Security & Privacy Research at Illinois (SPRAI)
Professor Adam Bates Fall 2018
System Intrusions Professor Adam Bates Fall 2018 Security & - - PowerPoint PPT Presentation
CS 563 - Advanced Computer Security: System Intrusions Professor Adam Bates Fall 2018 Security & Privacy Research at Illinois (SPRAI) Administrative Learning Objectives : Survey broad topics in the system intrusions area
Security & Privacy Research at Illinois (SPRAI)
Professor Adam Bates Fall 2018
CS423: Operating Systems Design
2
Learning Objectives:
Announcements:
Reminder: Please put away (backlit) devices at the start of class
2
Security & Privacy Research at Illinois (SPRAI)
11
We live in an age of high profile data breaches… Operation Aurora: Google Mail was subject to a sustained nation state attack for the entire year of 2009.
Security & Privacy Research at Illinois (SPRAI) 12
Target loses 70 million credit card numbers…
We live in an age of high profile data breaches…
Security & Privacy Research at Illinois (SPRAI) 13
DNC loses 30 thousand emails…
We live in an age of high profile data breaches…
Security & Privacy Research at Illinois (SPRAI) 14
We live in an age of high profile data breaches…
Security & Privacy Research at Illinois (SPRAI) 15
Equifax Data Breach Timeline 2017
apr may jun jul aug sep
Breached Detected Hackers in Equifax Servers Patched Breached Announced
We live in an age of high profile data breaches…
Security & Privacy Research at Illinois (SPRAI)
Equifax Data Breach Timeline 2017
apr may jun jul aug sep
Breached Detected Hackers in Equifax Servers Patched Breached Announced
16
Humans are very much in the loop… 1,000’s of hours of forensic analysis! 3 Months of crucial attack audit logs… huge overheads!
We live in an age of high profile data breaches…
Security & Privacy Research at Illinois (SPRAI) 17
We live in an age of high profile data breaches…
Security & Privacy Research at Illinois (SPRAI)
18
[King and Chen, SOSP’03] Idea: Parse individual system events into relationship graphs
index.html NGINX abc.com Bash
Dependency Graph
Bash:
exec(“./NGINX”);
NGINX:
recv(…,“abc.com”); fread(“index.html”);
System Execution
Event Log
Security & Privacy Research at Illinois (SPRAI)
19
Security & Privacy Research at Illinois (SPRAI)
20
Is BackTracker a reference monitor?
Security & Privacy Research at Illinois (SPRAI)
21
can directly “accomplish a task” (i.e., security-critical)
might indirectly “accomplish a task” by affecting another process
control events.
Security & Privacy Research at Illinois (SPRAI)
22
Dependency graphs
Security & Privacy Research at Illinois (SPRAI)
23
Dependency graphs
Security & Privacy Research at Illinois (SPRAI)
24
Even backtraces (i.e., dependency subgraphs) get real big, real fast…
Security & Privacy Research at Illinois (SPRAI)
25
Even backtraces (i.e., dependency subgraphs) get real big, real fast… Filtering Strategies
Security & Privacy Research at Illinois (SPRAI)
26
Even backtraces (i.e., dependency subgraphs) get real big, real fast…
Security & Privacy Research at Illinois (SPRAI)
27
Even backtraces (i.e., dependency subgraphs) get real big, real fast…
Security & Privacy Research at Illinois (SPRAI)
28
Multiple real attacks against honeypot ReVirt VM, plus one synthetic attack…
Security & Privacy Research at Illinois (SPRAI)
29
Multiple real attacks against honeypot ReVirt VM, plus one synthetic attack…
Security & Privacy Research at Illinois (SPRAI)
30
may take days to return [Liu et al., NDSS’18]
High Storage Overhead High CPU Overhead
Security & Privacy Research at Illinois (SPRAI)
31
may take days to return [Liu et al., NDSS’18]
Security & Privacy Research at Illinois (SPRAI)
KCAL addresses several shortcomings of Linux Audit
32
Security & Privacy Research at Illinois (SPRAI)
33
faster kernel-user communication.
Fi (ACSAC’12), LPM (Security’15).
Security & Privacy Research at Illinois (SPRAI)
34
event redundancy in offline graph construction phase, eliminate it.
elimination into capture phase
kernel object cache
redundant log events?
Security & Privacy Research at Illinois (SPRAI)
35
dependency explosion problem, solve with time slicing
process output assumed to depend on all prior inputs
partitioning* module to address this, enables further reduction
* c.f. BEEP (NDSS’13)
Security & Privacy Research at Illinois (SPRAI)
36
Does EP reduce effectiveness of redundancy filtering?
applied to addition units.
In-Unit Redundancy Cross-Unit Redundancy
Security & Privacy Research at Illinois (SPRAI)
37
Temporary files are not relevant to attack forensics
forensically irrelevant files (e.g., read-only) can be filtered.
into capture phase
kernel object cache
redundant log events?
Security & Privacy Research at Illinois (SPRAI)
38
Storage Overhead
Before After
Security & Privacy Research at Illinois (SPRAI)
39
CPU Overhead
Before After
Security & Privacy Research at Illinois (SPRAI)
40
auditd cpu consumption Because kernel is not always logging, auditd actually sleeps; normally auditd can easily consume 100% of a core’s cycles.
Security & Privacy Research at Illinois (SPRAI)
41
Kernel Memory Consumption
G r a c e f u l degradation as cache size decreases Manageable per-process cache size
Security & Privacy Research at Illinois (SPRAI)
42
S&P a.k.a. Oakland, USENIX Security, CCS, NDSS), reputable second tier conferences (i.e., RAID).
Execution Partitioning), Security (e.g., Provenance Monitor)
Defenses (e.g., CFI, Privilege Separation, TCB Minimization)