author | cu |
Fri, 27 Oct 2017 23:57:21 +0100 | |
changeset 558 | 86334134abe5 |
parent 556 | e6e87d5839c0 |
permissions | -rw-r--r-- |
495 | 1 |
\PassOptionsToPackage{bookmarks=false}{hyperref} |
2 |
\documentclass[dvipsnames,14pt,t,hyperref={bookmarks=false}]{beamer} |
|
3 |
\usepackage{../style} |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
4 |
\usepackage{../slides} |
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
5 |
\usepackage{../graphics} |
495 | 6 |
\usepackage{../langs} |
7 |
\usepackage{../data} |
|
8 |
\usetikzlibrary{arrows} |
|
9 |
\usetikzlibrary{shapes} |
|
59 | 10 |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
11 |
\setmonofont[Scale=.88]{Consolas} |
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
12 |
\newfontfamily{\consolas}{Consolas} |
59 | 13 |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
14 |
\hfuzz=220pt |
126
b091e0abb894
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
90
diff
changeset
|
15 |
|
59 | 16 |
% beamer stuff |
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
17 |
\newcommand{\bl}[1]{\textcolor{blue}{#1}} |
495 | 18 |
\renewcommand{\slidecaption}{SEN 05, King's College London} |
19 |
||
59 | 20 |
|
21 |
\begin{document} |
|
22 |
||
23 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
24 |
\begin{frame}[t] |
59 | 25 |
\frametitle{% |
26 |
\begin{tabular}{@ {}c@ {}} |
|
27 |
\\ |
|
381
036a762b02cf
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
370
diff
changeset
|
28 |
\LARGE Security Engineering (6)\\[-3mm] |
59 | 29 |
\end{tabular}}\bigskip\bigskip\bigskip |
30 |
||
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
31 |
\normalsize |
59 | 32 |
\begin{center} |
33 |
\begin{tabular}{ll} |
|
34 |
Email: & christian.urban at kcl.ac.uk\\ |
|
518 | 35 |
Office: & N7.07 (North Wing, Bush House)\\ |
59 | 36 |
Slides: & KEATS (also homework is there)\\ |
37 |
\end{tabular} |
|
38 |
\end{center} |
|
39 |
||
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
40 |
\end{frame} |
279
5616e664c020
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
278
diff
changeset
|
41 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
42 |
|
495 | 43 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
44 |
\begin{frame}[c] |
|
45 |
\frametitle{Topical Slide} |
|
46 |
||
47 |
\begin{itemize} |
|
48 |
\item DoS attack agains some US webpages (hijacked IoT devives, like |
|
49 |
cameras,\ldots) |
|
50 |
||
51 |
\item funny cow attack (privilege escalation attack) |
|
52 |
\end{itemize} |
|
53 |
||
54 |
\end{frame} |
|
55 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
280
b732a63c17b8
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
279
diff
changeset
|
56 |
|
495 | 57 |
|
58 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
59 |
\begin{frame}[c] |
|
60 |
\frametitle{Trusted Third Parties} |
|
61 |
||
62 |
Simple protocol for establishing a secure connection via a |
|
63 |
mutually trusted 3rd party (server): |
|
64 |
||
65 |
\begin{center} |
|
66 |
\begin{tabular}{r@ {\hspace{1mm}}l} |
|
67 |
\bl{$A \rightarrow S :$} & \bl{$A, B$}\\ |
|
68 |
\bl{$S \rightarrow A :$} & \bl{$\{K_{AB}, \{K_{AB}\}_{K_{BS}} \}_{K_{AS}}$}\\ |
|
69 |
\bl{$A \rightarrow B :$} & \bl{$\{K_{AB}\}_{K_{BS}} $}\\ |
|
70 |
\bl{$A \rightarrow B :$} & \bl{$\{m\}_{K_{AB}}$}\\ |
|
71 |
\end{tabular} |
|
72 |
\end{center} |
|
73 |
||
74 |
\end{frame} |
|
75 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
76 |
||
77 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
78 |
\begin{frame}[c] |
|
79 |
\frametitle{PKI: The Main Idea} |
|
80 |
||
81 |
\begin{itemize} |
|
82 |
\item the idea is to have a certificate authority (CA) |
|
83 |
\item you go to the CA to identify yourself |
|
84 |
\item CA: ``I, the CA, have verified that public key |
|
85 |
\bl{$P^{pub}_{Bob}$} belongs to Bob''\bigskip |
|
86 |
\item CA must be trusted by everybody\medskip |
|
87 |
\item certificates are time limited, and can be revoked |
|
88 |
||
89 |
\item What happens if CA issues a false certificate? Who pays in case of loss? (VeriSign |
|
90 |
explicitly limits liability to \$100.) |
|
91 |
\end{itemize} |
|
92 |
||
93 |
\end{frame} |
|
94 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
95 |
||
96 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
97 |
\begin{frame}[c] |
|
98 |
\frametitle{PKI: Chains of Trust} |
|
99 |
||
100 |
\begin{center} |
|
101 |
\begin{tikzpicture}[scale=1, |
|
102 |
node/.style={ |
|
103 |
rectangle,rounded corners=3mm, |
|
104 |
very thick,draw=black!50,minimum height=18mm, minimum width=23mm, |
|
105 |
top color=white,bottom color=black!20}] |
|
106 |
||
107 |
\node (A) at (0,0) [node] {}; |
|
108 |
\node [below right] at (A.north west) |
|
109 |
{\small\begin{tabular}{@{}l}CA\\Root Cert.\end{tabular}}; |
|
110 |
||
111 |
\node (B) at (4,0) [node] {}; |
|
112 |
\node [below right=1mm] at (B.north west) |
|
113 |
{\mbox{}\hspace{-1mm}\small |
|
114 |
\begin{tabular}{@{}l}Subordinate\\ CA\end{tabular}}; |
|
115 |
||
116 |
\node (C) at (8,0) [node] {}; |
|
117 |
\node [below right] at (C.north west) |
|
118 |
{\small\begin{tabular}{@{}l}Server\\ Bank.com\end{tabular}}; |
|
119 |
||
120 |
\draw [->,line width=4mm] (A) -- (B); |
|
121 |
\draw [->,line width=4mm] (B) -- (C); |
|
122 |
||
123 |
\node (D) at (6,-3) [node] {}; |
|
124 |
\node [below right] at (D.north west) |
|
125 |
{\small\begin{tabular}{@{}l}Browser\\ Root Store\end{tabular}}; |
|
126 |
||
127 |
\node (E) at (2,-3) [node] {}; |
|
128 |
\node [below right] at (E.north west) |
|
129 |
{\small\begin{tabular}{@{}l}Browser\\ Vendor\end{tabular}}; |
|
130 |
||
131 |
\draw [->,line width=4mm] (E) -- (D); |
|
132 |
\end{tikzpicture} |
|
133 |
\end{center} |
|
134 |
||
135 |
\begin{itemize} |
|
136 |
\item CAs make almost no money anymore, because of stiff |
|
137 |
competition |
|
138 |
\item browser companies are not really interested in security; |
|
139 |
only in market share |
|
140 |
\end{itemize} |
|
141 |
||
142 |
\end{frame} |
|
143 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
144 |
||
145 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
146 |
\begin{frame}[c] |
|
147 |
\frametitle{PKI: Weaknesses} |
|
148 |
||
149 |
CAs just cannot win (make any profit):\medskip |
|
150 |
||
151 |
\begin{itemize} |
|
152 |
\item there are hundreds of CAs, which issue millions of |
|
153 |
certificates and the error rate is small |
|
154 |
||
155 |
\item users (servers) do not want to pay or pay as little as |
|
156 |
possible\bigskip |
|
157 |
||
158 |
\item a CA can issue a certificate for any domain not needing |
|
159 |
any permission (CAs are meant to undergo audits, |
|
160 |
but\ldots DigiNotar) |
|
161 |
||
162 |
\item if a CA has issued many certificates, it ``becomes too |
|
163 |
big to fail'' |
|
164 |
||
165 |
\item Can we be sure CAs are not just frontends of some |
|
166 |
government organisation? |
|
167 |
||
168 |
\end{itemize} |
|
169 |
||
170 |
\end{frame} |
|
171 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
172 |
||
173 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
174 |
\begin{frame}[c] |
|
175 |
\frametitle{PKI: Weaknesses} |
|
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
176 |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
177 |
\begin{itemize} |
280
b732a63c17b8
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
279
diff
changeset
|
178 |
|
495 | 179 |
\item many certificates are issued via Whois, whether you own |
180 |
the domain\ldots if you hijacked a domain, it is easy to |
|
181 |
obtain certificates\medskip |
|
182 |
||
183 |
\item the revocation mechanism does not work (Chrome has given |
|
184 |
up on general revocation lists)\medskip |
|
185 |
||
186 |
\item lax approach to validation of certificates |
|
187 |
(Have you ever bypassed certification warnings?)\medskip |
|
188 |
||
189 |
\item sometimes you want to actually install invalid |
|
190 |
certificates (self-signed) |
|
191 |
||
192 |
\end{itemize} |
|
193 |
||
194 |
\end{frame} |
|
195 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
196 |
||
197 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
198 |
\begin{frame}[c] |
|
199 |
\frametitle{PKI: Attacks} |
|
200 |
||
201 |
\begin{itemize} |
|
202 |
||
203 |
\item Go directly after root certificates |
|
204 |
\begin{itemize} |
|
205 |
\item governments can demand private keys\smallskip |
|
206 |
\item 10 years ago it was estimated that breaking a 1024 bit |
|
207 |
key takes one year and costs 10 - 30 Mio \$; this is now |
|
208 |
reduced to 1 Mio \$ |
|
209 |
\end{itemize} |
|
210 |
||
211 |
\item Go after buggy implementations of certificate |
|
212 |
validation\smallskip |
|
213 |
||
214 |
\item Social Engineering |
|
215 |
\begin{itemize} |
|
216 |
\item in 2001 somebody pretended to be |
|
217 |
from Microsoft and asked for two code-signing |
|
218 |
certificates |
|
219 |
\end{itemize}\bigskip |
|
220 |
\end{itemize} |
|
221 |
||
222 |
\small The eco-system is completely broken (it relies on |
|
223 |
thousands of entities to do the right thing). Maybe DNSSEC |
|
224 |
where keys can be attached to domain names is a way out. |
|
225 |
||
226 |
\end{frame} |
|
227 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
228 |
||
229 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
230 |
\begin{frame}[c] |
|
231 |
\frametitle{Real Attacks} |
|
232 |
||
233 |
\begin{itemize} |
|
234 |
||
235 |
\item In 2011, DigiNotar (Dutch company) was the first CA that |
|
236 |
got compromised comprehensively, and where many |
|
237 |
fraudulent certificates were issued to the wild. It |
|
238 |
included approximately 300,000 IP addresses, mostly |
|
239 |
located in Iran. The attackers (in Iran?) were likely |
|
240 |
interested ``only'' in collecting gmail passwords.\medskip |
|
241 |
||
242 |
\item The Flame malware piggy-bagged on this attack by |
|
243 |
advertising malicious Windows updates to some targeted |
|
244 |
systems (mostly in Iran, Israel, Sudan). |
|
280
b732a63c17b8
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
279
diff
changeset
|
245 |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
246 |
\end{itemize} |
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
247 |
|
279
5616e664c020
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
278
diff
changeset
|
248 |
\end{frame} |
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
249 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
250 |
|
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
251 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
280
b732a63c17b8
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
279
diff
changeset
|
252 |
\begin{frame}[c] |
495 | 253 |
\frametitle{PKI is Broken} |
280
b732a63c17b8
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
279
diff
changeset
|
254 |
|
495 | 255 |
\begin{itemize} |
281
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
256 |
|
495 | 257 |
\item PKI and certificates are meant to protect you against |
258 |
MITM attacks, but if the attack occurs your are |
|
259 |
presented with a warning and you need to decide whether |
|
260 |
you are under attack.\medskip |
|
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
261 |
|
495 | 262 |
\item Webcontent gets often loaded from 3rd-party servers, |
263 |
which might not be secured\medskip |
|
264 |
||
265 |
\item Misaligned incentives: browser vendors are not |
|
266 |
interested in breaking webpages with invalid |
|
267 |
certificates |
|
129
10526c967679
added slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
128
diff
changeset
|
268 |
|
495 | 269 |
\end{itemize} |
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
270 |
|
280
b732a63c17b8
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
279
diff
changeset
|
271 |
\end{frame} |
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
272 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
273 |
|
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
274 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
275 |
\begin{frame}[c] |
495 | 276 |
|
277 |
Why are there so many invalid certificates?\bigskip |
|
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
278 |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
279 |
\begin{itemize} |
495 | 280 |
|
281 |
\item insufficient name coverage (www.example.com should |
|
282 |
include example.com) |
|
283 |
||
284 |
\item IoT: many appliances have web-based admin interfaces; |
|
285 |
the manufacturer cannot know under which IP and domain name |
|
286 |
the appliances are run (so cannot install a valid certificate) |
|
287 |
||
288 |
\item expired certificates, or incomplete chains of trust |
|
289 |
(servers are supposed to supply them) |
|
290 |
||
291 |
\end{itemize} |
|
292 |
||
293 |
\end{frame} |
|
294 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
281
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
295 |
|
495 | 296 |
% |
297 |
% |
|
298 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
299 |
%\begin{frame}[c] |
|
300 |
%\frametitle{Best Practices} |
|
301 |
% |
|
302 |
%{\bf Principle 1:} Every message should say what it means: the |
|
303 |
%interpretation of a message should not depend on the |
|
304 |
%context.\bigskip\pause |
|
305 |
% |
|
306 |
%{\bf Principle 2:} If the identity of a principal is essential |
|
307 |
%to the meaning of a message, it is prudent to mention the |
|
308 |
%principal’s name explicitly in the message (though |
|
309 |
%difficult).\bigskip |
|
310 |
% |
|
311 |
%\end{frame} |
|
312 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
313 |
% |
|
314 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
315 |
%\begin{frame}[c] |
|
316 |
%\frametitle{Best Practices} |
|
317 |
% |
|
318 |
%{\bf Principle 3:} Be clear about why encryption is being |
|
319 |
%done. Encryption is not wholly cheap, and not asking precisely |
|
320 |
%why it is being done can lead to redundancy. Encryption is not |
|
321 |
%synonymous with security. % |
|
322 |
% |
|
323 |
%\small |
|
324 |
%\begin{center} |
|
325 |
%Possible Uses of Encryption % |
|
326 |
% |
|
327 |
%\begin{itemize} |
|
328 |
%\item Preservation of confidentiality: \bl{$\{X\}_K$} only those that have \bl{$K$} may recover \bl{$X$}. %\item Guarantee authenticity: The partner is indeed some particular principal. %\item Guarantee confidentiality and authenticity: binds two parts of a message --- |
|
329 |
%\bl{$\{X,Y\}_K$} is not the same as \bl{$\{X\}_K$} and \bl{$\{Y\}_K$}. |
|
330 |
%\end{itemize} |
|
331 |
%\end{center} |
|
332 |
% |
|
333 |
%\end{frame} |
|
334 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
335 |
% |
|
336 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
337 |
%\begin{frame}[c] |
|
338 |
%\frametitle{Best Practices} |
|
339 |
% |
|
340 |
%{\bf Principle 4:} The protocol designers should know which |
|
341 |
%trust relations their protocol depends on, and why the |
|
342 |
%dependence is necessary. The reasons for particular trust |
|
343 |
%relations being acceptable should be explicit though they will |
|
344 |
%be founded on judgment and policy rather than on |
|
345 |
%logic.\bigskip |
|
346 |
% |
|
347 |
% %Example Certification Authorities: CAs are trusted to certify |
|
348 |
%a key only after proper steps have been taken to identify the |
|
349 |
%principal that owns it. |
|
350 |
% |
|
351 |
%\end{frame} |
|
352 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
353 |
% |
|
354 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
355 |
%\begin{frame}[c] |
|
356 |
%\frametitle{Formal Methods} |
|
357 |
% |
|
358 |
%Ross Anderson about the use of Logic:\bigskip |
|
359 |
% |
|
360 |
%\begin{quote} |
|
361 |
%Formal methods can be an excellent way of finding |
|
362 |
%bugs in security protocol designs as they force the designer |
|
363 |
%to make everything explicit and thus confront difficult design |
|
364 |
%choices that might otherwise be fudged. |
|
365 |
%\end{quote} |
|
366 |
% |
|
367 |
%\end{frame} |
|
368 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
369 |
% |
|
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
370 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
371 |
\begin{frame}[c] |
495 | 372 |
\frametitle{Mid-Term} |
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
373 |
|
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
374 |
\begin{itemize} |
495 | 375 |
\item homework, handouts, programs\ldots |
376 |
\end{itemize}\bigskip\bigskip\bigskip |
|
377 |
||
378 |
\begin{center} |
|
379 |
{\huge\bf\alert{Any Questions?}} |
|
380 |
\end{center} |
|
381 |
||
382 |
\end{frame} |
|
383 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
281
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
384 |
|
495 | 385 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
386 |
\begin{frame}[c] |
|
387 |
\frametitle{Security Engineering} |
|
388 |
||
389 |
\begin{center} |
|
390 |
\begin{tabular}{cc} |
|
391 |
\raisebox{-0.8mm}{\includegraphics[scale=0.28]{../pics/flight.jpg}} & |
|
392 |
\includegraphics[scale=0.31]{../pics/airbus.jpg}\\ |
|
393 |
\small Wright brothers, 1901 & \small Airbus, 2005 \\ |
|
394 |
\end{tabular} |
|
395 |
\end{center} |
|
281
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
396 |
|
495 | 397 |
\end{frame} |
398 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
126
b091e0abb894
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
90
diff
changeset
|
399 |
|
60 | 400 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
401 |
\begin{frame}[c] |
|
495 | 402 |
\frametitle{1st Lecture} |
60 | 403 |
|
495 | 404 |
\begin{itemize} |
405 |
\item chip-and-pin, banks vs.~customers |
|
406 |
\begin{quote}\small\rm |
|
407 |
the one who can improve security should also be |
|
408 |
liable for the losses |
|
409 |
\end{quote}\pause\bigskip |
|
410 |
||
411 |
\item hashes and salts to guarantee data integrity\medskip |
|
412 |
\item storing passwords (you should know the difference between |
|
413 |
brute force attacks and dictionary attacks; how do salts help?) |
|
414 |
\end{itemize} |
|
415 |
||
416 |
\end{frame} |
|
417 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
282
4a0071e26cb5
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
281
diff
changeset
|
418 |
|
495 | 419 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
420 |
\begin{frame}[c] |
|
421 |
\frametitle{1st Lecture: Cookies} |
|
422 |
||
423 |
\begin{itemize} |
|
424 |
\item good uses of cookies?\medskip |
|
60 | 425 |
|
495 | 426 |
\item bad uses of cookies: snooping, tracking, profiling\ldots |
427 |
the ``disadvantage'' is that the user is in |
|
428 |
\alert{control}, because you can delete them |
|
429 |
||
430 |
\begin{center} ``Please track me using cookies.'' |
|
431 |
\end{center}\bigskip\pause |
|
432 |
||
433 |
\item fingerprinting beyond browser cookies |
|
434 |
\begin{quote}\small\rm |
|
435 |
Pixel Perfect: Fingerprinting Canvas in HTML5\\ |
|
436 |
(a research paper from 2012)\\ |
|
437 |
\footnotesize |
|
438 |
\url{http://cseweb.ucsd.edu/~hovav/papers/ms12.html} |
|
439 |
\end{quote} |
|
440 |
\end{itemize} |
|
281
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
441 |
|
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
442 |
\end{frame} |
495 | 443 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
444 |
||
445 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
446 |
\begin{frame}[c] |
|
447 |
\frametitle{1st Lecture: Cookies} |
|
448 |
||
449 |
\begin{itemize} |
|
450 |
\item a bit of JavaScript and HTML5 + canvas\medskip |
|
451 |
\begin{center} |
|
452 |
\begin{tabular}{cc} |
|
453 |
Firefox & Safari\\ |
|
454 |
\includegraphics[scale=0.31]{../pics/firefox1.png} & |
|
455 |
\includegraphics[scale=0.31]{../pics/safari1.png} \\ |
|
456 |
\tiny |
|
457 |
\pcode{55b2257ad0f20ecbf927fb66a15c61981f7ed8fc} & |
|
458 |
\tiny |
|
459 |
\pcode{17bc79f8111e345f572a4f87d6cd780b445625d3} |
|
460 |
\end{tabular} |
|
461 |
\end{center}\bigskip |
|
462 |
||
463 |
\item\small no actual drawing needed\pause |
|
464 |
\item\small in May 2014 a crawl of 100,000 popular |
|
465 |
webpages revealed 5.5\% already use canvas |
|
466 |
fingerprinting\smallskip |
|
467 |
\begin{center}\scriptsize |
|
468 |
\url{https://securehomes.esat.kuleuven.be/~gacar/persistent/the_web_never_forgets.pdf} |
|
469 |
\end{center} |
|
470 |
\end{itemize} |
|
471 |
||
472 |
\end{frame} |
|
473 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
474 |
||
475 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
476 |
\begin{frame}[c] |
|
477 |
\frametitle{1st Lecture: Cookies} |
|
478 |
||
479 |
Remember the small web-app I showed you where a cookie |
|
480 |
protected a counter?\bigskip |
|
481 |
||
482 |
\begin{itemize} |
|
483 |
\item NYT, the cookie looks the ``resource'' - harm\medskip |
|
484 |
\item imaginary discount unlocked by cookie - no harm |
|
485 |
\end{itemize} |
|
486 |
||
487 |
\end{frame} |
|
488 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
130
4e8482e50590
more slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
129
diff
changeset
|
489 |
|
282
4a0071e26cb5
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
281
diff
changeset
|
490 |
|
4a0071e26cb5
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
281
diff
changeset
|
491 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
495 | 492 |
\begin{frame}[t] |
493 |
\frametitle{2nd Lecture: E-Voting} |
|
494 |
||
495 |
Where are paper ballots better than voice voting?\bigskip |
|
496 |
||
497 |
\begin{itemize} |
|
498 |
\item Integrity |
|
499 |
\item \alert{Ballot Secrecy} |
|
500 |
\item Voter Authentication |
|
501 |
\item Enfranchisement |
|
502 |
\item Availability |
|
503 |
\end{itemize} |
|
504 |
||
505 |
\end{frame} |
|
506 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
507 |
||
508 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
509 |
\begin{frame}[t] |
|
510 |
\frametitle{2nd Lecture: E-Voting} |
|
511 |
||
512 |
\begin{itemize} |
|
513 |
\item recently an Australian parliamentary committee |
|
514 |
found: e-voting is highly vulnerable to hacking and Australia |
|
515 |
will not use it any time soon\bigskip\pause |
|
516 |
\item Alex Halderman, Washington D.C.~hack |
|
282
4a0071e26cb5
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
281
diff
changeset
|
517 |
\begin{center} |
495 | 518 |
\scriptsize |
519 |
\url{https://jhalderm.com/pub/papers/dcvoting-fc12.pdf} |
|
520 |
\end{center}\medskip |
|
521 |
||
522 |
\item PDF-ballot tampering at the wireless router (the modification |
|
523 |
is nearly undetectable and leaves no traces; MITM attack with firmware |
|
524 |
updating) |
|
525 |
\begin{center} |
|
526 |
\scriptsize |
|
527 |
\url{http://galois.com/wp-content/uploads/2014/11/technical-hack-a-pdf.pdf} |
|
282
4a0071e26cb5
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
281
diff
changeset
|
528 |
\end{center} |
4a0071e26cb5
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
281
diff
changeset
|
529 |
|
495 | 530 |
\end{itemize} |
282
4a0071e26cb5
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
281
diff
changeset
|
531 |
|
4a0071e26cb5
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
281
diff
changeset
|
532 |
\end{frame} |
495 | 533 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
282
4a0071e26cb5
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
281
diff
changeset
|
534 |
|
4a0071e26cb5
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
281
diff
changeset
|
535 |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
536 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
495 | 537 |
\tikzset{alt/.code args={<#1>#2#3#4}{% |
538 |
\alt<#1>{\pgfkeysalso{#2}}{\pgfkeysalso{#3}} % \pgfkeysalso doesn't change the path |
|
539 |
}} |
|
540 |
||
541 |
\begin{frame}[t] |
|
542 |
\frametitle{\begin{tabular}{c}3rd Lecture:\\ Buffer Overflow Attacks\end{tabular}} |
|
543 |
||
544 |
\begin{itemize} |
|
545 |
\item the problem arises from the way C/C++ organises its function calls\\[-8mm]\mbox{} |
|
546 |
\end{itemize} |
|
130
4e8482e50590
more slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
129
diff
changeset
|
547 |
|
495 | 548 |
\begin{center} |
549 |
\begin{tikzpicture}[scale=1] |
|
550 |
%\draw[black!10,step=2mm] (0,0) grid (9,4); |
|
551 |
%\draw[black!10,thick,step=10mm] (0,0) grid (9,4); |
|
552 |
||
553 |
\node at (0.5,4.5) {\small\begin{tabular}{l}main\\[-2mm] prog.\end{tabular}}; |
|
554 |
\draw[line width=0mm, white, alt=<2->{fill=red}{fill=blue}] (0,2.5) rectangle (1,3.8); |
|
555 |
\draw[line width=0mm, white, alt=<9->{fill=red}{fill=blue}] (0,0.2) rectangle (1,0.5); |
|
556 |
\draw[line width=1mm, alt=<3->{fill=yellow}{fill=blue}] (0,2.0) rectangle (1,2.5); |
|
557 |
\draw[line width=1mm, alt=<6->{fill=red}{fill=blue}] (0,1.0) rectangle (1,2.0); |
|
558 |
\draw[line width=1mm, alt=<7->{fill=yellow}{fill=blue}] (0,0.5) rectangle (1,1.0); |
|
559 |
\draw[line width=1mm] (0,0) -- (0,4); |
|
560 |
\draw[line width=1mm] (1,0) -- (1,4); |
|
561 |
||
562 |
\node at (3.5,3.5) {\small\begin{tabular}{l}fact(n)\end{tabular}}; |
|
563 |
\draw[line width=1mm, alt=<{4-5,8}>{fill=red}{fill=blue}] (3,1.0) rectangle (4,3.0); |
|
130
4e8482e50590
more slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
129
diff
changeset
|
564 |
|
495 | 565 |
\onslide<3-4>{\draw[->, line width=1mm,red] (1,2.3) to node [above,sloped,midway] {n=4} (3,3);} |
566 |
\onslide<5>{\draw[<-, line width=1mm,red] (1,2.3) to node [above,sloped,midway] {res=24} (3,1);} |
|
567 |
||
568 |
\onslide<7-8>{\draw[->, line width=1mm,red] (1,0.8) to node [above,sloped,midway] {n=3} (3,3);} |
|
569 |
\onslide<9>{\draw[<-, line width=1mm,red] (1,0.8) to node [above,sloped,midway] {res=6} (3,1);} |
|
570 |
||
571 |
||
572 |
\node at (7.75,3.9) {\small\begin{tabular}{l}stack\end{tabular}}; |
|
573 |
\draw[line width=1mm] (7,3.5) -- (7,0.5) -- (8.5,0.5) -- (8.5,3.5); |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
574 |
|
495 | 575 |
\onslide<3,4,7,8>{ |
576 |
\node at (7.75, 1.4) {ret}; |
|
577 |
\draw[line width=1mm] (7,1.1) -- (8.5,1.1); |
|
578 |
\node at (7.75, 2.0) {sp}; |
|
579 |
\draw[line width=1mm] (7,2.3) -- (8.5,2.3); |
|
580 |
} |
|
581 |
\onslide<3,4>{ |
|
582 |
\node at (7.75, 0.8) {4}; |
|
583 |
\draw[line width=1mm] (7,1.7) -- (8.5,1.7); |
|
584 |
} |
|
585 |
\onslide<7,8>{ |
|
586 |
\node at (7.75, 0.8) {3}; |
|
587 |
\draw[line width=1mm] (7,1.7) -- (8.5,1.7); |
|
588 |
} |
|
589 |
||
590 |
||
591 |
\end{tikzpicture} |
|
592 |
\end{center} |
|
130
4e8482e50590
more slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
129
diff
changeset
|
593 |
|
281
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
594 |
\end{frame} |
130
4e8482e50590
more slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
129
diff
changeset
|
595 |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
596 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
281
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
597 |
\begin{frame}[t] |
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
598 |
|
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
599 |
\begin{center} |
495 | 600 |
\begin{tikzpicture}[scale=1] |
601 |
%\draw[black!10,step=2mm] (0,0) grid (9,4); |
|
602 |
%\draw[black!10,thick,step=10mm] (0,0) grid (9,4); |
|
603 |
||
604 |
\node at (0.5,4.5) {\small\begin{tabular}{l}main\\[-2mm] prog.\end{tabular}}; |
|
605 |
\draw[line width=0mm, white, alt=<2->{fill=red}{fill=blue}] (0,2.5) rectangle (1,3.8); |
|
606 |
\draw[line width=1mm, white, fill=blue] (0,1.0) rectangle (1,2.0); |
|
607 |
\draw[line width=1mm, alt=<3->{fill=yellow}{fill=blue}] (0,2.0) rectangle (1,2.5); |
|
608 |
\draw[line width=1mm] (0,0) -- (0,4); |
|
609 |
\draw[line width=1mm] (1,0) -- (1,4); |
|
610 |
||
611 |
\node at (3.5,3.5) {\small\begin{tabular}{l}fact(n)\end{tabular}}; |
|
612 |
\draw[line width=0mm, alt=<{4-}>{red, fill=red}{blue, fill=blue}] (3,2.8) rectangle (4,3.0); |
|
613 |
\draw[line width=0mm, alt=<{5-}>{red, fill=red}{blue, fill=blue}] (3,2.8) rectangle (4,2.0); |
|
614 |
\draw[line width=0mm, alt=<{7-}>{red, fill=red}{blue, fill=blue}] (3,2.0) rectangle (4,1.0); |
|
615 |
\draw[line width=1mm] (3,1.0) rectangle (4,3.0); |
|
616 |
||
617 |
\onslide<3->{\draw[->, line width=1mm,red] (1,2.3) to node [above,sloped,midway] {n=4} (3,3);} |
|
618 |
\onslide<5->{\draw[<-, line width=2mm,red] (4,2) to node [above,sloped,midway] |
|
619 |
{\begin{tabular}{l}user\\[-1mm] input\end{tabular}} (6,2);} |
|
620 |
\onslide<8->{\draw[<-, line width=1mm,red] (1,-2) to (3,1);} |
|
621 |
||
622 |
\node at (7.75,3.9) {\small\begin{tabular}{l}stack\end{tabular}}; |
|
623 |
\draw[line width=1mm] (7,3.5) -- (7,-0.1) -- (8.5,-0.1) -- (8.5,3.5); |
|
624 |
||
625 |
\onslide<3->{ |
|
626 |
\node at (7.75, 0.2) {4}; |
|
627 |
\draw[line width=1mm,alt=<6->{fill=red}{fill=white}] (7,0.5) rectangle (8.5,1.1); |
|
628 |
\node at (7.75, 0.8) {\alt<6->{@a\#}{ret}}; |
|
629 |
\draw[line width=1mm,alt=<6->{fill=red}{fill=white}] (7,1.1) rectangle (8.5,1.7); |
|
630 |
\node at (7.75, 1.4) {\alt<6->{!?w;}sp}; |
|
631 |
} |
|
632 |
||
633 |
\onslide<4->{ |
|
634 |
\draw[line width=1mm,fill=red] (7,1.7) rectangle (8.5,3.0); |
|
635 |
\node[white] at (7.75, 2.4) {buffer}; |
|
636 |
} |
|
637 |
||
281
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
638 |
\end{tikzpicture} |
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
639 |
\end{center} |
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
640 |
|
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
641 |
\end{frame} |
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
642 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
643 |
|
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
644 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
495 | 645 |
\begin{frame}[t] |
646 |
\frametitle{\begin{tabular}{c}3rd Lecture:\\[-3mm] |
|
647 |
Buffer Overflow Attacks\end{tabular}} |
|
130
4e8482e50590
more slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
129
diff
changeset
|
648 |
|
495 | 649 |
US National Vulnerability Database\\ |
650 |
\small(636 out of 6675 in 2014) |
|
60 | 651 |
|
495 | 652 |
\begin{center} |
653 |
\begin{tikzpicture} |
|
654 |
\begin{axis}[ |
|
655 |
xlabel={year}, |
|
656 |
ylabel={\% of total attacks}, |
|
657 |
ylabel style={yshift=0em}, |
|
658 |
enlargelimits=false, |
|
659 |
xtick={1997,1999,...,2015}, |
|
660 |
xmin=1996.5, |
|
661 |
xmax=2016, |
|
662 |
ymax=21, |
|
663 |
ytick={0,5,...,20}, |
|
664 |
scaled ticks=false, |
|
665 |
axis lines=left, |
|
666 |
width=11cm, |
|
667 |
height=5cm, |
|
668 |
ybar, |
|
669 |
nodes near coords= |
|
670 |
{\footnotesize |
|
671 |
$\pgfmathprintnumber[fixed,fixed zerofill,precision=1,use comma]{\pgfkeysvalueof{/data point/y}}$}, |
|
672 |
x tick label style={font=\scriptsize,/pgf/number format/1000 sep={}}] |
|
673 |
\addplot |
|
674 |
table [x=Year,y=Percentage] {../handouts/bufferoverflows.data}; |
|
675 |
\end{axis} |
|
676 |
\end{tikzpicture} |
|
677 |
\end{center} |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
678 |
|
495 | 679 |
\scriptsize |
680 |
\url{http://web.nvd.nist.gov/view/vuln/statistics} |
|
281
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
681 |
\end{frame} |
495 | 682 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
130
4e8482e50590
more slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
129
diff
changeset
|
683 |
|
281
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
684 |
|
130
4e8482e50590
more slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
129
diff
changeset
|
685 |
|
4e8482e50590
more slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
129
diff
changeset
|
686 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
495 | 687 |
\begin{frame}[t] |
688 |
\frametitle{\begin{tabular}{c}4th Lecture:\\ Unix Access Control\end{tabular}} |
|
130
4e8482e50590
more slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
129
diff
changeset
|
689 |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
690 |
\begin{itemize} |
495 | 691 |
\item privileges are specified by file access permissions (``everything is a file'') |
692 |
\end{itemize}\medskip |
|
130
4e8482e50590
more slides
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
129
diff
changeset
|
693 |
|
495 | 694 |
\begin{center} |
695 |
\begin{tikzpicture}[scale=1] |
|
696 |
||
697 |
\draw[line width=1mm] (-.3, 0) rectangle (1.5,2); |
|
698 |
\draw (4.7,1) node {Internet}; |
|
699 |
\draw (-2.7,1.7) node {\footnotesize Application}; |
|
700 |
\draw (0.6,1.7) node {\footnotesize Interface}; |
|
701 |
\draw (0.6,-0.4) node {\footnotesize \begin{tabular}{c}unprivileged\\[-1mm] process\end{tabular}}; |
|
702 |
\draw (-2.7,-0.4) node {\footnotesize \begin{tabular}{c}privileged\\[-1mm] process\end{tabular}}; |
|
703 |
||
704 |
\draw[line width=1mm] (-1.8, 0) rectangle (-3.6,2); |
|
705 |
||
706 |
\draw[white] (1.7,1) node (X) {}; |
|
707 |
\draw[white] (3.7,1) node (Y) {}; |
|
708 |
\draw[red, <->, line width = 2mm] (X) -- (Y); |
|
709 |
||
710 |
\draw[red, <->, line width = 1mm] (-0.6,1) -- (-1.6,1); |
|
711 |
\end{tikzpicture} |
|
712 |
\end{center} |
|
713 |
||
714 |
\begin{itemize} |
|
715 |
\item the idea is to make the attack surface smaller and |
|
716 |
mitigate the consequences of an attack |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
717 |
\end{itemize} |
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
718 |
|
294
5e8ffb58bdaa
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
283
diff
changeset
|
719 |
\end{frame} |
495 | 720 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
61 | 721 |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
722 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
495 | 723 |
\begin{frame}[fragile,t] |
724 |
\frametitle{\begin{tabular}{c}4th Lecture:\\ Unix Access Control\end{tabular}} |
|
61 | 725 |
|
495 | 726 |
\begin{itemize} |
727 |
\item when a file with setuid is executed, the resulting process will assume the |
|
728 |
UID given to the owner of the file |
|
729 |
\end{itemize} |
|
61 | 730 |
|
495 | 731 |
\footnotesize\tt |
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
732 |
\begin{center} |
495 | 733 |
\begin{verbatim} |
734 |
$ ls -ld . * */* |
|
735 |
drwxr-xr-x 1 ping staff 32768 Apr 2 2010 . |
|
736 |
-rw----r-- 1 ping students 31359 Jul 24 2011 manual.txt |
|
737 |
-r--rw--w- 1 bob students 4359 Jul 24 2011 report.txt |
|
738 |
-rwsr--r-x 1 bob students 141359 Jun 1 2013 microedit |
|
739 |
dr--r-xr-x 1 bob staff 32768 Jul 23 2011 src |
|
740 |
-rw-r--r-- 1 bob staff 81359 Feb 28 2012 src/code.c |
|
741 |
-r--rw---- 1 emma students 959 Jan 23 2012 src/code.h |
|
742 |
\end{verbatim} |
|
277
d6dc6f0e3556
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
135
diff
changeset
|
743 |
\end{center} |
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
744 |
|
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
745 |
|
495 | 746 |
\end{frame} |
747 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
|
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
748 |
|
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
749 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
495 | 750 |
\begin{frame}[t] |
751 |
\frametitle{\begin{tabular}{c}4th Lecture:\\ Unix Access Control\end{tabular}} |
|
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
752 |
|
495 | 753 |
\begin{itemize} |
754 |
\item Alice wants to have her files readable, |
|
755 |
\alert{except} for her office mates.\bigskip |
|
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
756 |
|
495 | 757 |
\item make sure you understand the setuid and setgid bits; |
758 |
why are they necessary for login and passwd |
|
759 |
\end{itemize} |
|
128
4e108563716c
added
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
126
diff
changeset
|
760 |
|
281
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
761 |
|
98403100cea7
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
280
diff
changeset
|
762 |
\end{frame} |
495 | 763 |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
423
11b46fa92a85
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
422
diff
changeset
|
764 |
|
11b46fa92a85
updated
Christian Urban <christian dot urban at kcl dot ac dot uk>
parents:
422
diff
changeset
|
765 |
|
59 | 766 |
\end{document} |
767 |
||
768 |
%%% Local Variables: |
|
769 |
%%% mode: latex |
|
770 |
%%% TeX-master: t |
|
771 |
%%% End: |
|
772 |