CSE 484 / CSE M 584: Computer Security and Privacy Fall2016 Adam - - PowerPoint PPT Presentation

cse 484 cse m 584 computer security and privacy
SMART_READER_LITE
LIVE PREVIEW

CSE 484 / CSE M 584: Computer Security and Privacy Fall2016 Adam - - PowerPoint PPT Presentation

CSE 484 / CSE M 584: Computer Security and Privacy Fall2016 Adam (Ada) Lerner lerner@cs.washington.edu Thanks to Franzi Roesner, Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi Kohno, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet


slide-1
SLIDE 1

CSE 484 / CSE M 584: Computer Security and Privacy

Fall2016 Adam (Ada) Lerner lerner@cs.washington.edu

Thanks to Franzi Roesner, Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi Kohno, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials ...

slide-2
SLIDE 2

Announcements

  • CSE M 584 research readings are posted,

with due dates. Get started, the first paper review is due October 7!

9/30/16 CSE 484 / CSE M 584 - Fall 2016 2

slide-3
SLIDE 3

More Announcements

  • Form groups of up to 3 and start working on

your security reviews!

  • Please write your student number on your

worksheets, and please write your last name VERY CLEARLY. It helps us out a lot when recording them in the gradebook.

9/30/16 CSE 484 / CSE M 584 - Fall 2016 3

slide-4
SLIDE 4

Answers to Questions from the Survey

  • There is no written midterm or

final exam

9/30/16 CSE 484 / CSE M 584 - Fall 2016 4

slide-5
SLIDE 5

Answers to Questions from the Survey

  • All the labs and the final project

are for groups of 1-3. You may have the same group each time,

  • r you may have different

groups each time.

  • Working alone is fine, though it

may be challenging!

9/30/16 CSE 484 / CSE M 584 - Fall 2016 5

slide-6
SLIDE 6

Answers to Questions from the Survey

  • Hours per week will vary

dramatically through the quarter – expect to work a lot

  • n the labs, and somewhat less
  • n other things.

9/30/16 CSE 484 / CSE M 584 - Fall 2016 6

slide-7
SLIDE 7

Answers to Questions from the Survey

  • I use

they/them

  • r

she/her pronouns. Both are great. Thanks for asking!

9/30/16 CSE 484 / CSE M 584 - Fall 2016 7

slide-8
SLIDE 8

Last Time

  • “You won’t believe what happens when you

adopt this mindset! Engineers hate it!”)

– (challenging design assumptions, thinking like an attacker)

  • #ClickbaitSyllabus

– Post up to 2 on the forums for extra credit (and tweet @AdamRLerner, if you like)

9/30/16 CSE 484 / CSE M 584 - Fall 2016 8

slide-9
SLIDE 9

Security Mindset Anecdote

  • SmartWater?
  • No, a liquid with a unique

identifier, sold to mark your stuff as yours

9/30/16 CSE 484 / CSE M 584 - Fall 2016 9

slide-10
SLIDE 10

Topics du Jour

  • There is no perfect security
  • The attacker’s asymmetric advantage
  • Confidentiality, Integrity, Authenticity

– Side dish: Availability

  • People are important
  • Threat modeling

9/30/16 CSE 484 / CSE M 584 - Fall 2016 10

slide-11
SLIDE 11

There is no perfect security

  • “Security is not a binary property”
  • But, attackers have limited resources

– Make them pay unacceptable costs to succeed

9/30/16 CSE 484 / CSE M 584 - Fall 2016 11

slide-12
SLIDE 12

There is no perfect security

  • Example: Pharmaceutical spam is a

business

– They sell real (possibly unsafe) medications

  • If operating costs > income, they can’t

profit and won’t spam

9/30/16 CSE 484 / CSE M 584 - Fall 2016 12

slide-13
SLIDE 13

There is no perfect security

  • Example: CAPTCHAs
  • CAPTCHA solving is a service you can pay for!

Economics (labor availability, supply, demand) determine the price!

9/30/16 CSE 484 / CSE M 584 - Fall 2016 13

slide-14
SLIDE 14

Approaches to Security

  • Prevention

– Stop an attack

  • Detection

– Detect an ongoing or past attack

  • Response

– Respond to attacks

  • The threat of a response may be enough to

deter some attackers

9/30/16 CSE 484 / CSE M 584 - Fall 2016 14

slide-15
SLIDE 15

Attackers Need Motivation

  • Adversarial motivations:

– Money, fame, malice, revenge – Curiosity, politics, terror – International relations, war, convenience...

9/30/16 CSE 484 / CSE M 584 - Fall 2016 15

slide-16
SLIDE 16

Whole System is Critical

  • Securing a system involves a whole-system view

– Cryptography – Implementation – People – Physical security – Everything in between

9/30/16 CSE 484 / CSE M 584 - Fall 2016 16

slide-17
SLIDE 17

Whole System is Critical

  • Securing a system involves a whole-system view

– Cryptography – Implementation – People – Physical security – Everything in between

9/30/16 CSE 484 / CSE M 584 - Fall 2016 17

slide-18
SLIDE 18

Topics du Jour

  • There is no perfect security
  • The attacker’s asymmetric advantage
  • Confidentiality, Integrity, Authenticity

– Side dish: Availability

  • People are important
  • Threat modeling

9/30/16 CSE 484 / CSE M 584 - Fall 2016 18

slide-19
SLIDE 19

The Attacker’s Asymmetric Advantage

9/30/16 CSE 484 / CSE M 584 - Fall 2016 19

slide-20
SLIDE 20

The Attacker’s Asymmetric Advantage

9/30/16 CSE 484 / CSE M 584 - Fall 2016 20

  • Attacker only needs to win in one place
  • Defender’s response: Defense in depth
slide-21
SLIDE 21

Defense in Depth

  • Answer Q1 on your worksheet.

9/30/16 CSE 484 / CSE M 584 - Fall 2016 21

slide-22
SLIDE 22

Defense In Depth

  • Example: Two-factor authentication
  • Example: Account compromise

defenses

9/30/16 CSE 484 / CSE M 584 - Fall 2016 22

slide-23
SLIDE 23

Topics du Jour

  • There is no perfect security
  • The attacker’s asymmetric advantage
  • Confidentiality, Integrity, Authenticity

– Side dish: Availability

  • People are important
  • Threat modeling

9/30/16 CSE 484 / CSE M 584 - Fall 2016 23

slide-24
SLIDE 24

Confidentiality (Privacy)

9/30/16 CSE 484 / CSE M 584 - Fall 2016 24

network

  • Confidentiality:

concealing information

Eavesdropping, packet sniffing, illegal copying

slide-25
SLIDE 25

Confidentiality (Privacy)

  • I send an email which is meant only for the

class.

– If someone outside the class can read it, they’ve violated the message’s confidentiality.

  • Many security goals rely on confidentiality.

This is one reason security and privacy are so closely related.

9/30/16 CSE 484 / CSE M 584 - Fall 2016 25

slide-26
SLIDE 26

Integrity

9/30/16 CSE 484 / CSE M 584 - Fall 2016 26

network

  • Integrity:

prevention of unauthorized changes

Intercept messages, tamper, release again

slide-27
SLIDE 27

Integrity

  • If someone can edit my email before it

gets to the class, they’ve violated the message’s integrity.

  • Imagine taking whiteout to a postcard.

9/30/16 CSE 484 / CSE M 584 - Fall 2016 27

slide-28
SLIDE 28

Authenticity

9/30/16 CSE 484 / CSE M 584 - Fall 2016 28

network

Unauthorized assumption of another’s identity

  • Authenticity:

knowing who you’re talking to.

slide-29
SLIDE 29

Authenticity

  • If someone else can send email that

appears to be from me, they’ve violated the authenticity of our email system.

9/30/16 CSE 484 / CSE M 584 - Fall 2016 29

slide-30
SLIDE 30

Availability

9/30/16 CSE 484 / CSE M 584 - Fall 2016 30

network

  • Availability:

ability to use information or resources

Overwhelm or crash servers, disrupt infrastructure

slide-31
SLIDE 31

Topics du Jour

  • There is no perfect security
  • The attacker’s asymmetric advantage
  • Confidentiality, Integrity, Authenticity

– Side dish: Availability

  • People are important
  • Threat modeling

9/30/16 CSE 484 / CSE M 584 - Fall 2016 31

slide-32
SLIDE 32

From Policy to Implementation

  • Security problems can originate at all stages of

a project:

– Requirements/goals

  • Incorrect or problematic goals

– Design bugs

  • Poor use of cryptography
  • Poor sources of randomness
  • ...

– Implementation bugs

  • Buffer overflow attacks
  • ...

– Usability bugs

9/30/16 CSE 484 / CSE M 584 - Fall 2016 32

Don’t forget the users! They are a critical component!

slide-33
SLIDE 33

People are important

  • Many parties involved

– System developers – Companies deploying the system – The end users – The adversaries (possibly one of the above)

9/30/16 CSE 484 / CSE M 584 - Fall 2016 33

slide-34
SLIDE 34

People are Important

  • Different parties have different goals

– System developers and companies may wish to optimize cost – End users may desire security, privacy, and usability – But the relationship between these goals is quite complex (will customers choose not to buy the product if it is not secure?)

9/30/16 CSE 484 / CSE M 584 - Fall 2016 34

slide-35
SLIDE 35

Topics du Jour

  • There is no perfect security
  • The attacker’s asymmetric advantage
  • Confidentiality, Integrity, Authenticity

– Side dish: Availability

  • People are important
  • Threat modeling

9/30/16 CSE 484 / CSE M 584 - Fall 2016 35

slide-36
SLIDE 36

Threat Modeling

  • Assets: What are we trying to protect? How

valuable are those assets?

  • Adversaries: Who might try to attack, and why?
  • Vulnerabilities: How might the system be weak?
  • Threats: What actions might an adversary take to

exploit vulnerabilities?

  • Risk: How important are assets? How likely is

exploit?

  • Possible Defenses

9/30/16 CSE 484 / CSE M 584 - Fall 2016 36

slide-37
SLIDE 37

Example: Electronic Voting

  • Popular replacement to

traditional paper ballots

9/30/16 CSE 484 / CSE M 584 - Fall 2016 37

slide-38
SLIDE 38

Electronic Voting: Answer Q2

  • Popular replacement to

traditional paper ballots

9/30/16 CSE 484 / CSE M 584 - Fall 2016 38

slide-39
SLIDE 39

Pre-Election

9/30/16 CSE 484 / CSE M 584 - Fall 2016 39

Ballot definition file

Pre-election: Poll workers load “ballot definition files” on voting machine.

Poll worker

slide-40
SLIDE 40

Active Voting

9/30/16 CSE 484 / CSE M 584 - Fall 2016 40

Voter token Voter token Interactively vote Ballot definition file

Active voting: Voters obtain single-use tokens from poll workers. Voters use tokens to activate machines and vote.

Voter Poll worker

slide-41
SLIDE 41

Active Voting

9/30/16 CSE 484 / CSE M 584 - Fall 2016 41

Encrypted votes Voter token Voter token Interactively vote Ballot definition file

Active voting: Votes encrypted and stored. Voter token canceled.

Voter Poll worker

slide-42
SLIDE 42

Post-Election

9/30/16 CSE 484 / CSE M 584 - Fall 2016 42

si.edu si.edu

Voter token Tabulator Voter token Interactively vote Ballot definition file

Post-election: Stored votes transported to tabulation center.

Encrypted votes Recorded votes

Voter Poll worker

slide-43
SLIDE 43

Answer Q3

9/30/16 CSE 484 / CSE M 584 - Fall 2016 43

si.edu si.edu

Voter token Tabulator Voter token Interactively vote Ballot definition file Encrypted votes Recorded votes

Voter Poll worker

slide-44
SLIDE 44

Security and E-Voting (Simplified)

  • Functionality goals:

– Easy to use, reduce mistakes/confusion

  • Security goals:

– Adversary should not be able to tamper with the election outcome

  • By changing votes (integrity)
  • By voting on behalf of someone (authenticity)
  • By denying voters the right to vote (availability)

– Adversary should not be able to figure out how voters vote (confidentiality)

9/30/16 CSE 484 / CSE M 584 - Fall 2016 44

slide-45
SLIDE 45

Potential Adversaries

  • Voters
  • Election officials
  • Employees of voting machine manufacturer

– Software/hardware engineers – Maintenance people

  • Other engineers

– Makers of hardware – Makers of underlying software or add-on components – Makers of compiler

  • ...
  • Or any combination of the above

9/30/16 CSE 484 / CSE M 584 - Fall 2016 45

slide-46
SLIDE 46

What Software is Running?

9/30/16 CSE 484 / CSE M 584 - Fall 2016 46

Problem: An adversary (e.g., a poll worker, software developer, or company representative) able to control the software or the underlying hardware could do whatever he or she wanted.

slide-47
SLIDE 47

9/30/16 CSE 484 / CSE M 584 - Fall 2016 47

slide-48
SLIDE 48

Bad file Tabulator Voter token Interactively vote Ballot definition file Encrypted votes

Problem: Ballot definition files are not authenticated. Example attack: A malicious poll worker could modify ballot definition files so that votes cast for “Mickey Mouse” are recorded for “Donald Duck.”

Recorded votes

Voter Poll worker

slide-49
SLIDE 49

Voter token Interactively vote Ballot definition file

Problem: Smartcards can perform cryptographic operations. But there is no authentication from voter token to terminal. Example attack: A regular voter could make his or her own voter token and vote multiple times.

Tabulator Encrypted votes Recorded votes

Voter Poll worker

slide-50
SLIDE 50

Ballot definition file Tabulator Encrypted votes

Problem: Encryption key (“F2654hD4”) hard-coded into the software since (at least) 1998. Votes stored in the order cast. Example attack: A poll worker could determine how voters vote.

Recorded votes Voter Voter token Interactively vote

Voter Poll worker

slide-51
SLIDE 51

Ballot definition file Tabulator Encrypted votes

Problem: When votes transmitted to tabulator over the Internet

  • r a dialup connection, they are decrypted first; the cleartext

results are sent the the tabulator. Example attack: A sophisticated outsider could determine how voters vote.

Voter token Interactively vote Recorded votes

Voter Poll worker