COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure Alex Bardas. What is Cryptography ? Cryptography is a mathematical method of protecting information –Cryptography is part of,
Advertisements

Finding bugs: Analysis Techniques & Tools Symbolic Execution & Constraint Solving CS161 Computer Security Cho, Chia Yuan.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Moving Target Defense in Cyber Security
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Secure web browsers, malicious hardware, and hardware support for binary translation Sam King.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
WEB SECURITY. WEB ATTACK TYPES Buffer OverflowsXML InjectionsSession Hijacking Attacks WEB Attack Types.
Online Security Tuesday April 8, 2003 Maxence Crossley.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Cloud Computing & Security Issues Prepared by: Hamoud Al-Shammari CS 6910 Summer, 2011 University of Colorado at Colorado Springs Engineering & Applied.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Computer & Network Security
Computer Security and Penetration Testing
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
OSI and TCP/IP Models And Some Vulnerabilities AfNOG th May 2011 – 10 th June 2011 Tanzania By Marcus K. G. Adomey.
Attacking Applications: SQL Injection & Buffer Overflows.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Module 9: Fundamentals of Securing Network Communication.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Java Security Session 19. Java Security / 2 of 23 Objectives Discuss Java cryptography Explain the Java Security Model Discuss each of the components.
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 9 1COMP9321, 15s2, Week.
Wireless and Mobile Security
Final Exam Review. Common Attack Techniques Stack overflow – Basic version – Advanced versions Mitigations – Canary – W^X page – ASLR.
OWASP Building Secure Web Applications And the OWASP top 10 vulnerabilities.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
A Low Cost, Portable Platform for Information Assurance and Security Education Dan C. Lo, Kai Qian Department of Computer Science and Software Engineering.
Web Applications Security Cryptography 1
Trusted Computing and the Trusted Platform Module
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Security: Exploits & Countermeasures
Building a Trustworthy Computer
Secure Software Development: Theory and Practice
Exam Review.
OPERATING SYSTEMS CS 3502 Fall 2017
CS 465 Buffer Overflow Slides by Kent Seamons and Tim van der Horst
Lecture 10: Network Security.
CS5123 Software Validation and Quality Assurance
Outline Introduction Memory protection Buffer overflows
Security: Exploits & Countermeasures
Outline Introduction Memory protection Buffer overflows
Security: Attacks & Countermeasures
Presentation transcript:

COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012

Midterm Announcements  Wednesday April 11 in class  No cheat sheet Material 1. Video Lectures “Control hijacking attacks and defense(I)" until "Cross Site Scripting (31 min) (Due Apr 3)". 2. Labs Required in-class lectures 1. Mobile Security 2. Program Analysis & Verification 4. Required crypto notes

Survey!  Please fill out the surveys which we sent out over break!  These help us improve the class.

CONTROL HIJACKING

Control Hijacking Attacks  Buffer Overflows  Heap Overflows  Double Free  Function Pointer Clobbering  Arc Injection  Format Strings

Control Hijacking Defenses  Stack Canaries  Address Randomization  Executable Space Protection (W xor X)  JMP target verification  Return address stack

ISOLATION AND LEAST PRIVILEGE

Isolation and Least Privilege  chroot  Reference Monitor  Software Fault Isolation  Virtual Machines  Process Isolation  Capabilities  Access Control  Principle of Least Privilege  Confinement Principle

MOBILE COMPUTING

Mobile Computing  iOS/Android/Windows phone 7 security models  Isolation  Privilege management

FUZZING AND PROGRAM ANALYSIS

Reasoning on programs  Preconditions  Postconditions  Loop invariants  Memory allocation and memory safety  When/how are variables allocated in the heap/stack?  When/how do access violations occur on read/write?  Corner cases  Bitvector arithmetic  Type casting  Two’s complement representation of signed variables

Program Analysis  Program analysis  Soundness & Completeness of techniques  Symbolic execution and dynamic symbolic execution  Generate path conditions through SSA conversion  Solving path constraints for input values  Negation of branch conditions to go explore new paths  merging branch conditions into path constraints in purely static analysis  Fuzzing  whitebox and blackbox

TRUSTED COMPUTING AND HARDWARE ISOLATION

Trusted Computing  Trusted Platform Module (TPM)  Platform Configuration Registers  Virtual TPM  Trusted Boot  Dynamic Root of Trust  BitLocker  Windows 8 Secure Boot

CRYPTOGRAPHY

Cryptography  Symmetric and Asymmetric  encryption and decryption  Message Authentication Codes  Cryptographic hashes  Digital signatures  Understand what primitives are important for a given scenario.

Cryptography  Integrity, authenticity, authorization, privacy.  Cryptographic hardness  What is it? Where does it come from?  Certificates and certificate authorities  RSA algorithm

WEB SECURITY

Know your threats!  Web attacker  Control malicious site, which we may call “attacker.com”  Can obtain SSL/TLS certificate for attacker.com  User visits attacker.com Or: runs attacker’s Facebook app, site with attack ad, …  Network attacker  Passive: Wireless eavesdropper  Active: Evil router, DNS poisoning  Malware attacker  Attacker escapes browser isolation mechanisms and run separately under control of OS

Browser Operation  Understand the basics of how the browser works  Protocols, rendering, frames, etc.  Inter-domain communication  Browser isolation policies  Same Origin Policy

Web Session Management  How are sessions represented?  Cookies store session tokens  Unpredictability, randomness

Web Application Security  Know your injections  Command Executing system code  SQL Executing database queries  XSS Executing scripts in a browser as another web site  Note: No CSRF