版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Software Security: What is it?, History and SignificanceCPRE 556: Lecture 6, January 26, 2006Electrical and Computer Engineering Dept. Iowa State University1Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedCurrent Views on SecurityVulnerability = malicious functionality that extends pr
2、imary, intended design.Vulnerabilities may remain invisible until they are exploited.Software security = risk managementManagement = administrative policies + patch security holes + testing + auditing2Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedWhy is security a challengeComplexit
3、y of systems and software.Security is a cross-cutting concern pervading the entire system and its software.Lack of proactive techniques.One may say that it is better to design for security from scratch not possible in practice because:Significant investment in existing systems and software, practica
4、l realities rule out new replacements starting from scratch.Security standards and knowledge about security are still in evolutionary stage for building new systems.Software experts are not security experts. 3Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedManaging Security Risk Manag
5、ement = administrative policies + patch security holes + testing (current view) + auditing.Administrative policies (often amount restrictions on access) address only a subset of problems and leave other doors open for different types of attacks. For example, a password protected computer can be high
6、jacked by causing a buffer overflow.Patching is a reactive approach. Expensive damage can occur before patching. Testing is a proactive approach it has inherent limitations (we will elaborate and talk more about it later.)Auditing (often manual) is a proactive approach new improvements are needed fo
7、r automating and improving the quality of audits. 4Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSecurity: Software Problem Most people tend to think of security as a network problemThe truth: Security is often a software problem5Lecture Notes Copyright 2006 S. C. Kothari, All right
8、s reservedSecurity: When is it software problemWe can distinguish security problems by the mechanisms requiring changes to eliminate the vulnerability. Network Problem: requires changing networking mechanisms such as network protocols.OS Problem: requires changing OS mechanisms such OS resource mana
9、gement policies.Software Problem: requires changing software implementation or design 6Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSome ObservationsNote that in some cases:It may be a hybrid problem requiring more than one type of change.A change in a mechanism such as protocols m
10、ay be implemented in software or hardware.It may be possible to eliminate a problem by making a fundamental change in the processor hardware such as the stack mechanism for implementing subroutine calls.7Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSANS Top 10 Security Vulnerabilit
11、iesWindows: #1 - IISFailure to handle unanticipated requestsBuffer overflows: Code Red, NimdaPoor Defaults: Sample applicationsUnix: # 8 SendmailBuffer OverflowsInsecure defaultsSANS: /top20/top10.php8Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSecurity Bugs Can Be ExpensiveBuffer
12、 overflow in IISEstimated cost: $3.26 billionBuffer overflow in SQL ServerEstimated cost: $1.2 billion 9Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedWhat Entrances Do the Hackers UseHackers exploit interactions with:Operating SystemUser InterfacesFile SystemLibraries10Lecture Notes
13、 Copyright 2006 S. C. Kothari, All rights reserved11Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedExample of an AttackBuffer Overflow Attack (BOA): Deadly attack underlying many computer highjackings in the past.12Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedBuffer
14、 Overflow AttackThe idea is simple: enter long strings into input fields, could be APIs/exposed internal objectsThis is an important bug because:copy/paste into inputs fields is a fairly common practiceBuffer overflow may be exploitable by a hacker to get arbitrary code to run on a system.13Lecture
15、Notes Copyright 2006 S. C. Kothari, All rights reservedDemonstration of Buffer Overflow Next we will see a brief demonstration.The demonstration will illustrate the buffer overflow attack as a high-level concept.Note that the demo makes simplifications and does not cover complex and subtle mechanism
16、 employed by BOA. These will be covered in a later lecture.The demo developed with NSF support is available at: /bom/ 14Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedExpected Work After the LectureYou will often find more information on lectures through papers and resources listed o
17、n the web. You should look for those, scan several, and read a few in more depth. You should report your interesting findings in class or by sending me an email. If you send email, identify the lecture number and your last name in the subject line (e.g. Lecture1-Smith) and also within your message.
18、Give proper references for each of your findings.This will be considered as a part of class participation. 15Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedReferencesThese are a few additional references from CPRE 556 website that are related to this lecture:CERT Coordination Center, /Open Source Vulnerability Database, http:/ Linux Security, /content/view/101892/155/ Microsoft Security Bulletins, /technet/security/default.mspx Exploiting Software: The Achilles Heel of Cyber Defense, by Gary McGraw and Greg Hoglund, Cyber Defense Magazine, June 2004, /home/lieber/course
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 集成电路产线污水处理站项目运营管理方案
- 2024年7月国开电大行政管理本科《公共政策概论》期末纸质考试试题及答案
- 公司绩效数据统计方案
- 风能资源评估与预测模型设计
- 工程项目供应链管理方案
- 2026年护理高级职称考试试题及答案
- 电池组集成与测试标准化方案
- 2026年java基础案例教程考试试题
- 城市更新安全监控系统建设
- 企业资产管理优化方案
- 2026年平顶山发展投资控股集团有限公司校园招聘考试备考试题及答案解析
- GB/T 47067-2026塑料模塑件公差和验收条件
- GB/T 21558-2025建筑绝热用硬质聚氨酯泡沫塑料
- 雨课堂学堂在线学堂云《Linux操作系统(东北)》单元测试考核答案
- 全国“红旗杯”班组长大赛知识考试题题库(含答案解析)
- 急诊科建设与管理指南(2025年版)
- 校医服务合同范本
- 村级三资监督范围课件
- 多径环境FSK载波同步-洞察及研究
- 安全帽佩戴培训目的课件
- 特殊危险作业安全培训课件
评论
0/150
提交评论