Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.

Slides:



Advertisements
Similar presentations
InterScan AppletTrap Zhang Hong Trend Micro, AppletTrap Team (Nanjing)
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Let’s Talk About Cyber Security
Chapter 17: WEB COMPONENTS
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
1 of 4 Malicious software, also known as “malware,” is often only a nuisance, but increasingly, malicious software can damage data, computers, and computer.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Web server security Dr Jim Briggs WEBP security1.
Computer Security and Penetration Testing
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Introduction to Network Security © N. Ganesan, Ph.D.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Client Side Vulnerabilities Aka, The Perils of HTTP Lesson 14.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chapter 1 The need for security Computerized trend (all kind of information are in the database) Information passing through Internet.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
1 Mobile Code l Java Review –Java code is platform independent and runs within a “sandbox”, or a set of restrictions that keep downloaded applets from.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Introduction to Network Security. Acknowledgements.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Computer Virus’s.
Malware, Phishing and Network Policies
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Windows Vista Inside Out
Presentation transcript:

Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003

Mobile Code And Mobile Code Security

Part I What is mobile code?

First, What Is Code?  Code is a series of commands, and (usually) contains no or little information.  Code can be executed, and running code most often requires some outside information (data) to work on.  Programs, applications, operating systems, games, calculators, media players, word processors and viruses are examples of code.  Resumes, pictures, videos, music, lists of numbers, and your ex-girlfriend’s social security number are examples of data. And how is it different from data?

 Today, we constantly download or make web pages, movies, music and pictures then send them to friends and family. Data has definitely been successfully mobilized.  If I download Half-life, install and play it on my computer, then FTP it to a friend so he can install and play it*, could we then say that Half- life counts as mobile code? Enter the Internet * Legal battle with Sierra sold seperately

Mobile code is…  a general term used to refer to processes (executable code) that migrate and execute at remote hosts  any code that is specifically designed to be able to transport itself from one machine to another

Mobile code is…  a general term used to refer to processes (executable code) that migrate and execute at remote hosts  any code that is specifically designed to be able to transport itself from one machine to another

Mobile code is…  able to transport itself  fairly autonomous  often platform-independent  code that is moved from one host to another with or without interaction with the user

Examples of mobile code  Java applets and Java scripts  ActiveX controls  Visual Basic macros and scripts  Dynamic  Viruses, trojan horses, worms  The agents in The Matrix

 Instead of moving large amounts of data around, move the computation to the data.  Add functionality anywhere anytime  Make distributed systems simpler, more flexible  Natural for network software What is mobile code good for?

Every rose… What is the problem with mobile code? SECURITY

Part II Mobile Code Security

A Tale of Two Problems  Malicious Code Problem  Malicious Host Problem

Malicious Code Problem  Mobile code that arrives at your workstation and intentionally or unintentionally causes you harm  Four attack classes: –invasion of privacy –denial of service –antagonism –system modification

Example?  Antagonism –meant to annoy or show off –no real damage to files or system –display of unwanted graphics or text  System modification –deletion of data or system files –capturing hard drive space – for e.g. to host shareware server

Example?  Invasion of privacy –read surfing history –read directory listings –steal files  Denial of service –re-aim browser –stealing CPU cycles –Web spoofing

Web Spoofing - example  Steal control of user’s view of web and simulate normal operation  Classic man-in-the-middle attack

Mobile code is smart  A firewall attempts to “block” Java in HTML by scanning port 80 (HTTP port) for the tag  Javascript can dynamically construct the tag once past the firewall

Counter-measures

 Java applets and Java scripts  ActiveX controls  Visual Basic macros and scripts  Dynamic  Viruses, trojan horses, worms  The agents in The Matrix Examples of mobile code

Microsoft’s security  (Yeah right!)  Internet site zones of trust  ActiveX control signing and marking  Macro signing  Attachment warnings

SUN’s JAVA 2 Security  Identity –Origin –Signature – not same as origin!  Policy –Set by user(!!) or system administrator (still bad)  Good ol’ Sandboxing  Signatures use variation of X.509v3

 Trusted third party that allows developers to digital sign their code  Consumers can feel safe in knowing that signed code is safe and has not been altered or tampered with – IF they trust the third party Verisign Digital Signing

 Verisign works with: - Microsoft Authenticode and VBA - Netscape Object Signing - Sun Java signing  Techniques used include industry- standard cryptographic methods learnt in class – like RSA and PKI

Questions?