills up memory so much it crashes o Attack uses lots of spaces, repeat the same data over and over o How do you make a zip bomb, without blowing yourself up? - Hand craft it or you only have to do it once and can then send it multiple times (do hard work once VS server must do it multiple times). • Did they report every piece of software they tested? o They did web, chat, and email (IMAP), but not SMTP...? o Probably because the results of SMTP wouldn't be interesting. - SMTP have spam filters and AV, so they could be vulnerable. - But email has been under attack for so long that email servers have been hardened over the years because of constant attacks. • DOS hasn't been used on the web as much because it is usually easy to counter thanks to the service providers. • Wasn't crazy scientific did not quantify the issue and the potential damage that could be done. o Instead just affirmed there was an issue. o Paper was published because the issue was not well recognised. Was published last August... • Denial of Service o Web servers - Web servers are under attack all the time. There are many resources and tools on how to mitigate DOS attacks against a web server. - How do you stop your web server from dying when web traffic gets a spike? • Use a content distribution network to mirror your content. Good for static content. Works okay for dynamic content. • If you are offering a service you have to build it to scale properly so it can run new instances to deal with the load. o Chat server - Chat server goes down. You can just use another one. o IMAP (private email server) - IMAP is attacked. You can't access email on that specific email client. • Compression is just one way to do DOS, there are many more. o Amplification attacks: Send packet to a public server that then sends multiple to a specific target. o Create Multiple Connection: In a SYN flood attack we send SYN packets to a TCP server to tie up resources by creating excessive connections. o etc... • This paper is really about resource management. o Right way to defend against this is to limit resources appropriately.
Reading: Thermal Covert Channels
• Not about attacking a system, but about exfiltrating data o IP over thermometers • Covert Channel: data stream that people do not know about • Why do we worry about these? o Data is either escaping or entering without our knowing. o Covert channels that people care about are usually ones that go through something that shouldn't be possible or channels that have high bandwidth. o How big is it? How much data can you pass through it? - ~12 bits per second • Why is this paper interesting? o The cloud o If processes share the same core, it is possible to get information from another process just from sharing that core o Temperature patterns can leak hash data o Get secret key from another machine through the temperature of a shared core o To keep secrecy put each machine on its own core • How usable is this threat? o ~12 bits per second o In the cloud, if it is CPU intensive than it is hard to use, however the machines don't usually do CPU intensive tasks all the time o Is a real covert channel, but not very useful right now for an attack o Very hard to get a secret key using this o In the future with higher resolution thermal sensors, the attack may be much more practical o Most people should not worry about this sort of attack. There are so many other ways that an attacker can compromise you.
IPhone case
• The FBI dropped the case, the excuse they gave was that they did not need their help and had another way to do it • A lot of people were against Apple in the polls. o A large amount of the population do not know the importance of encryption o Do not understand that a backdoor can both be abused by the government and other attackers • In Paris attacks there was no encryption used, they used burner phones instead