57
Introduc/on Security Analysis & Threat Models

Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Introduc/on  

Security  Analysis  &  Threat  Models  

Page 2: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Administrivia  •  Piazza  –  Primary  point  of  contact  •  Course  text  book  –  None!  •  No  office  hours,  discussion  this  week  

– Starts  Sept  5th  •  If  you  cant  make  discussion…  •  No  lecture  next  Monday,  Sept  3rd  

Page 3: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

What  is  Computer  Security?  

•  Allow  intended  use  of  computer  systems    

•  Prevent  unintended  use  that  may  cause  harm  

Page 4: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Personal  Data  &  Files  

       Grant  authorized  users  access  to  read,  create  personal  files  Prevent  unauthorized  users  from  reading,  modify,  or  dele/ng  personal  

Page 5: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Banking  Funds  

       Allow  customer  to  view  balance,  transfer  funds,  make  payments  Prevent  third  party  access  to  account;  customers  defrauding  bank  Prevent  other  browser  tabs,  applica/ons  from  reading  banking  info  

Page 6: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Personal  Privacy  

       Allow  friends  to  view  status  updates,  photos,  loca/on  data    Prevent  strangers,  adver/sers  from  accessing  profile  Prevent  strangers,  applica/ons  from  pos/ng  updates  as  you  

Page 7: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Threats  

Page 8: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Explora/on,  Disrup/on,  Personal  Reputa/on  

•  1990s:  – Phone  phreaking,  free  calls  

•  Early  2000s:  – Email  worms  – CodeRed,  MyDoom,  Sobig  

Page 9: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Financially  Mo/vated  •  ShiZ  in  late  2000s  •  Spam  

– Pharmaceu/cals  – Fake  products  

•  Carding/Fraud  –  Iden/fy  theZ,  credit  fraud  

Page 10: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Poli/cally  Mo/vated  

•  Stuxnet,  Flame,  Gauss  –  Iranian  nuclear  infrastructure  

– Lebanese  banking  informa/on  

– Wiretapping  

Page 11: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Poli/cally  Mo/vated  

Page 12: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Other  Mo/ves?  

Page 13: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Current  Vulnerability  Trends  

Page 14: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

MITRE  tracks  vulnerability  disclosures  

Source:  IBM  X-­‐Force,  Mar  2011   Data:  hap://cve.mitre.org/  

 Cumula/ve  Disclosures          

 Percentage  from  Web  applica/ons  

2010    

Page 15: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Opera/ng  system  vulnerabili/es  

Page 16: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Trends  in  client-­‐side  vulnerabili/es  

primarily  Flash,  aZer  2008  

Source:  IBM  X-­‐Force,  Mar  2011    

browser  security  improving  

Page 17: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Reported  Web  Vulnerabili/es  "In  the  Wild"  

Data from aggregator and validator of NVD-reported vulnerabilities

Page 18: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Web  vs  System  vulnerabili/es  

XSS peak

Page 19: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Mobile  Opera/ng  Systems  Mobile  OS  Vulnerabili/es   Mobile  OS  Exploits                            

Compare  number  of  vulnerabili/es  with  exploits.    What  can  you  expect  next  year?  

Source:  IBM  X-­‐Force,  Mar  2011    

Page 20: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Summary  •  Many  current  aaacks  are  financially  mo/vated  •  Vulnerabili/es  prevalent,  half  related  to  the  Web  

–  Browser  vulnerabili/es  decreasing,  but  plug-­‐ins  pose  risk  

–  Some  improvements  in  defending  against  common  aaacks  

•  Mobile  plaeorms  receiving  increasing  aaen/on    

Page 21: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Payloads  

Page 22: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Why  own  machines:                1.    IP  address  and  bandwidth  stealing  Aaacker’s  goal:      look  like  a  random  Internet  user  

Use  the  infected  machine’s  IP  address  for:  

•  Spam        (e.g.  the  storm  botnet)      Spamaly/cs:        1:12M    pharma  spams  leads  to  purchase        1:260K  gree/ng  card  spams  leads  to  infec/on  

•  Denial  of  Service:            Services:      1  hour  (20$),      24  hours  (100$)  •  Click  fraud    (e.g.  Clickbot.a)  

Page 23: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Why  own  machines:              2.    Steal  user  creden/als  keylog  for  banking  passwords,      web  passwords,      gaming  pwds.  

Example:    SilentBanker  (2007)    

Bank  Malware  injects  

Javascript  Bank  sends  login  page  needed  to  log  in  

When  user  submits  informa/on,  also  sent  to  aaacker  

User  requests  login  page  

Similar  mechanism  used    by  Zeus  botnet  

Page 24: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Why  own  machines:              3.  Spread  to  isolated  systems    

Example:    Stuxtnet  

                   Windows  infec/on      ⇒      

         Siemens  PCS  7  SCADA  control  soZware  on  Windows    ⇒    

   Siemens  device  controller  on  isolated  network    

   More  on  this  later  in  course  

Page 25: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Server-­‐side  aaacks  •  Financial  data  theZ:      oZen  credit  card  numbers  

–  example:        malicious  soZware  installed  on  servers  of  a                single  retailer  stole  45M  credit  card    (2007)  

•  Poli/cal  mo/va/on:      Aurora,    Tunisia  Facebook    (Feb.  2011)  

 

•  Infect  visi/ng  users  

Page 26: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Example: Mpack (2007)

•  PHP-­‐based  tools  installed  on  compromised  web  sites  –  Embedded  as  an  iframe  on  infected  page  –  Infects  browsers  that  visit  site  

•  Features  – management  console  provides  stats  on  infec/on  rates  –  Sold  for  several  100$  –  Customer  care  can  be  purchased,  one-­‐year  support  contract  

•  Impact:      500,000  infected  sites      (compromised  via  SQL  injec/on)  –  Several  defenses:        e.g.    Google  safe  browsing  

Page 27: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Insider  aaacks:    example  Hidden  trap  door  in  Linux    (nov  2003)  

–  Allows  aaacker  to  take  over  a  computer  –  Prac/cally  undetectable  change    (uncovered  via  CVS  logs)  

 Inserted  line  in  wait4()    

Looks  like  a  standard  error  check,  but  …  

if ((options == (__WCLONE|__WALL)) && (current->uid = 0)) retval = -EINVAL; !

See: http://lwn.net/Articles/57135/

Page 28: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Many  more  examples  •  Access  to  SIPRnet  and  a  CD-­‐RW:            260,000  cables    ⇒    Wikileaks    

•  SysAdmin  for  city  of  SF  government.        Changed  passwords,  locking  out  city  from  

router  access  

•  Inside  logic  bomb  took  down  2000  UBS  servers  

Page 29: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Mone/za/on  

Page 30: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Marketplace  for  Vulnerabili/es  Op9on  1:      bug  bounty  programs  •  Google  Vulnerability  Reward  Program:      3K  $    •  Mozilla  Bug  Bounty  program:    500$  •  Pwn2Own  compe//on:      15K  $  

Op9on  2:        •  ZDI,    iDefense:      2K  –  25K    $  

Page 31: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Marketplace  for  Vulnerabili/es  Op9on  3:      black  market  

Source:    Charlie  Miller        (securityevaluators.com/files/papers/0daymarket.pdf)  

Page 32: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Marketplace  for  owned  machines    Pay-­‐per-­‐install  (PPI)  services    PPI  opera9on:  1.  Own  vic/m’s  machine  2.  Download  and  install  client’s  code  3.  Charge  client    Source:    Cabalerro  et  al.      (www.icir.org/vern/papers/ppi-­‐usesec11.pdf)  

spam  bot   keylogger  clients  

PPI  service  

Vic9ms  

Page 33: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Marketplace  for  owned  machines  

Source:    Cabalerro  et  al.      (www.icir.org/vern/papers/ppi-­‐usesec11.pdf)  

spam  bot   keylogger  clients  

PPI  service  

Vic9ms  

Cost:        US          -­‐    100-­‐180$  /  1000  machines  

 Asia    -­‐      7-­‐8$  /  1000  machines  

Page 34: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

The  computer  security  problem  Two  factors:  •  Lots  of  buggy  soNware        (and  gullible  users)  

•  Money  can  be  made  from  finding  and  exploi9ng  vulns.  

1.  Marketplace  for  vulnerabili/es  

2.  Marketplace  for  owned  machines  (PPI)  

3.  Many  methods  to  profit  from  owned  client  machines  current  state  of  computer  security  

Page 35: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Formally  Defining  Security  

Page 36: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

What  is  Computer  Security  About?  •  General  goals:  

–  Allow  intended  use  of  computer  systems  –  Prevent  unintended  use  that  may  cause  harm  

•  More  precisely…    

Page 37: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Basic  Security  Proper/es  (I)  •  Confiden/ality:    

–  Informa/on  is  only  disclosed  to  authorized  people  or  systems  

– E.g.,  aaackers  cannot  learn  your  banking  info  

Page 38: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Basic  Security  Proper/es  (II)  •  Integrity:  

–  Informa/on  cannot  be  tampered  with  in  an  unauthorized  way    

– E.g.,  aaacker  cannot  change  the  balance  of  your  bank  account  

Page 39: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Basic  Security  Proper/es  (III)  •  Availability:  

–  Informa/on  and  services  are  accessible  in  a  /mely  fashion  to  authorized  people  or  systems  

– E.g.,  you  should  be  able  to  login  and  perform  transac/ons  on  your  online  banking  account  when  you  want  to  

Page 40: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Basic  Security  Proper/es:  CIA  

• Confiden9ality  • Integrity  • Availability  

Page 41: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Security  Analysis  •  Given  a  computer  system,  one  may  ask:    Is  the  computer  system  secure?  

Page 42: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Is  the  House  Secure?  

Page 43: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

It  Depends  …  •  What  are  the  assets?  What  are  the  goals?    

Page 44: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

It  Depends  …  •  Threat  model  

–  In  SafeLand,  you  don’t  need  to  lock  the  door  –  Aaackers  who  pick  locks  –  Aaackers  who  drive  a  bull-­‐dozer  –  Aaackers  who  have  super  advanced  technology  –  Aaackers  who  may  know  you  well  

Page 45: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Is  the  House  Secure?  •  Is  the  house’s  protec/on  mechanism  strong  enough  to  protect  the  assets  from  aaackers  in  a  certain  threat  model?  

Page 46: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Which  Threat  Model  Should  You  Choose?  

?

Page 47: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Cost  of  Security  •  Should  you  always  build  &  evaluate  a  system  secure  against  the  strongest  aaacker?  – A  student  may  simply  not  be  able  to  afford  an  alarm  system  

•  Not  about  perfect  security  

Perfect  Security  Risk  Analysis  

Page 48: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Is  the  Computer  System  Secure?  •  Is  the  system’s  protec/on  mechanism  strong  enough  to  protect  the  assets  &  achieve  security  goals  against  aaackers  in  a  certain  threat  model?  

Page 49: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Key  Elements  to  Security  Analysis  Security  proper/es  

Threat  Model  

?  Security  Analysis  

Page 50: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Threat  Model  •  Assump/ons  on  aaackers’  abili/es  and  resources  

0Day  

DDoS  

Network  Eavesdropper  

MITM  Aaack  

DES  Cracker  

Page 51: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Which  Threat  Models  to  Choose?  •  For  the  grade  database  system  for  your  class?  •  For  your  phone?    •  For  a  major  online  banking  site?  •  For  the  system  to  control  nuclear  weapon  launch?  

Page 52: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Cost  of  Security  •  There’s  no  free  lunch.  •  There’s  no  free  security.  •  Cost  of  security  

– Expensive  to  develop  – Performance  overhead  –  Inconvenience  to  users  

Page 53: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Priori/ze  Your  Security  Solu/on  according  to  Your  Threat  Model  

•  No  one  wants  to  pay  more  for  security  than  what  they  have  to  lose  

•  Not  about  perfect  security  – Risk  analysis  

Perfect  Security  Risk  Analysis  

Page 54: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Changing  Threat  Model  •  Be  careful  when  your  threat  model  changes  

– E.g.,  online  account  

New  account,  nothing  of  value;    No  incen/ve  for  aaackers  

Over  /me….  

Account  accumulates  value;  More  incen/ve  for  aaackers    

Page 55: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Design  Impacts  Cost  of  Security  •  Good  system  design  &  architecture  can  reduce  cost  of  security  

 

Page 56: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

Design  Impacts  Cost  of  Security  Browser  

Known  unpatched  vulnerabili/es  Secunia   SecurityFocus  

Extremely  cri/cal  (number  /  oldest)  

Highly  cri/cal  (number  /  oldest)  

Moderately  cri/cal  (number  /  oldest)  

Less  cri/cal  (number  /  oldest)  

Not  cri/cal  (number  /  oldest)  

Total  (number  /  oldest)  

Google  Chrome  16   0   0   0   0   0   1  13  December  2011  

Internet  Explorer  6   0   0   4  17  November  2004  

8  27  February  2004  

12  5  June  2003  

534  20  November  2000  

Internet  Explorer  7   0   0   1  30  October  2006  

4  6  June  2006  

9  5  June  2003  

213  15  August  2006  

Internet  Explorer  8   0   0   0   1  26  February  2007  

7  5  June  2003  

123  14  January  2009  

Internet  Explorer  9   0   0   0   0   1  6  December  2011  

26  5  March  2011  

Firefox  3.6   0   0   0   0   0   1  20  December  2011  

Firefox  9   0   0   0   0   0   0  

Opera  11   0   0   0   0   1  6  December  2011  

2  6  December  2011  

Safari  5   0   0   0   1  8  June  2010   0   2  

13  December  2011  

"Vulnerabili/es."  SecurityFocus.  Web.  18  Jan.  2012.  <hap://www.securityfocus.com/>.  "Advisories."  Secunia.  Web.  18  Jan.  2012.  <haps://secunia.com/community/advisories/>.  

Page 57: Introduc/on%dawnsong/teaching/f12-cs161/lectures/lec2-intro...Dawn%Song% Administrivia% • Piazza–Primary%pointof%contact • Course%textbook%–None!% • No%office%hours,%discussion%this%week%

Dawn  Song  

End  of  Segment