Survey of Cyber Moving Targets Second Edition Authors: B.C. Ward - - PowerPoint PPT Presentation

survey of cyber moving targets second edition
SMART_READER_LITE
LIVE PREVIEW

Survey of Cyber Moving Targets Second Edition Authors: B.C. Ward - - PowerPoint PPT Presentation

Survey of Cyber Moving Targets Second Edition Authors: B.C. Ward S.R. Gomez R.W. Skowyra D. Bigelow J.N. Martin J.W. Landry H. Okhravi Presenter: Jinghui Liao Outline Cyber Kill Chain Attack technique Moving-targets technique


slide-1
SLIDE 1

Survey of Cyber Moving Targets Second Edition

Authors: B.C. Ward S.R. Gomez R.W. Skowyra D. Bigelow J.N. Martin J.W. Landry

  • H. Okhravi

Presenter: Jinghui Liao

slide-2
SLIDE 2

Outline

´ Cyber Kill Chain ´ Attack technique ´ Moving-targets technique ´ Weakness

slide-3
SLIDE 3

Cyber Kill Chain

´ Reconnaissance ´ Access ´ Exploit Development ´ Attack Launch ´ Persistence

slide-4
SLIDE 4

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

slide-5
SLIDE 5

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

slide-6
SLIDE 6

ATTACK TECHNIQUES

´ Data Leakage Attacks

´ Leakage of cryptographic keys from memory(WannaCry) ´ Side-channel attacks(spectre meltdown)

slide-7
SLIDE 7

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

slide-8
SLIDE 8

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks

´ Exhaust or manipulate shared resources ´ Denial-of-service using CPU saturation

slide-9
SLIDE 9

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

slide-10
SLIDE 10

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

slide-11
SLIDE 11

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection

´ buffer overflow ´ script injection ´ SQL injection

slide-12
SLIDE 12

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

slide-13
SLIDE 13

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Timing ´ Ordering ´ Arguments ´ Return-oriented programming (ROP)

slide-14
SLIDE 14

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

slide-15
SLIDE 15

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing

´ Fake identity ´ Man-in-the-middle ´ Phishing

slide-16
SLIDE 16

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

slide-17
SLIDE 17

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication

´ Compromise authentication process ´ Cross-site scripting

slide-18
SLIDE 18

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

slide-19
SLIDE 19

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

slide-20
SLIDE 20

ATTACK TECHNIQUES

´ Data Leakage Attacks ´ Resource Attacks ´ Injection

´ Code Injection ´ Control Injection

´ Spoofing ´ Exploitation of Authentication ´ Exploitation of Privilege/Trust ´ Scanning ´ Supply Chain/Physical Attacks

slide-21
SLIDE 21

https://www.bloomberg.com/news/features/2018- 10-04/the-big-hack-how-china-used-a-tiny-chip-to- infiltrate-america-s-top-companies

slide-22
SLIDE 22

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment

´ Address Space Randomization ´ Instruction Set Randomization

´ Dynamic Platforms ´ Dynamic Networks

slide-23
SLIDE 23

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment

´ Address Space Randomization ´ Instruction Set Randomization

´ Dynamic Platforms ´ Dynamic Networks

slide-24
SLIDE 24

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data

´ Format ´ Syntax ´ Encoding ´ Encryption ´ Representation

slide-25
SLIDE 25

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment

´ Address Space Randomization ´ Instruction Set Randomization

´ Dynamic Platforms ´ Dynamic Networks

slide-26
SLIDE 26

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software

´ Instructions ´ Order ´ Grouping ´ Format

slide-27
SLIDE 27

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment

´ Address Space Randomization ´ Instruction Set Randomization

´ Dynamic Platforms ´ Dynamic Networks

slide-28
SLIDE 28

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment

´ Address Space Randomization ´ Instruction Set Randomization

´ Dynamic Platforms ´ Dynamic Networks

slide-29
SLIDE 29

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment

´ Address Space Randomization

´ Code ´ Libraries ´ Stack/heap ´ Functions

slide-30
SLIDE 30

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment

´ Address Space Randomization ´ Instruction Set Randomization

´ Dynamic Platforms ´ Dynamic Networks

slide-31
SLIDE 31

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment

´ Address Space Randomization ´ Instruction Set Randomization

´ Interface presented by the operating system

slide-32
SLIDE 32

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment

´ Address Space Randomization ´ Instruction Set Randomization

´ Dynamic Platforms ´ Dynamic Networks

slide-33
SLIDE 33

Moving-Targets

´ Dynamic Runtime Environment

´ Address Space Randomization ´ Instruction Set Randomization

´ Dynamic Platforms

´ OS version ´ CPU architecture ´ OS instance ´ Platform data format

slide-34
SLIDE 34

Moving-Targets

´ Any technique that attempts to defend a system and increase the complexity of cyber attacks by making the system less homogeneous, static, or deterministic ´ Dynamic Data ´ Dynamic Software ´ Dynamic Runtime Environment

´ Address Space Randomization ´ Instruction Set Randomization

´ Dynamic Platforms ´ Dynamic Networks

slide-35
SLIDE 35

Moving-Targets

´ Dynamic Runtime Environment

´ Address Space Randomization ´ Instruction Set Randomization

´ Dynamic Platforms ´ Dynamic Networks

´ Protocols ´ Addresses

slide-36
SLIDE 36

WEAKNESSES

´ Overcome Movement ´ Predict Movement ´ Limit Movement ´ Disable Movement

slide-37
SLIDE 37

Thank you!