SystemsSec 2018W Lecture 1: Difference between revisions

From Soma-notes
No edit summary
Yannick (talk | contribs)
 
(7 intermediate revisions by 2 users not shown)
Line 3: Line 3:


== About the course: ==
== About the course: ==
Lectures will not be posted online.
Attendance is strongly recommended as lectures will not be posted online (only the wiki notes will be posted online).
 
Notes will be posted online.


In order to succeed, you need to come to class. Things will be discussed, and you need to be present.
In order to succeed, you need to come to class. Things will be discussed, and you need to be present.


* Grading Criteria
=== Grading Criteria ===
** Midterm 20%
* 20% Midterm
** Final 30%
* 30% Final
** Participation 10%
* 10% Participation
** Experiences 20%
* 20% Experiences
** Assignments (4) 20%
* 20% Assignments (4)


The midterm and final will basically be short answer, possibly with some essay questions.


The assignments will be in the style of the midterm and final, and will let you know how prepared you are for the exams. 2 assignments before the midterm and 2 after the midterm.
==== Midterm & Final ====
Short answer questions, possibly a few long-answer questions.


Participation – being present, taking notes for the class, raising your hand, discussing things (not purely in class, also there will be a slack instance).


If for some reason participation will be a problem for you, email the professor now to work it out)
==== Participation ====
Being present in the classroom, taking notes for the class, raising your hand, discussing things. There is also a slack instance ([https://join.slack.com/t/cucomp4108/shared_invite/enQtMjk2OTM0MTUwNjI0LTQ2MDExODYwMjliOTAxZWFjZjU0ZmM3M2U4NjFlYjRjY2UzZTgyM2QyNmQ5MTBiNTU1ZDVmOGFiNzYxMGNiOTc click here to join]) that you can participate in.


Experiences – in 2 portions reading and tools
If for some reason participation will be a problem for you, email the professor now to work it out.


Reading – submit a reading response. Make a diligent effort to understand the reading before coming to class. Not a summary. What was your interaction with the reading?


Tools – Computer Systems Security is fundamentally an applied field. It is tied to tools. Applied learning is important. Some exercises will be provided, but other things you will come across yourself (ie try to set up a firewall, or play around with iptables, you don’t have to succeed). Write a tool response. Plan on sitting down a couple of times and doing some hacking. It is important to get your hands dirty. To start, pick something that you can handle, and maybe ramp it up as the term goes along.
==== Experiences ====
There are 2 portions to the experiences section, reading and tools.


Assignments will be submitted through CULearn.
'''Readings''' – Make a diligent effort to understand the reading before coming to class. Not a summary. What was your interaction with the reading? What are your thoughts about the material covered? Did you have any difficulties following along?


== The material covered today: ==
'''Tools''' – Computer Systems Security is fundamentally an applied field. It is tied to tools. Applied learning is important. Some exercises will be provided, but other things you will come across yourself (ie, try to set up a firewall, or play around with iptables, you don’t have to succeed). Write a tool response. Plan on sitting down a couple of times and doing some hacking. It is important to get your hands dirty. To start, pick something that you can handle, and maybe ramp it up as the term goes along.
In the news recently: Meltdown and Spectre security flaws


Meltdown in the Intel version, Spectre is the more general version.


Basically every modern CPU that has high performance is affected
==== Assignments ====
The assignments will be in the style of the midterm and final, and will let you know how prepared you are for the exams. There will be two assignments before the midterm and two more after the midterm. They will be submitted through CULearn.


Problem with processor design.
== The material covered today: ==
In the news recently: Meltdown and Spectre security flaws


Design strategy used to increase performance in modern processors allows for information leakage.
[[File:xkcd_meltdown_and_spectre.png|thumb|right|Source ''[https://m.xkcd.com/1938/ xkcd]'']]


Software programs and processes don't trust each other (and they shouldn't), but this flaw means that the barriers between them aren't fixed, you can read across them.
Meltdown in the Intel version, Spectre is the more general version. Basically every modern CPU that has high performance is affected, stems from a problem with processor design in which the strategy used to increase performance in modern processors allows for information leakage.


It is a timing attack. The basis of timing attacks is that the time to compute depends on the data that you are computing. By knowing how long something takes to compute, you can figure out what is being computed.  
Inherently, software programs and processes don't trust each other (and they shouldn't), but this flaw means that the barriers between them aren't fixed and that you can potentially read across them.  


There was previously a well known timing attack on public key encryption, which was solved by responding to all requests in the same constant time.
This is a [https://en.wikipedia.org/wiki/Timing_attack timing attack], the basis of these attacks is that the time to compute depends on the data that you are computing. By knowing how long something takes to compute you can figure out what is being computed. There was previously a well known timing attack on public key encryption, which was solved by responding to all requests in the same constant time.


Meltdown and Spectre exploit branch predictors (ie, the processor speculates at which branch of the code will be run next and “runs ahead”. If it predicts correctly, there is a performance advantage). However, flaws were found that enabled kernel memory to be read, or a virtual machine to read data from another virtual machine running on the same processor. This particularly affects cloud computing.
Meltdown and Spectre exploit branch predictors (ie, the processor speculates at which branch of the code will be run next and “runs ahead”. If it predicts correctly, there is a performance advantage). However, flaws were found that enabled kernel memory to be read, or a virtual machine to read data from another virtual machine running on the same processor. This particularly affects cloud computing.


These types of flaws come because no one was thinking about the design from a security point of view.  
These types of flaws come about because no one was thinking about the design from a security point of view.  


System Security is difficult. Attackers find flaws, defenders try to fix them. This happens in real systems, with enormous complexity. Theoretically we can design perfectly secure systems, but attackers will keep finding flaws. This game, as it is today, is weighted towards attackers. Rebalancing the game would require radical ideas.
System Security is difficult. Attackers find flaws, defenders try to fix them. This happens in real systems, with enormous complexity. Theoretically we can design perfectly secure systems, but attackers will keep finding flaws. This game, as it is today, is weighted towards attackers. Re-balancing the game would require radical ideas.


=== A (noncomprehensive) list of some security tools and methods: ===
=== A (noncomprehensive) list of some security tools and methods: ===
*The purpose of this list is to show what a vast area computer security is, not making a list of everything that will be covered.
The purpose of this list is to show what a vast area computer security is, not making a list of everything that will be covered.
**Firewalls
*Firewalls
**Antivirus/Antimalware
*Antivirus/Antimalware
**Network monitoring/NIDS
*Network monitoring/NIDS
**Reverse engineering.
*Reverse engineering.
**Cryptography (encryption/digital signing) (for system security, encryption is a tool of last resort)
*Cryptography (encryption/digital signing) (for system security, encryption is a tool of last resort)
**Air gaps
*Air gaps
**Social Engineering
*Social Engineering
**(D)DoS
*(D)DoS
**White list
*White list
**Black list
*Black list
**One way info-gate
*One way info-gate
**Virtual machines
*Virtual machines
**Encapsulation
*Encapsulation
**Virtual memory
*Virtual memory
**Formal verification
*Formal verification
**Randomization (ASLR)
*Randomization (ASLR)
**Passwords
*Passwords
**Captchas
*Captchas
**Biometrics
*Biometrics
**Location monitoring
*Location monitoring
**Mandatory access control (ie SELinux, very inconvenient)
*Mandatory access control (ie SELinux, very inconvenient)
**Discretionary access control (traditional Unix, Windows…)
*Discretionary access control (traditional Unix, Windows…)
**Automatic memory management (garbage collection)
*Automatic memory management (garbage collection)
**Static analysis
*Static analysis
**Dynamic analysis
*Dynamic analysis
 
Security can affect just about any area of computer science. If there I a branch that doesn’t appear to be affected by security, someone just hasn’t thought about it for long enough.
 
This course isn’t about a specific tool or method, although many will be touched on. Primarily, we want to look at how to think about problems so that you see security issues. What can I do as an attacker? What can I do as a defender.
 
There are always benefits and costs to any security decision, By strengthening security in one way, you can weaken it in another.


For example, if you can’t risk lockouts and downtime, having passwords could cause problems.
Security can affect just about any area of computer science. If there is a branch that doesn’t appear to be affected by security, it's because someone just hasn’t thought about it for long enough. This course isn’t about a specific tool or method, although many will be touched on. Primarily, we want to look at how to think about problems so that you see security issues. What can I do as an attacker? What can I do as a defender.


If you make usability too difficult, users can find ways to bypass your security measures. Security is always a secondary concern. The primary concerns of users are the tasks that they are using the computer systems to complete.
There are always benefits and costs to any security decision, by strengthening security in one way, you can weaken it in another. This is important if you can’t risk lockouts and downtime, where having passwords could cause problems. For example, the US Air Force had all the nuke codes set to 0000000...


The most secure system is one that is off, in a locked room in a secure facility. However, that system is also completely useless.
If you make usability too difficult, users can (and will) find ways to bypass your security measures. Security is always a secondary concern. The primary concerns of users are the tasks that they are using the computer systems to complete. The most secure system is one that is off, in a locked room in a secure facility. However, that system is also completely useless.


Even if you do not become a computer security professional, you will design systems and make decisions that have security implications.
Even if you do not become a computer security professional, you will design systems and make decisions that have security implications.
Line 108: Line 100:
***analyzing defenses
***analyzing defenses
****If you can figure out how it works, then you can find weaknesses and exploit them.
****If you can figure out how it works, then you can find weaknesses and exploit them.
You become an expert safecracker by learning about safes. In order to find flaws in systems you must have a deep knowledge of those systems. What an attacker wishes to attack he must master, and by finding the flaw, the attacker '''proves his knowledge'''. It is like solving a puzzle. That is what drives the people developing these attacks. The negative impacts are often secondary.
You become an expert safecracker by learning about safes. In order to find flaws in systems, you must have a deep knowledge of those systems. What an attacker wishes to attack he must master, and by finding the flaw, the attacker '''proves his knowledge'''. It is like solving a puzzle. That is what drives the people developing these attacks. The negative impacts are often secondary.


**Defenders
**Defenders
Line 126: Line 118:
Today, attacks get put into usable software and distributed quickly. They spread fast.
Today, attacks get put into usable software and distributed quickly. They spread fast.


Nation-states pay lost of people to reverse engineer systems and find the security holes. They do it in secret, but they can’t keep secrets, so the attacks they create get leaked.
Nation-states pay lots of people to reverse engineer systems and find the security holes. They do it in secret, but they can’t keep secrets, so the attacks they create get leaked.


The code of much modern malware that is causing problems has been written by  
The code of much modern malware that is causing problems has been written by  

Latest revision as of 22:50, 17 January 2018

Notes

Class 1, January 8

About the course:

Attendance is strongly recommended as lectures will not be posted online (only the wiki notes will be posted online).

In order to succeed, you need to come to class. Things will be discussed, and you need to be present.

Grading Criteria

  • 20% Midterm
  • 30% Final
  • 10% Participation
  • 20% Experiences
  • 20% Assignments (4)


Midterm & Final

Short answer questions, possibly a few long-answer questions.


Participation

Being present in the classroom, taking notes for the class, raising your hand, discussing things. There is also a slack instance (click here to join) that you can participate in.

If for some reason participation will be a problem for you, email the professor now to work it out.


Experiences

There are 2 portions to the experiences section, reading and tools.

Readings – Make a diligent effort to understand the reading before coming to class. Not a summary. What was your interaction with the reading? What are your thoughts about the material covered? Did you have any difficulties following along?

Tools – Computer Systems Security is fundamentally an applied field. It is tied to tools. Applied learning is important. Some exercises will be provided, but other things you will come across yourself (ie, try to set up a firewall, or play around with iptables, you don’t have to succeed). Write a tool response. Plan on sitting down a couple of times and doing some hacking. It is important to get your hands dirty. To start, pick something that you can handle, and maybe ramp it up as the term goes along.


Assignments

The assignments will be in the style of the midterm and final, and will let you know how prepared you are for the exams. There will be two assignments before the midterm and two more after the midterm. They will be submitted through CULearn.

The material covered today:

In the news recently: Meltdown and Spectre security flaws

Source xkcd

Meltdown in the Intel version, Spectre is the more general version. Basically every modern CPU that has high performance is affected, stems from a problem with processor design in which the strategy used to increase performance in modern processors allows for information leakage.

Inherently, software programs and processes don't trust each other (and they shouldn't), but this flaw means that the barriers between them aren't fixed and that you can potentially read across them.

This is a timing attack, the basis of these attacks is that the time to compute depends on the data that you are computing. By knowing how long something takes to compute you can figure out what is being computed. There was previously a well known timing attack on public key encryption, which was solved by responding to all requests in the same constant time.

Meltdown and Spectre exploit branch predictors (ie, the processor speculates at which branch of the code will be run next and “runs ahead”. If it predicts correctly, there is a performance advantage). However, flaws were found that enabled kernel memory to be read, or a virtual machine to read data from another virtual machine running on the same processor. This particularly affects cloud computing.

These types of flaws come about because no one was thinking about the design from a security point of view.

System Security is difficult. Attackers find flaws, defenders try to fix them. This happens in real systems, with enormous complexity. Theoretically we can design perfectly secure systems, but attackers will keep finding flaws. This game, as it is today, is weighted towards attackers. Re-balancing the game would require radical ideas.

A (noncomprehensive) list of some security tools and methods:

The purpose of this list is to show what a vast area computer security is, not making a list of everything that will be covered.

  • Firewalls
  • Antivirus/Antimalware
  • Network monitoring/NIDS
  • Reverse engineering.
  • Cryptography (encryption/digital signing) (for system security, encryption is a tool of last resort)
  • Air gaps
  • Social Engineering
  • (D)DoS
  • White list
  • Black list
  • One way info-gate
  • Virtual machines
  • Encapsulation
  • Virtual memory
  • Formal verification
  • Randomization (ASLR)
  • Passwords
  • Captchas
  • Biometrics
  • Location monitoring
  • Mandatory access control (ie SELinux, very inconvenient)
  • Discretionary access control (traditional Unix, Windows…)
  • Automatic memory management (garbage collection)
  • Static analysis
  • Dynamic analysis

Security can affect just about any area of computer science. If there is a branch that doesn’t appear to be affected by security, it's because someone just hasn’t thought about it for long enough. This course isn’t about a specific tool or method, although many will be touched on. Primarily, we want to look at how to think about problems so that you see security issues. What can I do as an attacker? What can I do as a defender.

There are always benefits and costs to any security decision, by strengthening security in one way, you can weaken it in another. This is important if you can’t risk lockouts and downtime, where having passwords could cause problems. For example, the US Air Force had all the nuke codes set to 0000000...

If you make usability too difficult, users can (and will) find ways to bypass your security measures. Security is always a secondary concern. The primary concerns of users are the tasks that they are using the computer systems to complete. The most secure system is one that is off, in a locked room in a secure facility. However, that system is also completely useless.

Even if you do not become a computer security professional, you will design systems and make decisions that have security implications.

Reverse Engineering

Picked from the list at random to discuss

  • What is it?
    • Normal engineering process would be Design -> code -> system.
    • Reverse engineering is reversing that process. Looking at the system to figure out the code and the design.
  • Who?
    • Attackers
      • analyzing defenses
        • If you can figure out how it works, then you can find weaknesses and exploit them.

You become an expert safecracker by learning about safes. In order to find flaws in systems, you must have a deep knowledge of those systems. What an attacker wishes to attack he must master, and by finding the flaw, the attacker proves his knowledge. It is like solving a puzzle. That is what drives the people developing these attacks. The negative impacts are often secondary.

    • Defenders
      • Analyze defenses like attackers
      • Analyze attacks
        • (ie, figure out what a botnet does and how it works)
        • Botnet – illegal cloud computing.

DRM – Digital Rights Management

  • People have been using reverse engineering crack DRM since DRM was released
  • Interesting thing about DRM – it works to protect the content from the legitimate user that you want to have the content.
  • Most secure current DRM- iOS. It is currently very difficult to crack (or “jailbreak”). In fact, it may even be “effectively unbreakable” because the cost and time involved in breaking it isn’t worth it.
  • Jailbreaking iOS used to be very popular, as it allowed users to use their iPhones in ways that Apple didn’t allow. However, it would also negatively impact the security of the device.
  • The jailbreak community showed Apple where the security flaws in their devices were found. Apple could then fix the flaws. The community would find new flaws, and Apple would fix them.
  • This evolution or “trial by fire” is the only way that security gets strong. No theoretical security can be trusted until it has had people try to crack it.

Today, attacks get put into usable software and distributed quickly. They spread fast.

Nation-states pay lots of people to reverse engineer systems and find the security holes. They do it in secret, but they can’t keep secrets, so the attacks they create get leaked.

The code of much modern malware that is causing problems has been written by nation-states.

We cannot make any system perfectly secure, but we don’t build systems under that assumption. We build systems that store large amounts of important data (how much data does Facebook have? Google? Governments?). We assume that we can do this securely, but we can’t.