<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bradley</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bradley"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Bradley"/>
	<updated>2026-05-02T06:10:34Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_12&amp;diff=21520</id>
		<title>SystemsSec 2018W Lecture 12</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_12&amp;diff=21520"/>
		<updated>2018-02-15T18:12:08Z</updated>

		<summary type="html">&lt;p&gt;Bradley: /* Notes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;nowiki&amp;gt;Insert non-formatted text here&amp;lt;/nowiki&amp;gt;==Audio==&lt;br /&gt;
&lt;br /&gt;
[https://homeostasis.scs.carleton.ca/~soma/systemssec-2018w/lectures/comp4108-2018w-lec12-14Feb2018.m4a Lecture 12 Audio]&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
Potential Assignment Topics:&lt;br /&gt;
*Crypto&lt;br /&gt;
**What does it buy you?&lt;br /&gt;
**What can’t it do? &lt;br /&gt;
*Obfuscation&lt;br /&gt;
*Memory corruption&lt;br /&gt;
*Logic errors&lt;br /&gt;
*Back doors&lt;br /&gt;
*Certificates&lt;br /&gt;
&lt;br /&gt;
SQL Injections&lt;br /&gt;
*Query is unsanitized &lt;br /&gt;
&lt;br /&gt;
In the browser what interpreters do we have?&lt;br /&gt;
*Javascript&lt;br /&gt;
*HTML&lt;br /&gt;
*CSS&lt;br /&gt;
&lt;br /&gt;
What does it mean to exploit it? &lt;br /&gt;
*To use a vulnerability to your advantage&lt;br /&gt;
&lt;br /&gt;
In the webpage, there are all kinds of content.  There are advertisements, search bars, twitter feeds, facebook like buttons, etc.  &lt;br /&gt;
&lt;br /&gt;
Everything on a webpage has access to the document object model. &lt;br /&gt;
&lt;br /&gt;
Setuid programs -&amp;gt; How much do you have to trust?&lt;br /&gt;
&lt;br /&gt;
Anyone that you allow to become root can do way too much. &lt;br /&gt;
&lt;br /&gt;
Sammy Attack:&lt;br /&gt;
*Happened during the days of myspace&lt;br /&gt;
*Forces users to send samy a friend request&lt;br /&gt;
*Harmless&lt;br /&gt;
&lt;br /&gt;
In the comment section, there is a possibility of malicious code. &lt;br /&gt;
&lt;br /&gt;
CSRF&lt;br /&gt;
*Have the victim visit a random webpage &lt;br /&gt;
*Have the ability to make your web browser do all sorts of network traffic &lt;br /&gt;
&lt;br /&gt;
You can pull any arbitrary content over the internet and stick it into a webpage. &lt;br /&gt;
&lt;br /&gt;
Cookies:&lt;br /&gt;
*Stored on the web browser &lt;br /&gt;
*Remembers information about the person browsing the website&lt;br /&gt;
&lt;br /&gt;
Some websites let you stay logged in for a long time.  Some don’t. &lt;br /&gt;
&lt;br /&gt;
XML HTTP Request -&amp;gt; Developed by microsoft&lt;br /&gt;
&lt;br /&gt;
Why did microsoft do this? &lt;br /&gt;
*Outlook client access &lt;br /&gt;
&lt;br /&gt;
What people want to do with the web impacts security design. &lt;br /&gt;
&lt;br /&gt;
Can you embed arbitrary html in facebook? -&amp;gt; No&lt;br /&gt;
&lt;br /&gt;
Either you filter out the bad things, or you escape the bad things. &lt;br /&gt;
&lt;br /&gt;
How can we minimize people from running code on your web browser?&lt;br /&gt;
*Idea of least privilege&lt;br /&gt;
&lt;br /&gt;
Same Origin Policy &lt;br /&gt;
*The only person that is allowed to get access to your web browser is the origin server. &lt;br /&gt;
&lt;br /&gt;
CSP&lt;br /&gt;
*Prevents stuff from coming from arbitrary sources&lt;br /&gt;
*It does not help with you visiting untrusted sources &lt;br /&gt;
*Keeps a list of who is trusted and who is not trusted &lt;br /&gt;
&lt;br /&gt;
Web browsers -&amp;gt; The modern operating system &lt;br /&gt;
&lt;br /&gt;
Web browsers have a different trust model than the operating system does.&lt;br /&gt;
&lt;br /&gt;
Web browsers sandboxes code&lt;br /&gt;
&lt;br /&gt;
Phone operating systems:&lt;br /&gt;
*Deal with similar threat model to the web &lt;br /&gt;
&lt;br /&gt;
IOS strategy for dealing with threats:&lt;br /&gt;
*Sandbox the hell out of everything &lt;br /&gt;
&lt;br /&gt;
Android Model:&lt;br /&gt;
*Access control using capabilities list &lt;br /&gt;
&lt;br /&gt;
Everytime you install an app on android, it would need to do a security analysis.  You would get questions regarding your current location, camera access, microphone access, etc.  Why does it do that?  For advertisement content. &lt;br /&gt;
&lt;br /&gt;
Snaps and flat packs&lt;br /&gt;
*Standards for packaging linux applications to run on systems. &lt;br /&gt;
*They also include sandboxing&lt;br /&gt;
&lt;br /&gt;
If you want to run skype on your linux system, you can get a “snap” for it.  But you have to install it on classic mode. &lt;br /&gt;
&lt;br /&gt;
How are you going to make sure that you are going to be provided with safety while running untrusted code?&lt;br /&gt;
*Access control&lt;br /&gt;
*Sandboxing&lt;br /&gt;
&lt;br /&gt;
Usability of security systems &lt;br /&gt;
&lt;br /&gt;
Questions:&lt;br /&gt;
*What can we do to restrict people from putting arbitrary code onto the website you are visiting? &lt;br /&gt;
*What is browser exploit? How do we prevent it?&lt;br /&gt;
*What is the program with fine grained permissions?&lt;/div&gt;</summary>
		<author><name>Bradley</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_12&amp;diff=21519</id>
		<title>SystemsSec 2018W Lecture 12</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_12&amp;diff=21519"/>
		<updated>2018-02-15T18:09:08Z</updated>

		<summary type="html">&lt;p&gt;Bradley: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;nowiki&amp;gt;Insert non-formatted text here&amp;lt;/nowiki&amp;gt;==Audio==&lt;br /&gt;
&lt;br /&gt;
[https://homeostasis.scs.carleton.ca/~soma/systemssec-2018w/lectures/comp4108-2018w-lec12-14Feb2018.m4a Lecture 12 Audio]&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
Potential Assignment Topics:&lt;br /&gt;
Crypto&lt;br /&gt;
What does it buy you?&lt;br /&gt;
What can’t it do? &lt;br /&gt;
Obfuscation&lt;br /&gt;
Memory corruption&lt;br /&gt;
Logic errors&lt;br /&gt;
Back doors&lt;br /&gt;
Certificates&lt;br /&gt;
&lt;br /&gt;
SQL Injections&lt;br /&gt;
Query is unsanitized &lt;br /&gt;
&lt;br /&gt;
In the browser what interpreters do we have?&lt;br /&gt;
Javascript&lt;br /&gt;
HTML&lt;br /&gt;
CSS&lt;br /&gt;
&lt;br /&gt;
What does it mean to exploit it? &lt;br /&gt;
To use a vulnerability to your advantage&lt;br /&gt;
&lt;br /&gt;
In the webpage, there are all kinds of content.  There are advertisements, search bars, twitter feeds, facebook like buttons, etc.  &lt;br /&gt;
&lt;br /&gt;
Everything on a webpage has access to the document object model. &lt;br /&gt;
&lt;br /&gt;
Setuid programs -&amp;gt; How much do you have to trust?&lt;br /&gt;
&lt;br /&gt;
Anyone that you allow to become root can do way too much. &lt;br /&gt;
&lt;br /&gt;
Sammy Attack:&lt;br /&gt;
Happened during the days of myspace&lt;br /&gt;
Forces users to send samy a friend request&lt;br /&gt;
Harmless&lt;br /&gt;
&lt;br /&gt;
In the comment section, there is a possibility of malicious code. &lt;br /&gt;
&lt;br /&gt;
CSRF&lt;br /&gt;
Have the victim visit a random webpage &lt;br /&gt;
Have the ability to make your web browser do all sorts of network traffic &lt;br /&gt;
&lt;br /&gt;
You can pull any arbitrary content over the internet and stick it into a webpage. &lt;br /&gt;
&lt;br /&gt;
Cookies:&lt;br /&gt;
Stored on the web browser &lt;br /&gt;
Remembers information about the person browsing the website&lt;br /&gt;
&lt;br /&gt;
Some websites let you stay logged in for a long time.  Some don’t. &lt;br /&gt;
&lt;br /&gt;
XML HTTP Request -&amp;gt; Developed by microsoft&lt;br /&gt;
&lt;br /&gt;
Why did microsoft do this? &lt;br /&gt;
Outlook client access &lt;br /&gt;
&lt;br /&gt;
What people want to do with the web impacts security design. &lt;br /&gt;
&lt;br /&gt;
Can you embed arbitrary html in facebook? -&amp;gt; No&lt;br /&gt;
&lt;br /&gt;
Either you filter out the bad things, or you escape the bad things. &lt;br /&gt;
&lt;br /&gt;
How can we minimize people from running code on your web browser?&lt;br /&gt;
Idea of least privilege&lt;br /&gt;
&lt;br /&gt;
Same Origin Policy &lt;br /&gt;
The only person that is allowed to get access to your web browser is the origin server. &lt;br /&gt;
&lt;br /&gt;
CSP&lt;br /&gt;
Prevents stuff from coming from arbitrary sources&lt;br /&gt;
It does not help with you visiting untrusted sources &lt;br /&gt;
Keeps a list of who is trusted and who is not trusted &lt;br /&gt;
&lt;br /&gt;
Web browsers -&amp;gt; The modern operating system &lt;br /&gt;
&lt;br /&gt;
Web browsers have a different trust model than the operating system does.&lt;br /&gt;
&lt;br /&gt;
Web browsers sandboxes code&lt;br /&gt;
&lt;br /&gt;
Phone operating systems:&lt;br /&gt;
Deal with similar threat model to the web &lt;br /&gt;
&lt;br /&gt;
IOS strategy for dealing with threats:&lt;br /&gt;
Sandbox the hell out of everything &lt;br /&gt;
&lt;br /&gt;
Android Model:&lt;br /&gt;
Access control using capabilities list &lt;br /&gt;
&lt;br /&gt;
Everytime you install an app on android, it would need to do a security analysis.  You would get questions regarding your current location, camera access, microphone access, etc.  Why does it do that?  For advertisement content. &lt;br /&gt;
&lt;br /&gt;
Snaps and flat packs&lt;br /&gt;
Standards for packaging linux applications to run on systems. &lt;br /&gt;
They also include sandboxing&lt;br /&gt;
&lt;br /&gt;
If you want to run skype on your linux system, you can get a “snap” for it.  But you have to install it on classic mode. &lt;br /&gt;
&lt;br /&gt;
How are you going to make sure that you are going to be provided with safety while running untrusted code?&lt;br /&gt;
Access control&lt;br /&gt;
Sandboxing&lt;br /&gt;
&lt;br /&gt;
Usability of security systems &lt;br /&gt;
&lt;br /&gt;
Questions:&lt;br /&gt;
What can we do to restrict people from putting arbitrary code onto the website you are visiting? &lt;br /&gt;
What is browser exploit? How do we prevent it?&lt;br /&gt;
What is the program with fine grained permissions?&lt;/div&gt;</summary>
		<author><name>Bradley</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_12&amp;diff=21518</id>
		<title>SystemsSec 2018W Lecture 12</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2018W_Lecture_12&amp;diff=21518"/>
		<updated>2018-02-15T18:08:06Z</updated>

		<summary type="html">&lt;p&gt;Bradley: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Audio==&lt;br /&gt;
&lt;br /&gt;
[https://homeostasis.scs.carleton.ca/~soma/systemssec-2018w/lectures/comp4108-2018w-lec12-14Feb2018.m4a Lecture 12 Audio]&lt;br /&gt;
&lt;br /&gt;
==Notes==&lt;br /&gt;
&lt;br /&gt;
Potential Assignment Topics:&lt;br /&gt;
Crypto&lt;br /&gt;
What does it buy you?&lt;br /&gt;
What can’t it do? &lt;br /&gt;
Obfuscation&lt;br /&gt;
Memory corruption&lt;br /&gt;
Logic errors&lt;br /&gt;
Back doors&lt;br /&gt;
Certificates&lt;br /&gt;
&lt;br /&gt;
SQL Injections&lt;br /&gt;
Query is unsanitized &lt;br /&gt;
&lt;br /&gt;
In the browser what interpreters do we have?&lt;br /&gt;
Javascript&lt;br /&gt;
HTML&lt;br /&gt;
CSS&lt;br /&gt;
&lt;br /&gt;
What does it mean to exploit it? &lt;br /&gt;
To use a vulnerability to your advantage&lt;br /&gt;
&lt;br /&gt;
In the webpage, there are all kinds of content.  There are advertisements, search bars, twitter feeds, facebook like buttons, etc.  &lt;br /&gt;
&lt;br /&gt;
Everything on a webpage has access to the document object model. &lt;br /&gt;
&lt;br /&gt;
Setuid programs -&amp;gt; How much do you have to trust?&lt;br /&gt;
&lt;br /&gt;
Anyone that you allow to become root can do way too much. &lt;br /&gt;
&lt;br /&gt;
Sammy Attack:&lt;br /&gt;
Happened during the days of myspace&lt;br /&gt;
Forces users to send samy a friend request&lt;br /&gt;
Harmless&lt;br /&gt;
&lt;br /&gt;
In the comment section, there is a possibility of malicious code. &lt;br /&gt;
&lt;br /&gt;
CSRF&lt;br /&gt;
Have the victim visit a random webpage &lt;br /&gt;
Have the ability to make your web browser do all sorts of network traffic &lt;br /&gt;
&lt;br /&gt;
You can pull any arbitrary content over the internet and stick it into a webpage. &lt;br /&gt;
&lt;br /&gt;
Cookies:&lt;br /&gt;
Stored on the web browser &lt;br /&gt;
Remembers information about the person browsing the website&lt;br /&gt;
&lt;br /&gt;
Some websites let you stay logged in for a long time.  Some don’t. &lt;br /&gt;
&lt;br /&gt;
XML HTTP Request -&amp;gt; Developed by microsoft&lt;br /&gt;
&lt;br /&gt;
Why did microsoft do this? &lt;br /&gt;
Outlook client access &lt;br /&gt;
&lt;br /&gt;
What people want to do with the web impacts security design. &lt;br /&gt;
&lt;br /&gt;
Can you embed arbitrary html in facebook? -&amp;gt; No&lt;br /&gt;
&lt;br /&gt;
Either you filter out the bad things, or you escape the bad things. &lt;br /&gt;
&lt;br /&gt;
How can we minimize people from running code on your web browser?&lt;br /&gt;
Idea of least privilege&lt;br /&gt;
&lt;br /&gt;
Same Origin Policy &lt;br /&gt;
The only person that is allowed to get access to your web browser is the origin server. &lt;br /&gt;
&lt;br /&gt;
CSP&lt;br /&gt;
Prevents stuff from coming from arbitrary sources&lt;br /&gt;
It does not help with you visiting untrusted sources &lt;br /&gt;
Keeps a list of who is trusted and who is not trusted &lt;br /&gt;
&lt;br /&gt;
Web browsers -&amp;gt; The modern operating system &lt;br /&gt;
&lt;br /&gt;
Web browsers have a different trust model than the operating system does.&lt;br /&gt;
&lt;br /&gt;
Web browsers sandboxes code&lt;br /&gt;
&lt;br /&gt;
Phone operating systems:&lt;br /&gt;
Deal with similar threat model to the web &lt;br /&gt;
&lt;br /&gt;
IOS strategy for dealing with threats:&lt;br /&gt;
Sandbox the hell out of everything &lt;br /&gt;
&lt;br /&gt;
Android Model:&lt;br /&gt;
Access control using capabilities list &lt;br /&gt;
&lt;br /&gt;
Everytime you install an app on android, it would need to do a security analysis.  You would get questions regarding your current location, camera access, microphone access, etc.  Why does it do that?  For advertisement content. &lt;br /&gt;
&lt;br /&gt;
Snaps and flat packs&lt;br /&gt;
Standards for packaging linux applications to run on systems. &lt;br /&gt;
They also include sandboxing&lt;br /&gt;
&lt;br /&gt;
If you want to run skype on your linux system, you can get a “snap” for it.  But you have to install it on classic mode. &lt;br /&gt;
&lt;br /&gt;
How are you going to make sure that you are going to be provided with safety while running untrusted code?&lt;br /&gt;
Access control&lt;br /&gt;
Sandboxing&lt;br /&gt;
&lt;br /&gt;
Usability of security systems &lt;br /&gt;
&lt;br /&gt;
Questions:&lt;br /&gt;
What can we do to restrict people from putting arbitrary code onto the website you are visiting? &lt;br /&gt;
What is browser exploit? How do we prevent it?&lt;br /&gt;
What is the program with fine grained permissions?&lt;/div&gt;</summary>
		<author><name>Bradley</name></author>
	</entry>
</feed>