Buffer Overflow Attacks Figure 9-21. (a) Situation when the main program is running. (b) After the procedure A has been called. (c) Buffer overflow shown.

Slides:



Advertisements
Similar presentations
Chapter 3 Memory Management
Advertisements

Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 10: Buffer Overflow.
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 3 Memory Management Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
The Web Warrior Guide to Web Design Technologies
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
1 Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Security Chapter The security environment 9.2 Basics of cryptography 9.3 User authentication 9.4 Attacks from inside the system 9.5 Attacks from.
Chapter 1 Introduction
Chapter 9 Security Authentication Insider Attacks Exploiting Code Bugs.
Chapter 2 Processes and Threads Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall, Inc. All rights reserved
File System Implementation
Virtualization and the Cloud
Virtualization and the Cloud
Chapter 5 System Software.
Chapter 5 Input/Output I/O Hardware I/O Software Software Layers Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall, Inc. All rights.
Chapter 9 Security Malware Defenses. Malware Can be used for a form of blackmail. Example: Encrypts files on victim disk, then displays message.
Buffer Overflow Attacks. Memory plays a key part in many computer system functions. It’s a critical component to many internal operations. From mother.
Page 1 Sandboxing & Signed Software Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Tanenbaum 8.3 See references
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 11 Case Study 2: Windows Vista Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
HTML, XHTML, and CSS Chapter 12 Creating and Using XML Documents.
Computer Security and Penetration Testing
Introduction to Operating Systems Chapter 1. cs431 -cotter2 Lecture Objectives Understand the relationship between computing hardware, operating system,
Attacking Applications: SQL Injection & Buffer Overflows.
© Copyright by Deitel & Associates, Inc. and Pearson Education Inc. All Rights Reserved. 1 Tutorial 27 - Phone Book Application Introducing Multimedia.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Security. cs431-cotter2 Figure 9-1. Security goals and threats. Threats Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall, Inc. All rights.
Memory Management 3 Tanenbaum Ch. 3 Silberschatz Ch. 8,9.
Security Malware and Defenses Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Hardware process When the computer is powered up, it begins to execute fetch-execute cycle for the program that is stored in memory at the boot strap entry.
Topic 2d High-Level languages and Systems Software
Outline for Today’s Lecture Administrative: –Potential extension on Program 4 (not on webpage yet) Thursday Dec. 15 at 11:59pm (1 week more) –Exam will.
Practical PC, 7 th Edition Chapter 4: File Basics.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Internet & World Wide Web How to Program, 5/e © by Pearson Education, Inc. All Rights Reserved.
PHP Error Handling & Reporting. Error Handling Never allow a default error message or error number returned by the mysql_error() and mysql_errno() functions.
Chapter 5 Introduction To Form Builder. Lesson A Objectives  Display Forms Builder forms in a Web browser  Use a data block form to view, insert, update,
Hardware process When the computer is powered up, it begins to execute fetch-execute cycle for the program that is stored in memory at the boot strap entry.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Introducing Dreamweaver. Dreamweaver The web development application used to create web pages Part of the Adobe creative suite.
Creating and Editing a Web Page
W elcome to our Presentation. Presentation Topic Virus.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Security Attacks Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 11, 2011.
Chapter 1 Introduction  What is an operating system  History of operating systems  The operating system zoo  Computer hardware review  Operating system.
Creating and Editing a Web Page Using Inline Styles
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
1 /22 Accessing TaxWise Online © 2006, Universal Tax Systems, Inc. All Rights Reserved. Accessing TaxWise Online Objectives –In this chapter you will learn.
Systems Software. Systems software Applications software such as word processing, spreadsheet or graphics packages Operating systems software to control.
Beyond Stack Smashing: Recent Advances In Exploiting Buffer Overruns Jonathan Pincus and Brandon Baker Microsoft Researchers IEEE Security and.
CS703 - Advanced Operating Systems By Mr. Farhan Zaidi.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Chapter 9 Security 9.1 The security environment
MODERN OPERATING SYSTEMS Third Edition ANDREW S
Interrupts and signals
MODERN OPERATING SYSTEMS Third Edition ANDREW S
Naming and Saving Files
Protection of System Resources
OPERATING SYSTEMS CS 3502 Fall 2017
System Calls Richard Newman University of Florida.
Chapter 9 Security 9.1 The security environment
Variables and Arithmetic Operations
CS 465 Buffer Overflow Slides by Kent Seamons and Tim van der Horst
Format String.
New Perspectives on Windows XP
Operating Systems Tasks 17/02/2019.
Presentation transcript:

Buffer Overflow Attacks Figure (a) Situation when the main program is running. (b) After the procedure A has been called. (c) Buffer overflow shown in gray. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Avoiding Stack Canaries Figure Skipping the stack canary: by modifying len first, the attack is able to bypass the canary and modify the return address directly. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Code Reuse Attacks Figure Return- oriented programming: linking gadgets Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Format String Attacks Figure A format string attack. By using exactly the right number of %08x, the attacker can use the first four characters of the format string as an address. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Command Injection Attacks Figure Code that might lead to a command injection attack. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Back Doors Figure (a) Normal code. (b) Code with a back door inserted. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Login Spoofing Figure (a) Correct login screen. (b) Phony login screen. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Executable Program Viruses (1) Figure A recursive procedure that finds executable files on a UNIX system. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Executable Program Viruses (2) Figure A recursive procedure that finds executable files on a UNIX system. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Executable Program Viruses (3) Figure (a) An executable program. (b) With a virus at the front. (c) With a virus at the end. (d) With a virus spread over free space within the program. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Boot Sector Viruses Figure (a) After the virus has captured all the interrupt and trap vectors. (b) After the operating system has retaken the printer interrupt vector. (c) After the virus has noticed the loss of the printer interrupt vector and recaptured it. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Actions Taken by Spyware (1) 1. Change the browser’s home page. 2. Modify the browser’s list of favorite (bookmarked) pages. 3. Add new toolbars to the browser. 4. Change the user’s default media player. 5. Change the user’s default search engine. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Actions Taken by Spyware (2) 6. Add new icons to the Windows desktop. 7. Replace banner ads on Web pages with those the spyware picks. 8. Put ads in the standard Windows dialog boxes 9. Generate a continuous and unstoppable stream of pop-up ads. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Types of Rootkits (1) Five kinds of rootkits – issue is where do they hide? 1. Firmware rootkit 2. Hypervisor rootkit 3. Kernel rootkit 4. Library rootkit 5. Application rootkit Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Types of Rootkits (2) Figure Five places a rootkit can hide. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Firewalls Figure A simplified view of a hardware firewall protecting a LAN with three computers Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Virus Scanners (1) Figure (a) A program. (b) An infected program. (c) A compressed infected program. (d) An encrypted virus. (e) A compressed virus with encrypted compression code. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Virus Scanners (2) Figure Examples of a polymorphic virus. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Code Signing Figure How code signing works. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Jailing Figure The operation of a jail. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Model-Based Intrusion Detection Figure (a) A program. (b) System call graph for (a). Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Sandboxing Figure (a) Memory divided into 16-MB sandboxes. (b) One way of checking an instruction for validity. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Interpretation Figure Applets can be interpreted by a Web browser. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Java Security (1) Checks on applets include: 1. Does applet attempt to forge pointers? 2. Does it violate access restrictions on private- class members? 3. Does it try to use variable of one type as another? 4. Does it generate stack overflows or underflows? 5. Does it illegally convert variables of one type to another? Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

Java Security (2) Figure Some examples of protection that can be specified with JDK 1.2. Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.

End Chapter 9 Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.