square wheels and round tuits
play

Square Wheels and Round Tuits Steven M. Bellovin - PowerPoint PPT Presentation

Square Wheels and Round Tuits Steven M. Bellovin http://www.cs.columbia.edu/~smb Columbia University April 4, 2006 1 / 22 A Conversation, Circa 1981 Me: You get a lot more performance if you A Conversation, Circa 1981 A Talk, Circa 1982


  1. Square Wheels and Round Tuits Steven M. Bellovin http://www.cs.columbia.edu/~smb Columbia University April 4, 2006 1 / 22

  2. A Conversation, Circa 1981 Me: You get a lot more performance if you A Conversation, Circa 1981 A Talk, Circa 1982 buffer disk I/O The Sins of the Fathers. . . Hobbyist: But then I can’t just eject the floppy A History Lesson Me: You also need memory protection The Root Cause Hobbyist: Why? I’m the only one using the There is a Threat Cell Phone/PDA machine Viruses More Problems Me: (Argghh!) Bellovin’s Laws of Networking Interconnections We Have to Start Somewhere The Square Wheel Parts of a Solution Securing New Systems Principles Solution Characteristics Retrofits It May be Easier 2 / 22

  3. A Talk, Circa 1982 Me: Writing code in a high-level language will A Conversation, Circa 1981 A Talk, Circa 1982 improve productivity and reduce bugs The Sins of the Fathers. . . Audience: You don’t understand how small A History Lesson these machines are! The Root Cause Me: They’ll get bigger There is a Threat Cell Phone/PDA Audience: But today they’re small Viruses More Problems Bellovin’s Laws of Networking Interconnections We Have to Start Somewhere The Square Wheel Parts of a Solution Securing New Systems Principles Solution Characteristics Retrofits It May be Easier 3 / 22

  4. The Sins of the Fathers. . . “Programs written specifically for IBM A Conversation, ■ Circa 1981 A Talk, Circa 1982 compatibles could run faster by bypassing slow The Sins of the Fathers. . . MS-DOS functions, e.g. by writing video A History Lesson information directly to the area of memory The Root Cause assigned to it.” —Wikipedia entry on DOS There is a Threat Cell Phone/PDA That meant that Windows 95 had to permit Viruses ■ More Problems such behavior, and hence couldn’t really run Bellovin’s Laws of Networking Interconnections protected We Have to Start Somewhere Windows 98 couldn’t, either; on Windows XP, ■ The Square Wheel Parts of a Solution most users run as Administrator because many Securing New Systems applications require it Principles Solution Characteristics We are paying today for decisions made 25 ■ Retrofits It May be Easier years ago 4 / 22

  5. A History Lesson Mainframes, 1960 Single application at a time, A Conversation, Circa 1981 A Talk, Circa 1982 no memory protection, limited address space The Sins of the Fathers. . . A History Lesson The Root Cause There is a Threat Cell Phone/PDA Viruses More Problems Bellovin’s Laws of Networking Interconnections We Have to Start Somewhere The Square Wheel Parts of a Solution Securing New Systems Principles Solution Characteristics Retrofits It May be Easier 5 / 22

  6. A History Lesson Mainframes, 1960 Single application at a time, A Conversation, Circa 1981 A Talk, Circa 1982 no memory protection, limited address space The Sins of the Fathers. . . Minis, 1970 Single application at a time, no A History Lesson memory protection, limited address space The Root Cause There is a Threat Cell Phone/PDA Viruses More Problems Bellovin’s Laws of Networking Interconnections We Have to Start Somewhere The Square Wheel Parts of a Solution Securing New Systems Principles Solution Characteristics Retrofits It May be Easier 5 / 22

  7. A History Lesson Mainframes, 1960 Single application at a time, A Conversation, Circa 1981 A Talk, Circa 1982 no memory protection, limited address space The Sins of the Fathers. . . Minis, 1970 Single application at a time, no A History Lesson memory protection, limited address space The Root Cause Micros, 1980 Single application at a time, no There is a Threat Cell Phone/PDA memory protection, limited address space Viruses More Problems Bellovin’s Laws of Networking Interconnections We Have to Start Somewhere The Square Wheel Parts of a Solution Securing New Systems Principles Solution Characteristics Retrofits It May be Easier 5 / 22

  8. A History Lesson Mainframes, 1960 Single application at a time, A Conversation, Circa 1981 A Talk, Circa 1982 no memory protection, limited address space The Sins of the Fathers. . . Minis, 1970 Single application at a time, no A History Lesson memory protection, limited address space The Root Cause Micros, 1980 Single application at a time, no There is a Threat Cell Phone/PDA memory protection, limited address space Viruses More Problems PCs, 1990 Single application at a time, no Bellovin’s Laws of Networking Interconnections memory protection, limited address space We Have to Start Somewhere The Square Wheel Parts of a Solution Securing New Systems Principles Solution Characteristics Retrofits It May be Easier 5 / 22

  9. A History Lesson Mainframes, 1960 Single application at a time, A Conversation, Circa 1981 A Talk, Circa 1982 no memory protection, limited address space The Sins of the Fathers. . . Minis, 1970 Single application at a time, no A History Lesson memory protection, limited address space The Root Cause Micros, 1980 Single application at a time, no There is a Threat Cell Phone/PDA memory protection, limited address space Viruses More Problems PCs, 1990 Single application at a time, no Bellovin’s Laws of Networking Interconnections memory protection, limited address space We Have to Start Somewhere Embedded systems, now . . . The Square Wheel Parts of a Solution Securing New Systems Principles Solution Characteristics Retrofits It May be Easier 5 / 22

  10. A Conversation, Circa 1981 A Talk, Circa 1982 The Sins of the Fathers. . . A History Lesson The Root Cause Those who cannot remember the past are There is a Threat Cell Phone/PDA condemned to repeat it. Viruses More Problems Bellovin’s Laws of Networking —George Santayana, 1906 Interconnections We Have to Start Somewhere The Square Wheel Parts of a Solution Securing New Systems Principles Solution Characteristics Retrofits It May be Easier 6 / 22

  11. The Root Cause Vendors shipped as soon as the hardware was A Conversation, ■ Circa 1981 A Talk, Circa 1982 capable of handling base functionality The Sins of the Fathers. . . A year later, the better hardware is used for ■ A History Lesson more functionality The Root Cause By the time people think about security, ■ There is a Threat Cell Phone/PDA there’s an installed base problem Viruses More Problems Besides, no one believed there was a problem Bellovin’s Laws of ■ Networking Interconnections We have two challenges: ■ We Have to Start Somewhere The Square Wheel To ensure that new systems are designed ◆ Parts of a Solution Securing New properly Systems Principles To figure out how to retrofit legacy ◆ Solution Characteristics systems Retrofits It May be Easier 7 / 22

  12. A Conversation, Circa 1981 A Talk, Circa 1982 The Sins of the Fathers. . . A History Lesson The Root Cause There is a Threat Cell Phone/PDA “Software longa, hardware brevis” Viruses More Problems —Melinda Shore Bellovin’s Laws of Networking Interconnections We Have to Start Somewhere The Square Wheel Parts of a Solution Securing New Systems Principles Solution Characteristics Retrofits It May be Easier 8 / 22

  13. There is a Threat 34 security incidents targetted at process A Conversation, ■ Circa 1981 A Talk, Circa 1982 plants were identified between 1995 and 2003 The Sins of the Fathers. . . 29% of the incidents led to companies losing ■ A History Lesson the ability to monitor or control the plant The Root Cause 36% of external attacks came through the ■ There is a Threat Cell Phone/PDA Internet Viruses More Problems The number of incidents has been increasing Bellovin’s Laws of ■ Networking Interconnections sharply since 2000. We Have to Start Somewhere The Square Wheel Source: http://www.crime-research.org/news/ Parts of a Solution Securing New 19.10.2004/727/ Systems Principles Solution Characteristics Retrofits It May be Easier 9 / 22

  14. Cell Phone/PDA Viruses “Prepare for the likelihood of an increasing A Conversation, ■ Circa 1981 A Talk, Circa 1982 number of threats as time goes on.” The Sins of the Fathers. . . (Microsoft.com) A History Lesson “Cardtrap.A, a Trojan that attacks Symbian ■ The Root Cause mobile phone operating systems, attempts to There is a Threat Cell Phone/PDA infect users’ PCs if they insert the phone’s Viruses More Problems memory card into their computers.” Bellovin’s Laws of Networking Interconnections (news.com) We Have to Start Somewhere “What if a virus drained your cell’s battery and ■ The Square Wheel Parts of a Solution suddenly you couldn’t be reached?” . . . “Once Securing New Systems initiated, it sends the attacker an email Principles Solution Characteristics containing the IP address of your PDA.” Retrofits (Symantec.com) It May be Easier 10 / 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend