DOC PREVIEW
Stanford CS 155 - Computer Security

This preview shows page 1-2-17-18-19-35-36 out of 36 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 36 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 36 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 36 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 36 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 36 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 36 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 36 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 36 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Computer SecurityWhat’s this course about?General course info (see web)Current TrendsHistorical hackers (prior to 2000)Typical Botherder: 0x80" (pronounced X-eighty)Some things in the newsTrendsHow big is the security problem?Most-common attacks on systemsVulnerability Stats: web is “winning”Web attack toolkit: MPackSilentBankerSteal cars with a laptopSlide 15iPhone attack (summer 2007)iPhone security measuresAnalysis methodsSuggestions for improvementSlide 20Underground goods and servicesWhy are there security vulnerabilities?Slide 23Ethical use of security informationLaw enforcementDifficult problem: insider threatExample insider attackExample #2Example #3Software dangersKen ThompsonCompiler backdoorC compiler is written in CClever trick to avoid detectionSocial engineeringSlide 36Computer SecurityDan Boneh and John MitchellCS 155 Spring 2009http://crypto.stanford.edu/cs155What’s this course about?Some challenging fun projectsLearn about attacksLearn about preventing attacksLectures on many topicsApplication securityOperating system securityNetwork securityWeb securitySome overlap with CS142; redesign for next yearnot a course on Cryptography (take CS255)General course info (see web)Prerequisite: Operating systems (CS140)Textbook: none – reading onlineCoursework3 projects, 2 homeworks, final exam grade: 0.25 H + 0.5 P + 0.25 F Teaching assistantsHristo Bojinov, Indrajit Khare, Gary LuuOccasional optional section (time to be confirmed)Fridays, 4:15 - 5:05, Gates B03Current TrendsHistorical hackers (prior to 2000)Profile:MaleBetween 14 and 34 years of ageComputer addictedNo permanent girlfriendNo Commercial Interest !!!Source: Raimund GenesTypical Botherder: 0x80" (pronounced X-eighty)High school dropout“…most of these people I infect are so stupid they really ain't got no business being on the Internet in the first place.“Working hours: approx. 2 minutes/day to manage BotnetMonthly earnings: $6,800 on averageDaily Activities: Chatting with people while his bots make him moneyRecently paid $800 for an hour alone in a VIP room with several dancersJob Description: Controls 13,000+ computers in more than 20 countries Infected Bot PCs download Adware then search for new victim PCsAdware displays ads and mines data on victim's online browsing habits.Bots collect password, e-mail address, SS#, credit and banking dataGets paid by companies like TopConverting.com, GammaCash.com, Loudcash, or 180Solutions.6Washington Post: Invasion of the Computer SnatchersSome things in the newsNigerian letter (419 Scams) still works:Michigan Treasurer Sends 1.2MUSD of State Funds !!!Many zero-day attacks in 2007-08 Google, Excel, Word, Powerpoint, Office …Criminal access to important devicesNumerous lost, stolen laptops, storage media, containing customer informationSecond-hand computers (hard drives) pose riskGozi trojan steals data from SSL streamsUndetected for 50 daysVint Cerf estimates ¼ of PCs on Internet are bots7TrendsMalicious software levels consistently risingMore malicious software in ‘08 than all previous years combinedBy all accounts, ’09 will see increasing riseGood vs. bad software inflection pointUnderground economy and supply chain Lowers bar for who can participate in cybercrimeWeb will continue as an attack vector Popular medium, rich content, remote access to your home/officeTargeted attacks Necessitate defense-in-depth protectionAttackers starting at the supply chainInfected digital picture frames8Credit: Zulfikar RamzanHow big is the security problem?http://www.cert.org/stats/CERT Vulnerabilities reportedMost-common attacks on systems2006 MITRE CVE stats: 21.5 % of CVEs were XSS 14 percent SQL injection 9.5 percent php "includes“7.9 buffer overflow2005 was the first year that XSS jumped ahead of buffer overflows …10Vulnerability Stats: web is “winning”Source: MITRE CVE trendsMajority of vulnerabilities now found in web softwareWeb attack toolkit: MPack12Basic setupToolkit hosted on web serverInfects pages on that serverPage visitors get infectedFeaturesCustomized: determines exploit on the fly, based on user’s OS, browser, etcEasy to use: management console provides stats on infection ratesCustomer care toolkit can be purchased with one-year support contract!SilentBankerProxy intercepts request and adds fieldsBank sends login page needed to log inWhen user submits information, also sent to attackerCredit: Zulfikar RamzanSteal cars with a laptopNEW YORK - Security technology created to protect luxury vehicles may now make it easier for tech-savy thieves to drive away with them. In April ‘07, high-tech criminals made international headlines when they used a laptop and transmitter to open the locks and start the ignition of an armor-plated BMW X5 belonging to soccer player David Beckham, the second X5 stolen from him using this technology within six months.… Beckham's BMW X5s were stolen by thieves who hacked into the codes for the vehicles' RFID chips …1415iPhone attack (summer 2007)iPhone Safari downloads malicious web pageArbitrary code is run with administrative privilegesCan read SMS log, address book, call history, other dataCan perform physical actions on the phone. system sound and vibrate the phone for a secondcould dial phone numbers, send text messages, or recordaudio (as a bugging device) Transmit collected data over network to attacker See http://www.securityevaluators.com/iphone/16iPhone security measures“Reduced attack surface”Stripped down and customized version of Mac OS Xdoes not have common binaries such as bash, ssh, or even ls.MobileSafari - many features of Safari have been removedNo Flash plug-in, many file types cannot be downloadedSome internal protectionIf USB syncing with iTunes, file system cannot be mountedFile system accessible to iTunes is chroot’ed Weak security architectureAll processes of interest run with administrative privilegesiPhone does not utilize some widely accepted practicesAddress randomizationEach time a process runs, the stack, heap, and executable code located at precisely the same spot in memory Non-executable heapsBuffer overflow on heap can write executable instructions17Analysis methodsExtract and statically analyze binariesUsing jailbreak and iPhoneInterface,Audit


View Full Document

Stanford CS 155 - Computer Security

Documents in this Course
Lecture 5

Lecture 5

64 pages

Phishing

Phishing

31 pages

Load more
Download Computer Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Computer Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Computer Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?