Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.

Similar presentations


Presentation on theme: "Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003."— Presentation transcript:

1 Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003

2 Mobile Code And Mobile Code Security

3 Part I What is mobile code?

4 First, What Is Code?  Code is a series of commands, and (usually) contains no or little information.  Code can be executed, and running code most often requires some outside information (data) to work on.  Programs, applications, operating systems, games, calculators, media players, word processors and viruses are examples of code.  Resumes, pictures, videos, music, lists of numbers, and your ex-girlfriend’s social security number are examples of data. And how is it different from data?

5  Today, we constantly download or make web pages, movies, music and pictures then send them to friends and family. Data has definitely been successfully mobilized.  If I download Half-life, install and play it on my computer, then FTP it to a friend so he can install and play it*, could we then say that Half- life counts as mobile code? Enter the Internet * Legal battle with Sierra sold seperately

6 Mobile code is…  a general term used to refer to processes (executable code) that migrate and execute at remote hosts  any code that is specifically designed to be able to transport itself from one machine to another

7 Mobile code is…  a general term used to refer to processes (executable code) that migrate and execute at remote hosts  any code that is specifically designed to be able to transport itself from one machine to another

8 Mobile code is…  able to transport itself  fairly autonomous  often platform-independent  code that is moved from one host to another with or without interaction with the user

9 Examples of mobile code  Java applets and Java scripts  ActiveX controls  Visual Basic macros and scripts  Dynamic e-mail  Viruses, trojan horses, worms  The agents in The Matrix

10  Instead of moving large amounts of data around, move the computation to the data.  Add functionality anywhere anytime  Make distributed systems simpler, more flexible  Natural for network software What is mobile code good for?

11 Every rose… What is the problem with mobile code? SECURITY

12 Part II Mobile Code Security

13 A Tale of Two Problems  Malicious Code Problem  Malicious Host Problem

14 Malicious Code Problem  Mobile code that arrives at your workstation and intentionally or unintentionally causes you harm  Four attack classes: –invasion of privacy –denial of service –antagonism –system modification

15 Example?  Antagonism –meant to annoy or show off –no real damage to files or system –display of unwanted graphics or text  System modification –deletion of data or system files –capturing hard drive space – for e.g. to host shareware server

16 Example?  Invasion of privacy –read surfing history –read directory listings –steal files  Denial of service –re-aim browser –stealing CPU cycles –Web spoofing

17 Web Spoofing - example  Steal control of user’s view of web and simulate normal operation  Classic man-in-the-middle attack

18 Mobile code is smart  A firewall attempts to “block” Java in HTML by scanning port 80 (HTTP port) for the tag  Javascript can dynamically construct the tag once past the firewall

19 Counter-measures

20  Java applets and Java scripts  ActiveX controls  Visual Basic macros and scripts  Dynamic e-mail  Viruses, trojan horses, worms  The agents in The Matrix Examples of mobile code

21 Microsoft’s security  (Yeah right!)  Internet site zones of trust  ActiveX control signing and marking  Macro signing  Attachment warnings

22 SUN’s JAVA 2 Security  Identity –Origin –Signature – not same as origin!  Policy –Set by user(!!) or system administrator (still bad)  Good ol’ Sandboxing  Signatures use variation of X.509v3

23  Trusted third party that allows developers to digital sign their code  Consumers can feel safe in knowing that signed code is safe and has not been altered or tampered with – IF they trust the third party Verisign Digital Signing

24  Verisign works with: - Microsoft Authenticode and VBA - Netscape Object Signing - Sun Java signing  Techniques used include industry- standard cryptographic methods learnt in class – like RSA and PKI

25 Questions?


Download ppt "Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003."

Similar presentations


Ads by Google