版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1、Software Security: What is it?, History and SignificanceCPRE 556: Lecture 6, January 26, 2006Electrical and Computer Engineering Dept. Iowa State University1Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedCurrent Views on SecurityVulnerability = malicious functionality that extends pr
2、imary, intended design.Vulnerabilities may remain invisible until they are exploited.Software security = risk managementManagement = administrative policies + patch security holes + testing + auditing2Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedWhy is security a challengeComplexit
3、y of systems and software.Security is a cross-cutting concern pervading the entire system and its software.Lack of proactive techniques.One may say that it is better to design for security from scratch not possible in practice because:Significant investment in existing systems and software, practica
4、l realities rule out new replacements starting from scratch.Security standards and knowledge about security are still in evolutionary stage for building new systems.Software experts are not security experts. 3Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedManaging Security Risk Manag
5、ement = administrative policies + patch security holes + testing (current view) + auditing.Administrative policies (often amount restrictions on access) address only a subset of problems and leave other doors open for different types of attacks. For example, a password protected computer can be high
6、jacked by causing a buffer overflow.Patching is a reactive approach. Expensive damage can occur before patching. Testing is a proactive approach it has inherent limitations (we will elaborate and talk more about it later.)Auditing (often manual) is a proactive approach new improvements are needed fo
7、r automating and improving the quality of audits. 4Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSecurity: Software Problem Most people tend to think of security as a network problemThe truth: Security is often a software problem5Lecture Notes Copyright 2006 S. C. Kothari, All right
8、s reservedSecurity: When is it software problemWe can distinguish security problems by the mechanisms requiring changes to eliminate the vulnerability. Network Problem: requires changing networking mechanisms such as network protocols.OS Problem: requires changing OS mechanisms such OS resource mana
9、gement policies.Software Problem: requires changing software implementation or design 6Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSome ObservationsNote that in some cases:It may be a hybrid problem requiring more than one type of change.A change in a mechanism such as protocols m
10、ay be implemented in software or hardware.It may be possible to eliminate a problem by making a fundamental change in the processor hardware such as the stack mechanism for implementing subroutine calls.7Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSANS Top 10 Security Vulnerabilit
11、iesWindows: #1 - IISFailure to handle unanticipated requestsBuffer overflows: Code Red, NimdaPoor Defaults: Sample applicationsUnix: # 8 SendmailBuffer OverflowsInsecure defaultsSANS: /top20/top10.php8Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSecurity Bugs Can Be ExpensiveBuffer
12、 overflow in IISEstimated cost: $3.26 billionBuffer overflow in SQL ServerEstimated cost: $1.2 billion 9Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedWhat Entrances Do the Hackers UseHackers exploit interactions with:Operating SystemUser InterfacesFile SystemLibraries10Lecture Notes
13、 Copyright 2006 S. C. Kothari, All rights reserved11Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedExample of an AttackBuffer Overflow Attack (BOA): Deadly attack underlying many computer highjackings in the past.12Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedBuffer
14、 Overflow AttackThe idea is simple: enter long strings into input fields, could be APIs/exposed internal objectsThis is an important bug because:copy/paste into inputs fields is a fairly common practiceBuffer overflow may be exploitable by a hacker to get arbitrary code to run on a system.13Lecture
15、Notes Copyright 2006 S. C. Kothari, All rights reservedDemonstration of Buffer Overflow Next we will see a brief demonstration.The demonstration will illustrate the buffer overflow attack as a high-level concept.Note that the demo makes simplifications and does not cover complex and subtle mechanism
16、 employed by BOA. These will be covered in a later lecture.The demo developed with NSF support is available at: /bom/ 14Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedExpected Work After the LectureYou will often find more information on lectures through papers and resources listed o
17、n the web. You should look for those, scan several, and read a few in more depth. You should report your interesting findings in class or by sending me an email. If you send email, identify the lecture number and your last name in the subject line (e.g. Lecture1-Smith) and also within your message.
18、Give proper references for each of your findings.This will be considered as a part of class participation. 15Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedReferencesThese are a few additional references from CPRE 556 website that are related to this lecture:CERT Coordination Center, /Open Source Vulnerability Database, http:/ Linux Security, /content/view/101892/155/ Microsoft Security Bulletins, /technet/security/default.mspx Exploiting Software: The Achilles Heel of Cyber Defense, by Gary McGraw and Greg Hoglund, Cyber Defense Magazine, June 2004, /home/lieber/course
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年專業(yè)攝影器材及配件銷售代理合同范本9篇
- 2025年度不良資產債權轉讓與債務置換法律服務合同3篇
- 2024計算機機房設備采購合同
- 2025年牛場租賃及糞便處理合同示范文本3篇
- 上海離婚協議書范文(2024版)
- 2025年度文化遺址保護承包經營權抵押融資合同3篇
- 2024年道路樓體亮化工程合同
- 2024幼兒園法制副校長校園法律知識普及與教育活動合同3篇
- 2024年生態(tài)農業(yè)用地聯合出讓競買協議3篇
- 2025年度體育健身場地使用權轉讓及會員服務合同2篇
- 肉牛肉羊屠宰加工項目選址方案
- 清洗劑msds清洗劑MSDS
- 中學數學教學案例
- 同等學力申碩英語詞匯400題及解析
- 大二上學期 植物地理學ppt課件5.3 植物生活與環(huán)境-溫度條件(正式)
- 人教版七年級上冊數學第一章有理數計算題訓練(無答案)
- 新能源發(fā)電技術教學大綱
- 微生物在農業(yè)上的應用技術課件
- 國家自然科學基金申請書填寫課件
- 各種面料服裝用洗滌標志及說明
- 縣級危重孕產婦救治中心評審標準(產科)
評論
0/150
提交評論