Security & Privacy Research at Illinois (SPRAI)
Professor Adam Bates Fall 2016
Introduction Professor Adam Bates Fall 2016 Security & Privacy - - PowerPoint PPT Presentation
CS 598 - Computer Security in the Physical World: Introduction Professor Adam Bates Fall 2016 Security & Privacy Research at Illinois (SPRAI) Adam Bates Research Interests: Trustworthy Provenance-Aware Systems (CCS16, SecDev16,
Security & Privacy Research at Illinois (SPRAI)
Professor Adam Bates Fall 2016
Research Interests: ➢ Trustworthy Provenance-Aware Systems (CCS’16,
SecDev’16, Security’15, TAPP’15, SENT’14, CODASPY'13)
➢ Communications Security (NDSS’12, Security’15, JCS’14) ➢ Embedded Device Security (ACSAC’15, NDSS’14) ➢ Mobile Phone Security & Privacy (Security’15) ➢ SSL/HTTPS Trust Enhancements (CCS’14, IMC’14) ➢ Cloud Computing Security (IJIS’14, CCSW’13) Career Highlights:
Journal, PC World, Mobile World Live.
(8 Conference Majors)
Program Committee, ACSAC (2015) Session Chair, ACM CCS (2015) Program Committee, MCS (2015)
Provenance Plane Information Flow Plane
sshd_t shadow_t etc_t syslog_t sysadm_tPolicy
USB Mediator
Device Claims MNF , Product, Interfaces User Expectations MNF , Product, Features
Security & Privacy Research at Illinois (SPRAI)
3
with and inform the ‘real’ world
literature
through
Security & Privacy Research at Illinois (SPRAI)
4
to facilitate
Security & Privacy Research at Illinois (SPRAI)
5
Security & Privacy Research at Illinois (SPRAI)
6
papers.
followed by 2-3 criticisms, praises, or confusing
Security & Privacy Research at Illinois (SPRAI)
7
discussed
general (20-25 minutes)
OK, or stop by office hours).
Security & Privacy Research at Illinois (SPRAI)
8
altogether
altogether
read the papers before class
absences: attending conference, job interview, etc.).
Security & Privacy Research at Illinois (SPRAI)
9
some original research in security
clarity of presentation, and effort.
want to work in security.
Security & Privacy Research at Illinois (SPRAI)
10
conference style paper. There will be several milestones:
Security & Privacy Research at Illinois (SPRAI)
11
choose your project and group
Security & Privacy Research at Illinois (SPRAI)
12
and Mobile devices.
security or NetSec (feat. Layer 2 or below) fit.
certainly involve an area you already know well.
Security & Privacy Research at Illinois (SPRAI)
Security & Privacy Research at Illinois (SPRAI)
14
This course considers topics involving personal and public privacy and
abuse may infringe on the rights of others. As an instructor, I rely on the ethical use of these technologies. Unethical use may include circumvention
dissemination, promotion, or exploitation of vulnerabilities of these services. Exceptions to these guidelines may occur in the process of reporting vulnerabilities through public and authoritative channels. Any activity
authorities and may result in dismissal from the class. When in doubt, please contact the instructor for advice. Do not undertake any action which could be perceived as technology misuse anywhere and/
from Professor Bates.
Security & Privacy Research at Illinois (SPRAI)
15
http://adambates.org/courses/cs598-fa16
(Note: This is easily reachable from adambates.org)
Security & Privacy Research at Illinois (SPRAI)
16
Security & Privacy Research at Illinois (SPRAI)
17
Security & Privacy Research at Illinois (SPRAI)
18
Security & Privacy Research at Illinois (SPRAI)
19
this paper. He describes an approach whereby he can embed a Trojan horse in a compiler that can insert malicious code on a trigger (e.g., recognizing a login program).
program that serves a legitimate purpose on the surface, but includes malicious code that will be executed with it (e.g., Sony/BMG rootkit).
compiler, it is difficult to detect.
command to accept a particular password known to the attacker.
did not totally create yourself.” We all depend on code, but constructing a basis for trusting it is very hard, even today.
Security & Privacy Research at Illinois (SPRAI)
20
work, references.
assumptions/methods, become invested in the work!
Security & Privacy Research at Illinois (SPRAI)
21
Security & Privacy Research at Illinois (SPRAI)
22
writing a summary, but also much more!
the work: be engaged with the content
Security & Privacy Research at Illinois (SPRAI)
23
talk.html
Security & Privacy Research at Illinois (SPRAI)
Professor Adam Bates Fall 2016
Security & Privacy Research at Illinois (SPRAI)
2
cypherpunks phone freaks
* Note: Extremely reductive taxonomy presented on this slide
Security & Privacy Research at Illinois (SPRAI)
3
computer security (e.g., crypto secrets are “keys”)
breaking open analog systems (e.g., locks, telephony)
about computer security, and vice versa
Security & Privacy Research at Illinois (SPRAI)
4
Animations via http://toool.us
Key Pins Plug Driver Pins Shear Point Keyway
heights
cannot rotate (i.e., locked)
inserted, gaps in pins line up with shear point, allowing plug to rotate
Security & Privacy Research at Illinois (SPRAI)
5
heights
cannot rotate (i.e., locked)
inserted, gaps in pins line up with shear point, allowing plug to rotate
Animations via http://toool.us
Key Pins Plug Driver Pins Shear Point Keyway
Security & Privacy Research at Illinois (SPRAI)
6
Animations via http://toool.us
Shear Point
heights
cannot rotate (i.e., locked)
inserted, gaps in pins line up with shear point, allowing plug to rotate
Security & Privacy Research at Illinois (SPRAI)
View from side:
7
Animations via http://toool.us
Security & Privacy Research at Illinois (SPRAI)
8
Animations via http://toool.us
In an ideal world, pins would fit into the plug like this:
(wrong key)
Security & Privacy Research at Illinois (SPRAI)
9
Animations via http://toool.us
In the real world, pins fit into the plug like this:
(wrong key)
Security & Privacy Research at Illinois (SPRAI)
Reality
Real Plug Real Pins
Expectation
Security & Privacy Research at Illinois (SPRAI)
11
Animations via http://toool.us
Mechanical imperfections make lock picking possible:
Security & Privacy Research at Illinois (SPRAI) 12
slightly, “setting” that pin.
Security & Privacy Research at Illinois (SPRAI)
13
Shared Secret / Password Oracle Attack Brute Force Attack Keying of Lock (or the key) Try all possible keys (or kick door down?) Mechanical imperfection reduces search space (i.e., lock picking)
Security & Privacy Research at Illinois (SPRAI)
14
with 4 bitting depths. How large is the key space?
with 4 bitting depths. How large is the search space?
Security & Privacy Research at Illinois (SPRAI)
15
have authorized access to area
seconds
covered here (e.g., shims, bump keys, rakes) which vary in use-case and covertness.
Security & Privacy Research at Illinois (SPRAI)
16
Photo via http://united-locksmith.net
Security & Privacy Research at Illinois (SPRAI)
17
pin lock with 4 bitting depths. How large is the key space?
Security & Privacy Research at Illinois (SPRAI)
18
except for known bitting of the change key).
P(D-1) to P by filing keys down in real time.
Security & Privacy Research at Illinois (SPRAI)
19
attacks are easier, creates sub-masters, impractical for small locks.
Security & Privacy Research at Illinois (SPRAI)
20
world interact in complex and unexpected ways.
systemic vuln. in the world’s #1 security mechanism.
cyber physical domain.