software security
play

Software Security Information Security Prof Hans Georg Schaathun - PowerPoint PPT Presentation

Software Security Information Security Prof Hans Georg Schaathun University of Surrey/lesund University College Autumn 2011 Week 12 Prof Hans Georg Schaathun Software Security Autumn 2011 Week 12 1 / 1 The session Outline Prof


  1. Software Security Information Security Prof Hans Georg Schaathun University of Surrey/Ålesund University College Autumn 2011 – Week 12 Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 1 / 1

  2. The session Outline Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 2 / 1

  3. The session Session objectives Be familiar with the most common implementation errors leading to security vulnerabilities Start developing a good methodology for secure design and implementation 2010 CWE/SANS Top 25 Most Dangerous Software Errors Robert Seacord: Secure Coding in C and C++ https://www.securecoding.cert.org/confluence/ display/seccode/Top+10+Secure+Coding+Practices Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 3 / 1

  4. The session Security or Useability This chapter is largely about software bugs Is this security? . . . or is it useability? Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 4 / 1

  5. The session Security or Useability This chapter is largely about software bugs Is this security? . . . or is it useability? Answer is yes Bugs are user (programmer) mistakes – useability. Many bugs cause security vulnerabilities. Useability is a prerequisite of security. Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 4 / 1

  6. The session Security or Useability This chapter is largely about software bugs Is this security? . . . or is it useability? Answer is yes Bugs are user (programmer) mistakes – useability. Many bugs cause security vulnerabilities. Useability is a prerequisite of security. Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 4 / 1

  7. Top Vulnerabilities Outline Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 5 / 1

  8. Top Vulnerabilities Common Weakness Enumeration 2010 CWE/SANS Top 25 Most Dangerous Software Errors http://cwe.mitre.org/top25/index.html A very few key vulnerabilities behind most incidents Massive benefit from controlling the top few Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 6 / 1

  9. Top Vulnerabilities Top 9 Improper neutralisation of input during web page generation 1 (Cross-Site Scripting) Improper neutralisation of Special Elements in SQL Commands 2 (SQL Injection) Buffer overflow without Checking of Input Size 3 Cross-Site Request Forgery 4 Improper Access Control (Authorisation) 5 Reliance on Untrusted Inputs in a Security Decision 6 Improper Limitation of a Pathname to a Restricted Directory (Path 7 Traversal) Unrestricted Upload of File with Dangerous Type 8 Improper neutralisation of Special Elements used in an OS 9 Command Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 7 / 1

  10. Top Vulnerabilities Top 9 Improper neutralisation of input during web page generation 1 (Cross-Site Scripting) Improper neutralisation of Special Elements in SQL Commands 2 (SQL Injection) Buffer overflow without Checking of Input Size 3 Cross-Site Request Forgery 4 Improper Access Control (Authorisation) 5 Reliance on Untrusted Inputs in a Security Decision 6 Improper Limitation of a Pathname to a Restricted Directory (Path 7 Traversal) Unrestricted Upload of File with Dangerous Type 8 Improper neutralisation of Special Elements used in an OS 9 Command Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 7 / 1

  11. Top Vulnerabilities Trusting Input Most of the top vulnerabilities relate to user input ... Cross-Site Scripting SQL Injection Reliance on Untrusted Input File upload Path traversal Special elements in OS commands Integrity of Code and Data ... Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 8 / 1

  12. Top Vulnerabilities Trusting Input Most of the top vulnerabilities relate to user input ... Cross-Site Scripting SQL Injection Reliance on Untrusted Input File upload Path traversal Special elements in OS commands Integrity of Code and Data ... Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 8 / 1

  13. Input Checking Outline Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 9 / 1

  14. Input Checking Top 9 Improper neutralisation of input during web page generation 1 (Cross-Site Scripting) Improper neutralisation of Special Elements in SQL Commands 2 (SQL Injection) Buffer overflow without Checking of Input Size 3 Cross-Site Request Forgery 4 Improper Access Control (Authorisation) 5 Reliance on Untrusted Inputs in a Security Decision 6 Improper Limitation of a Pathname to a Restricted Directory (Path 7 Traversal) Unrestricted Upload of File with Dangerous Type 8 Improper neutralisation of Special Elements used in an OS 9 Command Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 10 / 1

  15. Input Checking Input Checking 4 out of 9 vulnerabilities very similar instances of input checking E . G . SQL injection SELECT * FROM users WHERE name=’John’ ; Now, say the user enters a name, instead of using ’John’ SELECT * FROM users WHERE name=’$n’ ; What if the user enters Mary’ ; DROP TABLE users ; ... ’ What happens? Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 11 / 1

  16. Input Checking Input Checking 4 out of 9 vulnerabilities very similar instances of input checking E . G . SQL injection SELECT * FROM users WHERE name=’John’ ; Now, say the user enters a name, instead of using ’John’ SELECT * FROM users WHERE name=’$n’ ; What if the user enters Mary’ ; DROP TABLE users ; ... ’ What happens? Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 11 / 1

  17. Input Checking Input Checking 4 out of 9 vulnerabilities very similar instances of input checking E . G . SQL injection SELECT * FROM users WHERE name=’John’ ; Now, say the user enters a name, instead of using ’John’ SELECT * FROM users WHERE name=’$n’ ; What if the user enters Mary’ ; DROP TABLE users ; ... ’ What happens? Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 11 / 1

  18. Input Checking Input Checking 4 out of 9 vulnerabilities very similar instances of input checking E . G . SQL injection SELECT * FROM users WHERE name=’John’ ; Now, say the user enters a name, instead of using ’John’ SELECT * FROM users WHERE name=’$n’ ; What if the user enters Mary’ ; DROP TABLE users ; ... ’ What happens? Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 11 / 1

  19. Input Checking Input Checking 4 out of 9 vulnerabilities very similar instances of input checking E . G . SQL injection SELECT * FROM users WHERE name=’John’ ; Now, say the user enters a name, instead of using ’John’ SELECT * FROM users WHERE name=’$n’ ; What if the user enters Mary’ ; DROP TABLE users ; ... ’ What happens? Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 11 / 1

  20. Input Checking Input Checking 4 out of 9 vulnerabilities very similar instances of input checking E . G . SQL injection SELECT * FROM users WHERE name=’John’ ; Now, say the user enters a name, instead of using ’John’ SELECT * FROM users WHERE name=’$n’ ; What if the user enters Mary’ ; DROP TABLE users ; ... ’ What happens? Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 11 / 1

  21. Input Checking What may happen SELECT * FROM users WHERE name=’Mary’ ; DROP TABLE users ; ... ’’ We select user Mary, and then drop the table Successful availability attack — the table is destroyed The string delimiter (’) in the input allows the user to terminate the string (which was expected) and add another command (which was not expected) Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 12 / 1

  22. Input Checking What may happen SELECT * FROM users WHERE name=’Mary’ ; DROP TABLE users ; ... ’’ We select user Mary, and then drop the table Successful availability attack — the table is destroyed The string delimiter (’) in the input allows the user to terminate the string (which was expected) and add another command (which was not expected) Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 12 / 1

  23. Input Checking What should happen SELECT * FROM users WHERE name=’Mary’’ ; DROP TABLE users ; ... ’’ The special character is escaped and treated as part of the string The offending Command is now part of the name and not harmful Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 13 / 1

  24. Input Checking What should happen SELECT * FROM users WHERE name=’Mary’’ ; DROP TABLE users ; ... ’’ The special character is escaped and treated as part of the string The offending Command is now part of the name and not harmful Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 13 / 1

  25. Input Checking What should happen SELECT * FROM users WHERE name=’Mary’’ ; DROP TABLE users ; ... ’’ The special character is escaped and treated as part of the string The offending Command is now part of the name and not harmful Prof Hans Georg Schaathun Software Security Autumn 2011 – Week 12 13 / 1

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend