Introduction to Cybersecurity
- Systems Security: Part 1 -
Director, CISPA – Center for IT Security, Privacy, and Accountability Chair for IT-security & Cryptography
- Prof. Dr. Michael Backes
- Systems Security: Part 1 - Prof. Dr. Michael Backes Director, - - PowerPoint PPT Presentation
Introduction to Cybersecurity - Systems Security: Part 1 - Prof. Dr. Michael Backes Director, CISPA Center for IT Security, Privacy, and Accountability Chair for IT-security & Cryptography General Information Correct formatting
Director, CISPA – Center for IT Security, Privacy, and Accountability Chair for IT-security & Cryptography
1 Foundations of Cybersecurity 2016
2 Foundations of Cybersecurity 2016
http://dilbert.com/strips/comic/2005-09-12/
Foundations of Cybersecurity 2016 3
4 Foundations of Cybersecurity 2016
5 Foundations of Cybersecurity 2016
6 Foundations of Cybersecurity 2016
http://xkcd.com/1354/
7 Foundations of Cybersecurity 2016
8 Foundations of Cybersecurity 2016
international edition)
978-3-642-43632-1
IEEE, volume 63, pages 1278—1308, 1975
9 Foundations of Cybersecurity 2016
11.11.2016
11 Foundations of Cybersecurity 2016
(e.g., Resource like File)
(e.g., User process) If authorized: Accesses and operates on
free from unauthorized manipulation
12 Foundations of Cybersecurity 2016
13 Foundations of Cybersecurity 2016
14 Foundations of Cybersecurity 2016
https://cdn1.coolstuff.com/autogen/preset/aspectThumb/960x720/6305517763ac93f87c1e5babc5d657c7.jpg http://www.richter-spielgeraete.de/tl_system/content/de/01_Produkte/xx_Piktogramme/3.63390.gif
15 Foundations of Cybersecurity 2016
Linux kernel Firefox Chrome Win Xp OS X Tiger Thunderbird Bash
2 4 6 8 10 50 100 WEIGHTED CVSS SCORE LINES OF CODE (MILLIONS)
Linux kernel Firefox Chrome Win Xp OS X Thunderbird Bash
200 400 600 800 1000 1200 1400 50 100 # VULNERABILITIES LINES OF CODE (MILLIONS)
Sources: cvedetails.com
16 Foundations of Cybersecurity 2016
http://www.surface-generation.com/wp-content/uploads/2015/03/Question-mark-box-620-x-350.jpg
17 Foundations of Cybersecurity 2016
18 Foundations of Cybersecurity 2016
http://uncrate.com/p/2008/03/oxo-pop-containers.jpg
controlled channel
compartment; security-sensitive functionality can be in dedicated hardened compartment
resources/functionality
and compartment interfaces
Compartmentalized submarine design
19 Foundations of Cybersecurity 2016
System
Network User input File system Network User device File system Network User input File system Network User display File system
Monolithic design µKernel with compartmentalization
20 Foundations of Cybersecurity 2016
https://www.google.de/maps/@48.8547067,2.3438011,17z
21 Foundations of Cybersecurity 2016
http://articles.slicehost.com/assets/2008/12/5/apache-404-footer.jpg http://cache.clickonf5.org/wp-content/uploads/2009/12/twitterlocked_thumb.png http://www.bryanandrews.org/wp-content/uploads/2001/11/nmap-banner-scan-example.png
22 Foundations of Cybersecurity 2016
http://melaniejor.typepad.com/.a/6a00e54fd1fc4388340133f2f9498f970b-pi http://www.keyring.com/images/products/detail/92400_Split_key_ring.jpg http://thumbs.dreamstime.com/t/blue-house-22708798.jpg http://cliparts.co/cliparts/qcB/X7G/qcBX7Ga4i.jpg
not have!
programs to avoid “confused deputy attacks”
accounts, Android permission framework
23 Foundations of Cybersecurity 2016
24 Foundations of Cybersecurity 2016
https://s-media-cache-ak0.pinimg.com/736x/fb/be/d9/fbbed9c16f8422d0d3febecd55ed98f4.jpg
(in particular by acting maliciously)
(can result in complete loss of trust into a system)
prove that system behaves only in expected manner)
25 Foundations of Cybersecurity 2016
26 Foundations of Cybersecurity 2016
http://www.gmesupply.com/images/1/gme-supply_0135s.jpg
27 Foundations of Cybersecurity 2016
28 Foundations of Cybersecurity 2016
http://resources0.news.com.au/images/2013/09/11/1226716/529036-airport-security-tsa-screeners.jpg
29 Foundations of Cybersecurity 2016
Object
(e.g., Resource like File)
Subject
(e.g., User process)
access request
Monitor
If authorized
30 Foundations of Cybersecurity 2016
http://www.i2clipart.com/clipart-wall-c7b9
31 Foundations of Cybersecurity 2016
32 Foundations of Cybersecurity 2016
http://www.tradersmessageboards.com/wp-content/uploads/2015/06/print-audit-300x300.png
33 Foundations of Cybersecurity 2016
34 Foundations of Cybersecurity 2016
https://xkcd.com/221/
35 Foundations of Cybersecurity 2016
36 Foundations of Cybersecurity 2016
http://www.searchenginepeople.com/wp-content/uploads/2012/05/bad-usability.jpg
37 Foundations of Cybersecurity 2016
Can’t Encrypt: A Usability Evaluation of PGP 5.0”: Majority of test users were unable to encrypt an email
study of SSL warning effectiveness”: SSL/TLS warnings ineffective
number of app developers do not verify SSL certificates correctly, opening their app to network attacks
From https://www.usenix.org/legacy/events/sec09/tech/slides/sunshine.pdf
39 Foundations of Cybersecurity 2016
you have the password file
40 Foundations of Cybersecurity 2016
41 Foundations of Cybersecurity 2016
hash function
42 Foundations of Cybersecurity 2016
Input space Output space Collisions {0,1}
???
43 Foundations of Cybersecurity 2016
[http://www.akkadia.org/drepper/SHA-crypt.txt]
44 Foundations of Cybersecurity 2016
workstation
per second [https://en.bitcoin.it/wiki/Mining_hardware_comparison]
45 Foundations of Cybersecurity 2016
bugiel@Colossus01:~/hashcat-0.47$ cat pw.hash $6$kbA7uCaJ$jSN6v19v8Mj6qqzsi85A/9IG3d4CDzMkY1KxiwoM2BxPS8dqL5wg.DZrOuiHF3OX/6c/b0DoZQTPphptZxx4o. $6$BhvJ.qe2$IopPfOUpXfNX82.rK9g8rqLwutjOaqxFwuVdqWefBNs7JgWPIerp..JSj2khiu9qsW3M0FcMmuB0jrcXvZwHH1 bugiel@Colossus01:~/hashcat-0.47$ ./hashcat-cli64.bin -m 1800 -a 0 -o cracked.txt --remove \ pw.hash ~/rockyou.txt -n 32 All hashes have been recovered Input.Mode: Dict (/home/bugiel/rockyou.txt) Index.....: 5/5 (segment), 541142 (words), 5720149 (bytes) Recovered.: 2/2 hashes, 2/2 salts Speed/sec.: - plains, 6.68k words Progress..: 540718/541142 (99.92%) Running...: 00:00:01:20 Estimated.: --:--:--:-- Started: Tue Sep 9 14:41:23 2014 Stopped: Tue Sep 9 15:20:45 2014 bugiel@Colossus01:~/hashcat-0.47$ cat cracked.txt $6$kbA7uCaJ$jSN6v19v8Mj6qqzsi85A/9IG3d4CDzMkY1KxiwoM2BxPS8dqL5wg.DZrOuiHF3OX/6c/b0DoZQTPphptZxx4o. :ilovebeer $6$BhvJ.qe2$IopPfOUpXfNX82.rK9g8rqLwutjOaqxFwuVdqWefBNs7JgWPIerp..JSj2khiu9qsW3M0FcMmuB0jrcXvZwHH1 :!!!lollipop!!!
46 Foundations of Cybersecurity 2016
47 Foundations of Cybersecurity 2016
(248 pre-computed hashes per possible password storage problem)
48 Foundations of Cybersecurity 2016
rate
screen)
49 Foundations of Cybersecurity 2016
protected? Can malware get at the database?
50 Foundations of Cybersecurity 2016
51 Foundations of Cybersecurity 2016
52 Foundations of Cybersecurity 2016
53 Foundations of Cybersecurity 2016
54 Foundations of Cybersecurity 2016
55 Foundations of Cybersecurity 2016
56 Foundations of Cybersecurity 2016
57 Foundations of Cybersecurity 2016
http://www.threattracksecurity.com/it-blog/wp-content/uploads/2013/07/fakewiki1.jpg
58 Foundations of Cybersecurity 2016
10 seconds of work with the setoolkit (social engineering toolkit) Real
59 Foundations of Cybersecurity 2016
60 Foundations of Cybersecurity 2016
[https://bitbucket.org/mattinfosec/wordhound]
61 Foundations of Cybersecurity 2016
62 Foundations of Cybersecurity 2016
63 Foundations of Cybersecurity 2016
http://xkcd.com/538/ “Rubber hose cryptanalysis:” Coercion attack where the user is forcibly asked by an attacker to reveal the key
Designing Crypto Primitives Secure Against Rubber Hose Attacks
[Bojinov et al., USENIX Security Symposium 2012]
user learns patterns without any conscious knowledge of the learned pattern
conscious knowledge of the trained password
[Chatterjee et al., IEEE Security & Privacy 2015]
attackable with efficient offline attacks
to move to an online attack
64 Foundations of Cybersecurity 2016
65 Foundations of Cybersecurity 2016
66 Foundations of Cybersecurity 2016
67 Foundations of Cybersecurity 2016
Press a live finger against it. Only a few dollars’ worth of Materials Put the plastic into hot water to soften it. The mold
68 Foundations of Cybersecurity 2016
69 Foundations of Cybersecurity 2016
Source: http://dasalte.ccc.de/biometrie/fingerabdruck_kopieren.de
devices
thus do not set a password or lock pattern! (Usability principle not fulfilled)
frequency/acceleration/trajectory/pressure, rotation of the phone during interaction)
70 Foundations of Cybersecurity 2016
71 Foundations of Cybersecurity 2016
72 Foundations of Cybersecurity 2016
73 Foundations of Cybersecurity 2016
[Karapanos et al. USENIX Security Symposium 2015]
second factor
their microphones
experience is similar to one-factor authentication (e.g., password only)
Ambient Audio
[Shrestha et al. Conference on Computer and Communications Security 2016]
74 Foundations of Cybersecurity 2016