Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems - - PowerPoint PPT Presentation

prolog to lecture 2 cs 236 on line ms program networks
SMART_READER_LITE
LIVE PREVIEW

Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems - - PowerPoint PPT Presentation

Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Lecture 2 Page 1 CS 236 Online Whats This Prolog Stuff? When I can, I will add a short presentation to each lecture Discussing application


slide-1
SLIDE 1

Lecture 2 Page 1 CS 236 Online

Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher

slide-2
SLIDE 2

Lecture 2 Page 2 CS 236 Online

What’s This Prolog Stuff?

  • When I can, I will add a short

presentation to each lecture

  • Discussing application of material

from the previous or recent lectures

  • Generally stuff that’s pretty timely
slide-3
SLIDE 3

Lecture 2 Page 3 CS 236 Online

Do We Really Care About Security?

  • Security gets a lot of lip-service
  • But is the community out there really

behind it? – Particularly the industrial community that builds our software?

  • Two recent stories suggest maybe not
slide-4
SLIDE 4

Lecture 2 Page 4 CS 236 Online

  • 1. Fun With Firewire
  • Many computers have firewire

interfaces – Especially laptops

  • These interfaces allow direct access to

memory – No access control – No nuthin’

slide-5
SLIDE 5

Lecture 2 Page 5 CS 236 Online

What’s That Mean?

  • Anyone who hooks up a firewire

device to your laptop doesn’t need to log in

  • He can just read and alter the memory
  • Proof-of-concept tool1 allows you to
  • wn Windows machine in seconds

1http://www.darkreading.com/document.asp?doc_id=147713&f_src=drweekly

slide-6
SLIDE 6

Lecture 2 Page 6 CS 236 Online

What’s the Response?

  • “Well, duh, that’s what Firewire is

supposed to do”

  • In other words, we designed your

computer to let anyone take it over – If they have physical access

  • All this login stuff is just window

dressing to impress the rubes

slide-7
SLIDE 7

Lecture 2 Page 7 CS 236 Online

  • 2. Backdoor Processors
  • Many devices come with complete

processors “hidden” inside – Printers, routers, storage devices, etc.

  • They’re installed with complete OSes

– Often very badly configured

  • Allowing anyone access
  • E.g., Cisco had an undocumented test

interface in wireless APs and routers (2013) – Allowed attacker to run anything on them

slide-8
SLIDE 8

Lecture 2 Page 8 CS 236 Online

The Implications

  • If attacker knows about these,
  • And you don’t,
  • He’s got a hidden backdoor into your

system

  • Often these processors have network

capabilities

  • And can access the CPU you already knew

you had

slide-9
SLIDE 9

Lecture 2 Page 9 CS 236 Online

What’s That Mean?

  • The people who put these processors in

neither knew nor cared about security

  • System management (the purpose of

them) was more important

  • They didn’t care enough to even

mention they were there

slide-10
SLIDE 10

Lecture 2 Page 10 CS 236 Online

The General Lesson

  • Just because people say they care about

security doesn’t mean they do

  • Many decisions seem to be made

without even considering security implications