版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Software Security: What is it?, History and SignificanceCPRE 556: Lecture 6, January 26, 2006Electrical and Computer Engineering Dept. Iowa State University1Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedCurrent Views on SecurityVulnerability = malicious functionality that extends pr
2、imary, intended design.Vulnerabilities may remain invisible until they are exploited.Software security = risk managementManagement = administrative policies + patch security holes + testing + auditing2Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedWhy is security a challengeComplexit
3、y of systems and software.Security is a cross-cutting concern pervading the entire system and its software.Lack of proactive techniques.One may say that it is better to design for security from scratch not possible in practice because:Significant investment in existing systems and software, practica
4、l realities rule out new replacements starting from scratch.Security standards and knowledge about security are still in evolutionary stage for building new systems.Software experts are not security experts. 3Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedManaging Security Risk Manag
5、ement = administrative policies + patch security holes + testing (current view) + auditing.Administrative policies (often amount restrictions on access) address only a subset of problems and leave other doors open for different types of attacks. For example, a password protected computer can be high
6、jacked by causing a buffer overflow.Patching is a reactive approach. Expensive damage can occur before patching. Testing is a proactive approach it has inherent limitations (we will elaborate and talk more about it later.)Auditing (often manual) is a proactive approach new improvements are needed fo
7、r automating and improving the quality of audits. 4Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSecurity: Software Problem Most people tend to think of security as a network problemThe truth: Security is often a software problem5Lecture Notes Copyright 2006 S. C. Kothari, All right
8、s reservedSecurity: When is it software problemWe can distinguish security problems by the mechanisms requiring changes to eliminate the vulnerability. Network Problem: requires changing networking mechanisms such as network protocols.OS Problem: requires changing OS mechanisms such OS resource mana
9、gement policies.Software Problem: requires changing software implementation or design 6Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSome ObservationsNote that in some cases:It may be a hybrid problem requiring more than one type of change.A change in a mechanism such as protocols m
10、ay be implemented in software or hardware.It may be possible to eliminate a problem by making a fundamental change in the processor hardware such as the stack mechanism for implementing subroutine calls.7Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSANS Top 10 Security Vulnerabilit
11、iesWindows: #1 - IISFailure to handle unanticipated requestsBuffer overflows: Code Red, NimdaPoor Defaults: Sample applicationsUnix: # 8 SendmailBuffer OverflowsInsecure defaultsSANS: /top20/top10.php8Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSecurity Bugs Can Be ExpensiveBuffer
12、 overflow in IISEstimated cost: $3.26 billionBuffer overflow in SQL ServerEstimated cost: $1.2 billion 9Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedWhat Entrances Do the Hackers UseHackers exploit interactions with:Operating SystemUser InterfacesFile SystemLibraries10Lecture Notes
13、 Copyright 2006 S. C. Kothari, All rights reserved11Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedExample of an AttackBuffer Overflow Attack (BOA): Deadly attack underlying many computer highjackings in the past.12Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedBuffer
14、 Overflow AttackThe idea is simple: enter long strings into input fields, could be APIs/exposed internal objectsThis is an important bug because:copy/paste into inputs fields is a fairly common practiceBuffer overflow may be exploitable by a hacker to get arbitrary code to run on a system.13Lecture
15、Notes Copyright 2006 S. C. Kothari, All rights reservedDemonstration of Buffer Overflow Next we will see a brief demonstration.The demonstration will illustrate the buffer overflow attack as a high-level concept.Note that the demo makes simplifications and does not cover complex and subtle mechanism
16、 employed by BOA. These will be covered in a later lecture.The demo developed with NSF support is available at: /bom/ 14Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedExpected Work After the LectureYou will often find more information on lectures through papers and resources listed o
17、n the web. You should look for those, scan several, and read a few in more depth. You should report your interesting findings in class or by sending me an email. If you send email, identify the lecture number and your last name in the subject line (e.g. Lecture1-Smith) and also within your message.
18、Give proper references for each of your findings.This will be considered as a part of class participation. 15Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedReferencesThese are a few additional references from CPRE 556 website that are related to this lecture:CERT Coordination Center, /Open Source Vulnerability Database, http:/ Linux Security, /content/view/101892/155/ Microsoft Security Bulletins, /technet/security/default.mspx Exploiting Software: The Achilles Heel of Cyber Defense, by Gary McGraw and Greg Hoglund, Cyber Defense Magazine, June 2004, /home/lieber/course
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- (2024版)智能机器人研发合同
- 2024年亚太地区电子信息产品购销协议
- (2024版)新能源汽车充电设施建设合作协议
- 工商局租赁合同模板
- 农业物联网的创新应用考核试卷
- 2024年个体户医疗器械采购合同
- 2024年体育赛事组织服务合同
- 沟通技巧在项目沟通管理中的实践考核试卷
- 2024年企业品牌建设与市场营销协议
- 2024年二手房买卖定金协议样本
- 水电厂检修标准化作业流程图
- 中考数学复习专题课件:瓜豆原理之直线型
- GB 18384-2020 电动汽车安全要求
- 腹股沟斜疝护理查房ppt
- 精品堆垛机安装指导书
- PMC生产计划与物料控制实务课件
- 鸡的饲养管理-优质课件
- 人工湿地设计规范标准[详]
- 提灌站项目施工组织设计
- 无损检测英语
- 化学微生物学第7章 微生物转化
评论
0/150
提交评论