Introduction to Cybersecurity
Director, CISPA – Center for IT Security, Privacy, and Accountability Chair for IT-security & Cryptography
- Prof. Dr. Michael Backes
Introduction to Cybersecurity Prof. Dr. Michael Backes Director, - - PowerPoint PPT Presentation
Introduction to Cybersecurity Prof. Dr. Michael Backes Director, CISPA Center for IT Security, Privacy, and Accountability Chair for IT-security & Cryptography Organisation Course Registration / Course Number (97380) - Register both
Director, CISPA – Center for IT Security, Privacy, and Accountability Chair for IT-security & Cryptography
Organisation
1 Foundations of Cybersecurity 2016
Organisation
https://infsec.cs.uni-saarland.de/index.php%3Fp=1758.html
2 Foundations of Cybersecurity 2016
Organisation
3 Foundations of Cybersecurity 2016
Praveen Manoharan Cryptography, Privacy, Theory Oliver Schranz System Security, Web Security
Organisation
4 Foundations of Cybersecurity 2016
Organization
projects
5 Foundations of Cybersecurity 2016
Structure of this lecture
1. Basics of System Security 2. Basics of Web Security 3. Basics of Cryptography 4. Basics of Data Privacy 5. Basics of Formal Methods in Security
General introduction to Cybersecurity and historical cryptography
6 Foundations of Cybersecurity 2016
7 Foundations of Cybersecurity 2016
Hackers prior to 2003
8 Foundations of Cybersecurity 2016
Source: Raimund Genes
Hackers after 2003 - Commercialization
Option 1: bug bounty programs (many)
9 Foundations of Cybersecurity 2016
Hackers after 2003 - Commercialization
Option 2: Black/Grey Market
buy you?
10 Foundations of Cybersecurity 2016
Yoyotech’s XDNA Aurum 24K
Hackers after 2003 - Commercialization
Option 2: Black/Grey market
11 Foundations of Cybersecurity 2016
Source: Rand Corp., National Security Research Division. Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar
Marketplace for Owned Machines
12 Foundations of Cybersecurity 2016
Pay-per-install (PPI) services PPI operation: 1. Own victim’s machine 2. Download and install client’s code 3. Charge client
Source: Caballero et al. (www.icir.org/vern/papers/ppi-usesec11.pdf)
spam bot keylogger
Clients
PPI service
Victims Cost: US - 100-180$ / 1000 machines Asia - 7-8$ / 1000 machines
13 Foundations of Cybersecurity 2016
Tracking vulnerability disclosures
20.000 40.000 60.000 80.000 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 Cumulative Disclosures 1988-2014
factors such as:
Source: http://www.cvedetails.com/cvss-score-distribution.php ; 04/09/2014 Source: http://web.nvd.nist.gov/view/vuln/statistics-results?adv_search=true&cves=on
CVSS Score Distribution For Top 30 Products By Total Number Of "Distinct" Vulnerabilities
14 Foundations of Cybersecurity 2016
Source: http://www.cvedetails.com/top-50-product-cvssscore-distribution.php
World’s biggest data breaches
15 Foundations of Cybersecurity 2016
Source: http://www.informationisbeautiful.net/ visualizations/worlds-biggest-data- breaches-hacks/
Hacked Poor security Inside job Lost/stolen computer Lost/stolen media Accidentally published All
16 Foundations of Cybersecurity 2016
Attacking the software – slot machines
17 Foundations of Cybersecurity 2016
because he was greedy.
Attacking the software – horse races
18 Foundations of Cybersecurity 2016
because he was greedy.
What is Cybersecurity?
20 Foundations of Cybersecurity 2016
Hacking Computer via USB
impersonate a keyboard.
computers that are not online. Targeting uranium enrichment fabrics in Iran.
21 Foundations of Cybersecurity 2016
Hey, I am a keyboard. OK, so tell me what you are typing.
New era of mobile phone attacks
phone through the airwaves themselves. Completely bypasses operating system and antivirus software to hack directly into the radio processor.
packed inside a telephone charger or docking station to casually mining phone for personal data. Steal saved passwords, pictures, and probably deliver some nasty malware for good measure.
22 Foundations of Cybersecurity 2016
http://i1227.photobucket.com/albums/ee430/kalsta1 /malicious-usb-charger.jpg https://www.usenix.org/conference/woot12/workshop
What is Cybersecurity?
23 Foundations of Cybersecurity 2016
Mifare Classic and Crypto
inside the card
24 Foundations of Cybersecurity 2016
What is Cybersecurity?
25 Foundations of Cybersecurity 2016
Phishing
26 Foundations of Cybersecurity 2016
Looks normal...
Social Engineering
to ask nicely
27 Foundations of Cybersecurity 2016
What is Cybersecurity?
28 Foundations of Cybersecurity 2016
Could Hackers Take Your Car for a Ride?
specially crafted CDs or media files (e.g., mp3) that include a Trojan horse to gain control of various automotive systems
baseband GPRS cellular, FM Radio Data System (RDS), SMS infrastructures used in remote- vehicular assistance services, or in Internet- enabled systems
demonstrate how to hack the CAN bus of Jeep via the multimedia system controller’s WiFi interface
control unit (TCU) allows arbitrary remote control
(DAB) station to exploit bug in DAB system of car to seize control of a vehicle's brakes and other critical systems
29 Foundations of Cybersecurity 2016
[https://www.youtube.com/watch?v=yTBfIrnSDQk] http://upload.wikimedia.org/wikipedia/commons/a/a3/Tesla_ Model_S_digital_panels.jpg
Stealing cars with a laptop
luxury vehicles may now make it easier for tech-savvy thieves to drive away with them.
headlines when they used a laptop and transmitter to open the locks and start the ignition of an armor-plated BMW X5 belonging to soccer player David Beckham, the second X5 stolen from him using this technology within six months.
30 Foundations of Cybersecurity 2016
What is Cybersecurity?
32 Foundations of Cybersecurity 2016
Network
33 Foundations of Cybersecurity 2016
When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet
system HomeMatic was revealed by hackers Sathya and Malli at the 30th Chaos Communication Congress (30C3). HomeMatic enables users to unlock doors, control the heater or receive alerts from a motion
hour Sathya and Malli showed how they were able to gain unauthorized access and take
DefCon hacker conference when two independent security researchers demonstrated two tools they designed to hack home and business automation and security systems that operate though power lines.
34 Foundations of Cybersecurity 2016
http://www.wired.com/images_blogs/threatlevel/2011/ 08/X10-Jammer.png http://electronic-lifestyle.com/wp- content/uploads/2013/09/home-automation.jpg
Exploiting reflections to spy on secrets
35 Foundations of Cybersecurity 2016
Exploiting reflections to spy on secrets
36 Foundations of Cybersecurity 2016
Exploiting reflections to spy on secrets
37 Foundations of Cybersecurity 2016
Exploiting reflections to spy on secrets
38 Foundations of Cybersecurity 2016
Exploiting reflections to spy on secrets
39 Foundations of Cybersecurity 2016
Exploiting reflections to spy on secrets
40 Foundations of Cybersecurity 2016
Spying on an actual Word document
41 Foundations of Cybersecurity 2016
Distance approx. 7 meters 12pt font (readable)
Acoustic side-channel attacks
42 Foundations of Cybersecurity 2016
That’s secret…! Got it…! Man with a secret Merciless attacker Dot-matrix printer
Why would you care?
… for anything confidential … … that I would care for?
(in Germany, Switzerland, Austria, …)
43 Foundations of Cybersecurity 2016
44 Foundations of Cybersecurity 2016
In general: Why is security so difficult?
Then system does some expected action
Then system does not do any really bad action
45 Foundations of Cybersecurity 2016
Classic Information Security Goals
free from unauthorized manipulation
46 Foundations of Cybersecurity 2016
Where to realize computer security?
evident devices
47 Foundations of Cybersecurity 2016
Realizing Security in Practice
succeed as a result of implementation error
capabilities and constraints.
48 Foundations of Cybersecurity 2016
If you remember one thing from this part…
49 Foundations of Cybersecurity 2016
Director, CISPA – Center for IT Security, Privacy, and Accountability Chair for IT-security & Cryptography
Assumptions on System Secrecy
Avoid “security by obscurity” !
51 Foundations of Cybersecurity 2016
Difference to the Cryptography lecture
This lecture:
52 Foundations of Cybersecurity 2016
Crypto lecture:
53 Foundations of Cybersecurity 2016
On (Historic) Ciphers
Alice: 𝑙 Bob: 𝑙 Symmetric encryption: Both Alice and Bob use the same key 𝑙
Ciphers:
Enc
𝑑 = 𝐹(𝑙, 𝑛) 𝑛 𝑑 𝑙
Dec
𝑛′ = 𝐸(𝑙, 𝑑) 𝑑 𝑛′ 𝑙
54 Foundations of Cybersecurity 2016
Ancient Ciphers: Substitution Cipher
𝑑 = 𝐹 𝑙, 𝑛 = "aiff“
a f b i c a
…
55 Foundations of Cybersecurity 2016
Ancient Ciphers: Caesar’s Cipher
a d b e c f
… (shift by 3)
56 Foundations of Cybersecurity 2016
Ancient Ciphers: Shift Cipher
In newsgroups (1980s) and forums, to make text unreadable Actually used in Netscape Navigator as part of an insecure scheme to store passwords (1999)
a g b h c i
… (variable shift)
57 Foundations of Cybersecurity 2016
Ancient Ciphers: Substitution Cipher
𝑑 = 𝐹 𝑙, 𝑛 = "aiff“
Letter frequency analysis: "e" 12.7%, "t" 9.1%, "a" 8.1% Frequency of pairs of letters: "th", "he", "in" Ciphertext-only attack! a f b i c a
…
58 Foundations of Cybersecurity 2016
Letter Frequencies
e, t, a, o, i, n s, h, r, d, l, u …
th, he, in, en, nt, re, er, an
the, and, tha, ent, ing, ion
59 Foundations of Cybersecurity 2016
Sample Text Distribution
60 Foundations of Cybersecurity 2016
Examples of Substitution Ciphers
53++!305))6*;4826)4+.)4+);806*;48!8`60))85;]8*;:+*8!83(88)5*!; 46(;88*96*?;8)*+(;485);5*!2:*+(;4956*2(5*-4)8`8*;4069285);)6 !8)4++;1(+9;48081;8:8+1;48!85;4)485!528806*81(+9;48;(88;4(+?3 4;48)4+;161;:188;+?;
61 Foundations of Cybersecurity 2016
Examples of Substitution Ciphers
A good glass in the bishop's hostel in the devil's seat twenty-one degrees and thirteen minutes northeast and by north main branch seventh limb east side shoot from the left eye of the death's-head a bee line from the tree through the shot fifty feet out.
ELSIE PREPARE TO MEET THY GOD
62 Foundations of Cybersecurity 2016
63 Foundations of Cybersecurity 2016
Cryptanalysis of Substitution Cipher (1)
vxr fezfvtvevtan ytjxrs tf nav fryesr ___ ____________ ______ __ ___ ______ a b c d e f g h i j k l m n o p q r s t u v w x y z
Letter frequencies
Guess vxr=THE Bigrams
64 Foundations of Cybersecurity 2016
Cryptanalysis of Substitution Cipher (2)
vxr fezfvtvevtan ytjxrs tf nav fryesr THE ____T_T_T___ ___HE_ __ __T _E___E a b c d e f g h i j k l m n o p q r s t u v w x y z E T H
Letter frequencies
Guess s=R Bigrams
65 Foundations of Cybersecurity 2016
Cryptanalysis of Substitution Cipher (3)
vxr fezfvtvevtan ytjxrs tf nav fryesr THE ____T_T_T___ ___HER __ __T _E__RE a b c d e f g h i j k l m n o p q r s t u v w x y z E R T H
Letter frequencies
Guess na=NO Bigrams
66 Foundations of Cybersecurity 2016
Cryptanalysis of Substitution Cipher (4)
vxr fezfvtvevtan ytjxrs tf nav fryesr THE ____T_T_T_ON ___HER __ NOT _E__RE a b c d e f g h i j k l m n o p q r s t u v w x y z O N E R T H
Letter frequencies
Guess tf=IS Bigrams
67 Foundations of Cybersecurity 2016
Cryptanalysis of Substitution Cipher (5)
vxr fezfvtvevtan ytjxrs tf nav fryesr THE S__STIT_TION _I_HER IS NOT SE__RE a b c d e f g h i j k l m n o p q r s t u v w x y z O S N E R I T H
Letter frequencies
Guess guess Bigrams
68 Foundations of Cybersecurity 2016
Cryptanalysis of Substitution Cipher (6)
vxr fezfvtvevtan ytjxrs tf nav fryesr THE SUBSTITUTION CIPHER IS NOT SECURE a b c d e f g h i j k l m n o p q r s t u v w x y z O U S P N E R I T H C B
Letter frequencies Guess Bigrams
69 Foundations of Cybersecurity 2016
Ancient Ciphers: Vigenère Cipher
m = THISISBLACKART K = CRYPTOCRYPTOCR
70 Foundations of Cybersecurity 2016
The Enigma machine
71 Foundations of Cybersecurity 2016
Old Ciphers: Rotor Machines
knowing starting position
72 Foundations of Cybersecurity 2016
Enigma –some Problems and Weaknesses
Problem 1: encryption becomes involuntary, i.e. if K T, then T K Problem 2: no letter is encrypted to itself (electricity can’t go same way back) Heavy reduction of encryption alphabet
Security of Enigma depended on wiring of rotors Wiring was part of algorithm, not part of key Wiring never changed from 1920s until 1945