CS 161: Computer Security Prof. Vern Paxson TAs: Jethro Beekman, - - PowerPoint PPT Presentation

cs 161 computer security
SMART_READER_LITE
LIVE PREVIEW

CS 161: Computer Security Prof. Vern Paxson TAs: Jethro Beekman, - - PowerPoint PPT Presentation

CS 161: Computer Security Prof. Vern Paxson TAs: Jethro Beekman, Mobin Javed, Antonio Lupher, Paul Pearce & Matthias Vallentin http://inst.eecs.berkeley.edu/~cs161/ January 22, 2013 Course Size The course has a capacity (= room, TAs)


slide-1
SLIDE 1

CS 161: Computer Security

  • Prof. Vern Paxson

TAs: Jethro Beekman, Mobin Javed, Antonio Lupher, Paul Pearce & Matthias Vallentin

http://inst.eecs.berkeley.edu/~cs161/

January 22, 2013

slide-2
SLIDE 2

Course Size

  • The course has a capacity (= room, TAs) of 300

students …

  • … with many more on the waiting list

– (preference to graduating CS/EECS majors)

  • We do not have sufficient resources available to

expand further

– If you’re enrolled & decide not to take it, please drop ASAP – FYI, CS 161 scheduled for teaching in Fall 2013

slide-3
SLIDE 3

How Expensive is the Learning?

  • Absorb material presented in lectures and

section

  • 2 or 3 course projects (30% total)

– Done individually or in small groups

  • ~4 homeworks (20% total)

– Done individually

  • One midterm (20%)

– 80 minutes long: Thu Mar 7, location TBD

  • A comprehensive final exam (30%)

– Fri May 17, 7-10PM

slide-4
SLIDE 4

What’s Required?

  • Prerequisites:

– Math 55 or CS 70, CS 61B and 61C (= Java + C) – Familiarity with Unix

  • Engage!

– In lectures, in section

  • Note: I’m hearing-impaired, so be prepared to repeat

questions!

– Feedback to us is highly valuable; anonymous is fine

  • Class accounts - pick up in section tomorrow
  • Participate in Piazza

– Send course-related questions/comments there, or ask in Prof/TA office hours

  • For private matters, contact Prof or TA via email
slide-5
SLIDE 5

What’s Not Required?

  • Optional But Recommended: Introduction to

Computer Security, Goodrich & Tamassia (new)

  • Optional: Security Engineering,

Anderson, 1st or 2nd ed.

http://www.cl.cam.ac.uk/~rja14/book.html

Note: emphasis different in parts

slide-6
SLIDE 6

Class Policies

  • Late homework: no credit
  • Late project: -10% if < 24 hrs, -20% < 48 hrs,
  • 40% < 72 hrs, no credit >= 72 hrs
  • Original work, citing sources: mandatory
  • Working in teams: only as assignment states
  • If lecture materials available prior to lecture, don’t

use to answer questions during class

  • Recording?

– For personal use is fine – (Also: any volunteer for a remote CS 161 student?)

slide-7
SLIDE 7

5 Minute Break

Questions Before We Proceed?

slide-8
SLIDE 8
slide-9
SLIDE 9

Ethics & Legality

  • We will be discussing (and launching!) attacks -

many quite nasty - and powerful eavesdropping technology

  • None of this is in any way an invitation to

undertake these in any fashion other than with informed consent of all involved parties

– The existence of a security hole is no excuse

  • These concerns regard not only ethics but UCB

policy and California/United States law

  • If in some context there’s any question in your

mind, talk with instructors first

slide-10
SLIDE 10

Some Broad Perspectives

  • A vital, easily overlooked facet of security is

policy (and accompanying it: operating within constraints)

  • High-level goal is risk management, not

bulletproof protection.

– Much of the effort concerns raising the bar and trading off resources

  • How to prudently spend your time & money?
  • Key notion of threat model: what you are

defending against

– This can differ from what you’d expect – Consider the Department of Energy …

slide-11
SLIDE 11
slide-12
SLIDE 12
slide-13
SLIDE 13
slide-14
SLIDE 14
slide-15
SLIDE 15

Modern Threats

  • An energetic arms race between

attackers and defenders fuels rapid innovation in “malcode” …

  • … including powerful automated

tools …

  • … and defenders likewise devise

novel tactics …

slide-16
SLIDE 16
slide-17
SLIDE 17
slide-18
SLIDE 18
slide-19
SLIDE 19
slide-20
SLIDE 20

Modern Threats

  • An energetic arms race between

attackers and defenders fuels rapid innovation in “malcode” … (not just MS)

  • … including powerful automated

tools …

  • … and defenders likewise devise

novel tactics …

slide-21
SLIDE 21
slide-22
SLIDE 22
slide-23
SLIDE 23

Modern Threats

  • An energetic arms race between

attackers and defenders fuels rapid innovation in “malcode” …

  • … including powerful automated

tools …

  • … and defenders likewise devise

novel tactics …

slide-24
SLIDE 24

Botnet Population: 2009 - 2010

slide-25
SLIDE 25
slide-26
SLIDE 26

Modern Threats

  • An energetic arms race between

attackers and defenders fuels rapid innovation in “malcode” …

  • … including powerful automated

tools …

  • … and defenders likewise devise

novel tactics …

slide-27
SLIDE 27
slide-28
SLIDE 28

Modern Threats, con’t

  • Most cyber attacks aim for profit and are

facilitated by a well-developed “underground economy …

  • … but recent times have seen the rise of

nation-state issues, including:

– Censorship / network control – Espionage – … and war

slide-29
SLIDE 29
slide-30
SLIDE 30
slide-31
SLIDE 31
slide-32
SLIDE 32
slide-33
SLIDE 33
slide-34
SLIDE 34
slide-35
SLIDE 35

Modern Threats, con’t

  • Most cyber attacks aim for profit and are

facilitated by a well-developed “underground economy …

  • … there are also extensive threats to

privacy including identity theft

  • … but recent times have seen the rise of

nation-state issues, including:

– Censorship / network control – Espionage – … and war

slide-36
SLIDE 36
slide-37
SLIDE 37
slide-38
SLIDE 38

Modern Threats, con’t

  • Most cyber attacks aim for profit and are

facilitated by a well-developed “underground economy …

  • … there are also extensive threats to

privacy including identity theft

  • … and recent times have seen the rise of

nation-state issues, including:

– Censorship / network control – Espionage – … and war

slide-39
SLIDE 39
slide-40
SLIDE 40
slide-41
SLIDE 41
slide-42
SLIDE 42

Modern Threats, con’t

  • Most cyber attacks aim for profit and are

facilitated by a well-developed “underground economy …

  • … there are also extensive threats to

privacy including identity theft

  • … and recent times have seen the rise of

nation-state issues, including:

– Censorship / network control – Espionage – … and war

slide-43
SLIDE 43
slide-44
SLIDE 44
slide-45
SLIDE 45

Modern Threats, con’t

  • Most cyber attacks aim for profit and are

facilitated by a well-developed “underground economy …

  • … there are also extensive threats to

privacy including identity theft

  • … but recent times have seen the rise of

nation-state issues, including:

– Censorship / network control – Espionage – … and war

slide-46
SLIDE 46
slide-47
SLIDE 47
slide-48
SLIDE 48
slide-49
SLIDE 49

Questions?

slide-50
SLIDE 50

Coming Up …

  • Section meets tomorrow
  • Thursday’s lecture: Overflows, Injection,

and Memory Safety

  • Join Piazzza
  • Due next week:

– Get your class account set up – Use it to submit a writeup (Homework 0) that you’ve read the class web page, including (especially) policies on collaboration, Academic Dishonesty, and ethics/legality