- CSE543 - Introduction to Computer and Network Security
Page
CSE543 - Introduction to Computer and Network Security Module: Security Research Methods
Professor Patrick McDaniel Fall 2011
1
CSE543 - Introduction to Computer and Network Security Module: - - PowerPoint PPT Presentation
Page
1
CSE543 - Introduction to Computer and Network Security Page
2
CSE543 - Introduction to Computer and Network Security Page
3
CSE543 - Introduction to Computer and Network Security Page
4
CSE543 - Introduction to Computer and Network Security Page
5
CSE543 - Introduction to Computer and Network Security Page
6
CSE543 - Introduction to Computer and Network Security Page
software in this paper. He describes an approach whereby he can embed a Trojan horse in a compiler that can insert malicious code on a trigger (e.g., recognizing a login program).
Trojan horse is a program that serves a legitimate purpose on the surface, but includes malicious code that will be executed with it. Examples include the Sony/BMG rootkit: the program provided music legitimately, but also installed spyware.
used to compile compilers. Since the compiler code looks OK and the malice is in the binary compiler compiler, it is difficult to detect.
miscompiles the command to accept a particular password known to the attacker.
7
CSE543 - Introduction to Computer and Network Security Page
that you did not totally create yourself.” We all depend on code, but constructing a basis for trusting it is very hard, even today.
8
“A well-known scientist (some say it was Bertrand Russell) once gave a public lecture on astronomy. He described how the earth orbits around the sun and how the sun, in turn, orbits around the center of a vast collection of stars called our galaxy. At the end of the lecture, a little old lady at the back of the room got up and said: "What you have told us is
tortoise." The scientist gave a superior smile before replying, "What is the tortoise standing on?" "You're very clever, young man, very clever", said the old lady. "But it's turtles all the way down!"
CSE543 - Introduction to Computer and Network Security Page
9
CSE543 - Introduction to Computer and Network Security Page
10
CSE543 - Introduction to Computer and Network Security Page
11
CSE543 - Introduction to Computer and Network Security Page
12
CSE543 - Introduction to Computer and Network Security Page
13
CSE543 - Introduction to Computer and Network Security Page
14
Start
AE Assign to Reviewers Assign to Reviewer Assign to Reviewer Assign to Reviewer Review Assign Rating Review Assign Rating EIC Assign AE AE Evaluate Review Assign Rating Author Prepare Revision
Reject Accept
Major Revision
Minor Revision Reject Accept
CSE543 - Introduction to Computer and Network Security Page
15
Start
Chair Assign to PC Members PC Member Assign Rating PC Member Assign Rating Discuss at PC Meeting? PC Member Assign Rating PC Meeting Discussion
Reject
No
Accept
CSE543 - Introduction to Computer and Network Security Page
16
CSE543 - Introduction to Computer and Network Security Page
17
CSE543 - Introduction to Computer and Network Security Page
18
CSE543 - Introduction to Computer and Network Security Page
19
CSE543 - Introduction to Computer and Network Security Page
20
CSE543 - Introduction to Computer and Network Security Page
21
CSE543 - Introduction to Computer and Network Security Page
22
CSE543 - Introduction to Computer and Network Security Page
23
CSE543 - Introduction to Computer and Network Security Page
24
CSE543 - Introduction to Computer and Network Security Page
25