15-446 Networked Systems Practicum Lecture 12 – Privacy 1.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
SCSC 455 Computer Security
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Frank Stajano Presented by Patrick Davis 1.  Ubiquitous Computing ◦ Exact concept inception date is unknown ◦ Basically background computing in life.
CSE331: Introduction to Networks and Security Lecture 22 Fall 2002.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Zero-Interaction Authentication April 15, 2003 Mark D.Corner, Brian D. Noble Presented by Seong Oun Hwang CS744 Special Topics in System Architecture:
Protecting Applications with Transient Authentication Mark Corner and Brian Noble University of Michigan - EECS Department
Authentication in Mobile Ad-hoc Network (MANET) Student Ståle Jonny Berget Superviser Chik How Tan.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
SMUCSE 5349/73491 Authentication Protocols. SMUCSE 5349/73492 The Premise How do we use perfect cryptographic mechanisms (signatures, public-key and symmetric.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Zero-Interaction Authentication Mark Corner Brian Noble
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
1 Pertemuan 04 Pengamanan Akses Sistem Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
CSE331: Introduction to Networks and Security Lecture 24 Fall 2002.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
OWASP Mobile Top 10 Why They Matter and What We Can Do
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Agenda Introduction. Design. Trust and Threat Model. Key-Encrypting Keys. Token Vulnerabilities. Token-Laptop Interaction. Assigning File keys & Handling.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Lecture 13 Page 1 Advanced Network Security Authentication and Authorization in Local Networks Advanced Network Security Peter Reiher August, 2014.
Key Management. Given a computer network with n hosts, for each host to be able to communicate with any other host would seem to require as many as n*(n-1)
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
(a) What is the output generated by this program? In fact the output is not uniquely defined, i.e., it is not always the same. So please give three examples.
The TAOS Authentication System: Reasoning Formally About Security Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Security in Computing Protection in General-Purpose Operating Systems.
1 KERBEROS: AN AUTHENTICATION SERVICE FOR OPEN NETWORK SYSTEMS J. G. Steiner, C. Neuman, J. I. Schiller MIT.
Chap1: Is there a Security Problem in Computing?.
Operating Systems Security
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
IT3002 Computer Architecture
Wireless Network Security CSIS 5857: Encoding and Encryption.
Lecture 14 Page 1 CS 111 Summer 2013 Security in Operating Systems: Basics CS 111 Operating Systems Peter Reiher.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Fall 2006CS 395: Computer Security1 Key Management.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Embedded system security
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
1 Rogue Mobile Shell Problem Verizon Wireless October 26, 2000 Christopher Carroll.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Outline The basic authentication problem
Grid Security.
Challenge/Response Authentication
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
Module 2 OBJECTIVE 14: Compare various security mechanisms.
16. Account Monitoring and Control
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Week 7 - Wednesday CS363.
Lecture 36.
Lecture 36.
Presentation transcript:

Networked Systems Practicum Lecture 12 – Privacy 1

Outline TaintDroid ZIA/Transient Authentication CleanOS 2

TaintDroid 3

Taint Analysis 4

Design 5

6

Taint Propagation 7

Native Methods 8

Msgs and Files 9

Performance 10

Taint Sources 11

Findings 12

Findings 13

Outline TaintDroid ZIA/Transient Authentication CleanOS 14

ZIA: Losing Your Laptop Imagine rushing to a talk and leaving your laptop in a taxi cab A finder may be malicious, may not be What do you do in the interim? buy a new machine---not really a big deal just like credit cards you should cancel all your passwords what about your web cache? what about your account numbers?

Tension in Proving Identity The device can ask for proof once and never ask again finder assumes the full rights of the user The device can continuously ask users would not tolerate such a system A compromise is to ask periodically Current authentication methods do not resolve this tension hedge on the side of less security and more usability Need something to provide constant proof without user burden More Secure Less Usable More Usable Less Secure Frequency of Proof

Solution: Constant but Invisible Authentication Transient Authentication protect data by constantly authenticating user keep usable by having something answer for the user Authentication token: provides this ability worn by user to prove proximity enough computational power for small cryptographic tasks communication via short-range wireless network Challenge Response

Tie Capabilities to Token Require token to decrypt device’s data device alone is useless, regardless of physical attacks Tokens have limited computation, (slow) wireless link tokens cannot decrypt data directly never expose root capability, key-encrypting keys only transmit data key

Tie Capabilities to Token Require token to decrypt device’s data device alone is useless, regardless of physical attacks Tokens have limited computation, (slow) wireless link tokens cannot decrypt data directly never expose root capability, key-encrypting keys only transmit data key

Tie Capabilities to Token Require token to decrypt device’s data device alone is useless, regardless of physical attacks Tokens have limited computation, (slow) wireless link tokens cannot decrypt data directly never expose root capability, key-encrypting keys only transmit data key

Tie Capabilities to Token Require token to decrypt device’s data device alone is useless, regardless of physical attacks Tokens have limited computation, (slow) wireless link tokens cannot decrypt data directly never expose root capability, key-encrypting keys only transmit data key

Tie Capabilities to Token Require token to decrypt device’s data device alone is useless, regardless of physical attacks Tokens have limited computation, (slow) wireless link tokens cannot decrypt data directly never expose root capability, key-encrypting keys only transmit data key

Zeroed Data Just Faster than Attackers When token does not answer assume user is absent, protect all keys/data Protection doesn’t have to be instantaneous just faster than attackers, people are slow TA has two alternatives: flush vs. encrypt flush is faster than encrypt on departure filling data is potentially slow or require user intervention encrypt is slower to protect, but faster on return Secret User Departs

Do No Harm Key acquisition costly (~10ms) too expensive to pay on every use of data overhead would be prohibitive without optimization Some techniques hide/avoid cost cache data keys pre-fetch fresh keys Optimizations reduce laptop/token interactions loss of interaction  user has left add periodic polling to refresh authentication

Ensure Explicit Consent Could keep users entirely out of the loop complete transparency == complete loss of control Consider the “tailgater” attack thief steals my advisor’s laptop thief sits behind me advisor’s laptop asks for key-encrypting key my token transparently responds Solution: provide explicit binding between tokens/devices this user means to use that laptop can be infrequent, e.g. once a day

Foil tailgaters How do I prevent my token from responding to your laptop? called the tailgater attack Leverage the login process users already are familiar with suppose mcorner logs into weir.eecs weir.eecs sends a challenge to mcorner’s token user gives response to the token could be simple (a tap) or complicated (one-time pass) token then bound: only bound tokens respond unless I bind my token to your laptop, you lose Provides assurance that this user means to use that laptop user plays the role of trusted third party in binding

Application Protection Protections for file systems exist: ZIA (Mobicom ‘02) Protecting file systems is not enough data read from file system into address space (and read from network, and typed by user, and …) Mobile devices are typically always on or suspended ephemeral state always vulnerable Possible attacks on memory space OS interfaces probing memory bus

Application-Transparent Protection Simple solution: encrypt entire memory space suspend processes & encrypt in-memory state on departure decrypt state & resume processes on return encrypt and decrypt 216MB state in <10s Brute-force approach may be overkill not all applications are sensitive not all application state is sensitive application might know the difference could perform useful, non-secure work

Application-Aware Protection Through an API give applications ability to continue to execute manage their own secrets gain information about user proximity Services provided to application register departure/return callbacks request decryption/encryption of buffer with master key obtain fresh keys Application/designer responsible for identifying sensitive state/operations tying capabilities to token

Outline TaintDroid ZIA/Transient Authentication CleanOS 30

CleanOS 31

Threats 32

Problems with State-of-Art 33

Key Observations 34

Design 35

Design 36

Design 37

SDOs 38

SDO example 39

Garbage Collector 40

WiFi Performance 41

3G Performance 42