Secure Systems Engineering Chester Rebeiro Indian Institute of - - PowerPoint PPT Presentation

secure systems engineering
SMART_READER_LITE
LIVE PREVIEW

Secure Systems Engineering Chester Rebeiro Indian Institute of - - PowerPoint PPT Presentation

Secure Systems Engineering Chester Rebeiro Indian Institute of Technology Madras Secure Systems Computer systems can be considered a closed box. Informa8on in the box is safe as long as nothing enters or leaves the box. Systems S8ll


slide-1
SLIDE 1

Secure Systems Engineering

Chester Rebeiro

Indian Institute of Technology Madras

slide-2
SLIDE 2

Secure Systems

  • Computer systems can be considered a closed box.
  • Informa8on in the box is safe as long as nothing enters or

leaves the box.

slide-3
SLIDE 3

3

Systems S8ll Secure

  • Even with viruses, worms, and spyware around

informa8on is s8ll safe as long as they do not enter the system

slide-4
SLIDE 4

4

Vulnerability

  • A flaw that an aDacker can use to gain access

into the system

flaw

slide-5
SLIDE 5

5

Flaws that would allow an aDacker access a system

flaw

Bugs in the Program The Human factor The aDacker just needs one flaw … any flaw!!! Design Flaws

slide-6
SLIDE 6

6

You don’t need to be a granny to get fooled L

Bugs in the Program The Human factor Design Flaws

flaw

The human factor

slide-7
SLIDE 7

Program Flaws

  • In applica8on soRware

– SQL Injec8on

  • In system soRware

– Buffers overflows and overreads – Heap: double free, use aRer free

– Integer overflows

– Format string

  • In peripherials

– USB drives; Printers

  • In Hardware

– Hardware Trojans

  • Covert Channels

– Can exist in hardware or soRware

7

These are not really program flaws.

slide-8
SLIDE 8

Secure Systems Engineering

Approach 1: Design flawless systems

  • eg. SeL4

(Not easy to develop these systems in a large scale)

Sta8c analysis / Formal Proof Assistant

  • eg. COQ
slide-9
SLIDE 9

Secure Systems Engineering

Approach 2: Make it difficult for the aDacker Develop systems that are secure in spite of flaws (detect aDacks)

slide-10
SLIDE 10

Secure Systems Engineering

Approach 3: Isolate systems : sandbox environments, virtual machines, trusted environments (trusted compu8ng)

Takes care of the human factor as well

slide-11
SLIDE 11

Course Structure

Design the System where the flaw no longer can exist Make it difficult for the aDacker to mount an aDack ADack / Vulnerability / Malware detec8on Trusted Compu8ng Programming flaws that have been exploited Part 1 Part 2 Part 3

slide-12
SLIDE 12

What to expect during this course

  • Deep study of systems:

– SoRware

  • Assembly level
  • Compiler and OS level

(Programming assignments in class and homework)

– Hardware

  • Some computer organiza8on features
  • Analysis techniques
  • Sta8c, dynamic analysis / symbolic execu8on
  • Sta8s8cal analysis techniques and some ML

(Programming assignments for homework)

  • Course Project & Reading assignment
slide-13
SLIDE 13

Expected Learning Outcomes

  • Understand the internals of malware and other security

threats

  • Evaluate security measure applied at the hardware, OS, and

compiler

  • Understand trade offs between performance and security
slide-14
SLIDE 14

Grading

Quiz 1 : 15 marks Quiz 2 : 20 marks Endsem : 15 marks Assignments, project : 40 marks In class assignments / tutorials : 10 Dates as per academic calendar

slide-15
SLIDE 15

Schedule

  • G slot

Monday : 12:00-12:50 Wednesday : 16:50-18:30 Thursday : 10:00-10:50 Friday : 9:00-9:50 Move Monday 12:00-12:50 to Wednesday 17:40-18:30 ??? Laptop day! Need updated Ubuntu laptop (32 or 64 bit); You could also use an Ubuntu virtual machine

slide-16
SLIDE 16

Websites and Communica8on

  • Reference Textbooks

mostly research papers; will be provided as per topic

  • For slides and schedule
  • For communica8on : google groups

invita8ons will be sent to your smail account

(please mail me or the TAs if you don’t get an invite)

  • For assignment submissions

IITM moodle

hDp://www.cse.iitm.ac.in/~chester/courses/17o_sse/