How to Sandbox IIS Automatically without 0 False Positive and Negative
|
|
|
- Nathan Singleton
- 10 years ago
- Views:
Transcription
1 How to Sandbox IIS Automatically without 0 False Positive and Negative Professor Tzi-cker Chiueh Computer Science Department Stony Brook University [email protected] 2/8/06 Blackhat Federal
2 Big Picture Ways to get malicious code/data into victim sites (1) Break cryptography (2) Exploit design flaws in security protocols (3) Leverage applications convenience features (4) Exploit application-level implementation bugs (5) Exploit language-level implementation bugs (6) Non-technical attacks: insider, social engineering, etc. The majority of attacks are based on (3), (4) and (5) 2/8/06 Blackhat Federal
3 Software Security Bugs in programs lead to vulnerabilities that attackers exploit Design vs. Implementation bugs How to detect security-related bugs Static analysis Dynamic checking Intrusion detection/prevention 2/8/06 Blackhat Federal
4 Control- Hijacking Attacks Network applications whose control gets hijacked because of software bugs: Most worms, including MS Blast, exploit such vulnerabilities Three-step recipe: Insert malicious code/data into the victim application Sneaking weapons into a plane Trick the attacked application to transfer control to the inserted code or some existing code Taking over the victim plane Execute damaging system calls as the owner of the attacked application process Hit a target with the hijacked plane 2/8/06 Blackhat Federal
5 Control-Hijacking Attack Three types of overflows: buffer overflow integer overflow input argument list overflow (format string attack) Consequences Code Injection Return-to-libc Data attack 2/8/06 Blackhat Federal
6 Example: Stack Overflow Attack main() { input(); } input() { int i = 0;; int userid[5]; while ((scanf( %d, &(userid[i])))!= EOF) i ++; } STACK LAYOUT FP 124 Return address of input() Local variable i 116 userid[4] 112 userid[3] 108 userid[2] INT userid[1] SP 100 userid[0] 2/8/06 Blackhat Federal
7 Proposed Defenses Stop the attack at either of the three steps: Overflowing some data structures Bounds checking compiler, e.g., CASH (world s fastest array bound checking compiler on Linux/X86 platform) Triggering control transfer Branch target check, e.g., FOOD (Foreign code detection on Windows/X86 platform) Issuing damaging system calls System call pattern check, e.g., PAID 2/8/06 Blackhat Federal
8 Program semantics-aware Intrusion Detection (PAID) As a last line of defense, prevent intruders from causing damages even when they successfully take control of a target victim application Key observation: Most damages can only be done through system calls, including denial of service attacks Idea: Prevent a hijacked application from issuing system calls that deviate from its semantic model 2/8/06 Blackhat Federal
9 System Call Model Checking Achilles Heel: How to derive a system call model for an arbitrary application? Manual specification: error-prone, labor intensive, non-scalable Machine learning: error-prone, training efforts required PAID s approach: Use compiler to extract the sites and ordering of system calls from the source code of any given application automatically Guarantees zero false positives and very-close-to-zero false negatives System call policy is extracted automatically and accurately 2/8/06 Blackhat Federal
10 PAID Architecture Compile Time Extraction Application Run Time Checking Application Compiler System Call Graph System Call Graph Legitimacy Check User Kernel 2/8/06 Blackhat Federal
11 System Call Flow Graph Take a program s control flow graph, and eliminate all nodes that are not related to system calls Traverse the SCFG at run time to verify the legitimacy of every incoming system call Non-determinism: If-then-else statements Function with multiple call sites 2/8/06 Blackhat Federal
12 System Call Instance Coordinate Each system call instance is uniquely identified by The sequence of return addresses used in the function call chain leading to the corresponding int 80 instruction The return address of the int 80 instruction itself Example: Main F1 F2 F4 system_call_1 vs. Main F3 F5 F4 system_call_1 2/8/06 Blackhat Federal
13 System Call Flow Graph Traversal Is there a path from the previous system call instance (R 1, R 2, R 3, R n ) to the current system call instance (S 1, S 2, S 3, S m )? Largely deterministic low latency 2/8/06 Blackhat Federal
14 Dynamic Branch Targets Not all branch targets are known at compile time: function pointers and indirect jumps Insert a notify system call to tell the kernel the target address of these indirect branch instructions The kernel moves the current cursor of the system call graph to the designated target accordingly Notify system call is itself protected 2/8/06 Blackhat Federal
15 Asynchronous Control Transfer Setjmp/Longjmp At the time of setjmp(), store the current cursor At the time of longjmp(), restore the current cursor Signal handler When signal is delivered, store the current cursor After signal handler is done, restore the current cursor Dynamically linked library such as dlopen() Load the library s system call graph at run time 2/8/06 Blackhat Federal
16 Mimicry Attack Hijack the control of a victim application by overwriting some control-sensitive data structure, such as return address Issue a legitimate sequence of system calls after the hijack point to fool the IDS until reaching a desired system call, e.g., exec() None of existing commercial host-based IDS can handle mimicry attacks 2/8/06 Blackhat Federal
17 Mimicry Attack Example Legitimate sequence: open() read() receive() send() exec() Buffer overflow vulnerability exists between open() and read() Hijack the program s control between open() and read() Execute read() receive() send() exec() 2/8/06 Blackhat Federal
18 Mimicry Attack Details To mount a mimicry attack, attacker needs to Issue each intermediate system call without being detected Nearly all system calls can be turned into no-ops For example (void) getpid() or open(null,0) Grab the control back after each intermediate system call Set up the stack so that the injected code can take control after each system call invocation 2/8/06 Blackhat Federal
19 Countermeasures Minimize non-determinism in the system call model If (a>1) { open(..)} else {open(..); write(..)} Checking system call argument values whenever possible Random insertion of null system calls at load time to defeat guessing Different SCFGs for different instances of the same program 2/8/06 Blackhat Federal
20 Impossible Path Example main() { Entry(main) 1 Entry(foo) foo(); foo(); % W % X call(foo) sys_foo exit(); } foo() { for(.){ % E return(foo) call(foo) return(foo) sys_foo Exit(foo) sys_foo(); % Y sys_foo(); % Z Exit() } } Exit(main) 2/8/06 Blackhat Federal
21 With PAID Legitimate Path: WY WZ XY XZ E Impossible Path: WY WZ E 2/8/06 Blackhat Federal
22 PAID Checks Ordering Site: return address sequence Arguments Checking performed in the kernel with SCFG stored in the user space 2/8/06 Blackhat Federal
23 System Call Argument Check Start from each file name system call argument, e.g., open() and exec(), and compute a backward slice towards the inputs Perform symbolic constant propagation through the slice, and the result could be A constant: static constant A program segment that depends on initialization-time inputs only: dynamic constant A program segment that depends on run-time inputs: dynamic variables 2/8/06 Blackhat Federal
24 Dynamic Variables Derive partial constraints, e.g., prefix or suffix, /home/httpd/html Enforce the system call argument computation path by inserting null system calls between where dynamic inputs are entered and where the corresponding system call arguments are used 2/8/06 Blackhat Federal
25 Ordering Check Only main function call setreuid Buffer Overflow read open stat setreuid read open stat write write Compromised! 2/8/06 Blackhat Federal
26 Ordering and Site Check main function call int 0x80 instruction Buffer Overflow Compromised! setreuid read open stat write 2/8/06 Blackhat Federal
27 Ordering, Site and Stack Check (1) main function call int 0x80 instruction Buffer Overflow setreuid read open stat write 2/8/06 Blackhat Federal
28 Ordering, Site and Stack Check (2) main function call int 0x80 instruction Buffer Overflow Stack check passes exec 2/8/06 Blackhat Federal
29 Random Insertion of Notify Calls main function call int 0x80 instruction Buffer Overflow notify Attack failed notify exec 2/8/06 Blackhat Federal
30 Window of Vulnerabilities Buffer Overflow notify Buffer Overflow Desired system call follows Immediately exec Argument replacement notify exec 2/8/06 Blackhat Federal
31 Prototype Implementation GCC 3.1 and Gnu ld , Red Hat Linux 7.2 Compiles GLIBC successfully Compiles several production-mode network server applications successfully, including Apache , Qpopper-4.0, Sendmail , Wuftpd-2.6.0, etc. 2/8/06 Blackhat Federal
32 Throughput Overhead PAID PAID/stack PAID/random PAID/stack random Apache Qpopper Sendmail Wuftpd 4.89% 5.39% 6.48% 7.09% 5.38% 5.52% 6.03% 6.22% 6.81% 7.73% 9.36% 10.44% 2.23% 2.69% 3.60% 4.38% 2/8/06 Blackhat Federal
33 However PAID assumes source code availability, but most users do not have access to the source code of their applications, especially on the Windows platform What is the SCFG for Microsoft s IIS? Enters the BIRD (Binary Interpretation using Runtime Disassembly) project Binary PAID = BIRD + PAID 2/8/06 Blackhat Federal
34 Motivation Many state-of-the-art solutions to software security problem are based on program transformation techniques Achilles Heel: cannot be applied to existing executable binaries, especially for Windows PE32 binaries From source code to binary code: Static disassembly does not always work Binary instrumentation is non-trivial 2/8/06 Blackhat Federal
35 Static Disassembly No guarantee for 100% recovery: no way to know for sure Distinguishing between instruction and data is fundamentally undecidable Linear sweeping: data (e.g., jump table) could be embedded code section Recursive traversal: some functions do not any explicit call sites in the binary Windows DLLs are full of hand-crafted code sequences designed to defeat reverse engineering tools Bottom line: about 90% coverage with absolute confidence 2/8/06 Blackhat Federal
36 BIRD A binary analysis and instrumentation infrastructure on the Windows platform Do as much static disassembly as possible Uncover statically unknown instructions through dynamic invocation of disassembler Provide an API for developers to add applicationspecific analysis and/or instrumentation routines Guarantee 100% disassembly accuracy and coverage 2/8/06 Blackhat Federal
37 Architecture 2/8/06 Blackhat Federal
38 Dynamic Disassembly Statically redirect all indirect jumps/calls to a check() routine Redirect delivery of exception handlers to the check() routine also In the check() routine Check if the target address is known or not If known, jump to the target; else invoke the dynamic disassembler to disassembly the target area and jump Update the unknown-area list and modify indirect jumps/calls in dynamically disassembled instructions 2/8/06 Blackhat Federal
39 Binary Instrumentation Need to find enough bytes in a given instrumentation point to put in a 5-byte jump instruction Can use neighboring instructions only if they are not targets of other direct jump instructions in the same function Use INT 3 as a fall-back mechanism, which goes through an exception handler to invoke check() 2/8/06 Blackhat Federal
40 Performance Penalty Works for all programs in MS Office suite and IE Latency overhead Program Description Original Modified gzip Encrypt a 10MB file 3.4% 0.18% comp Compare two similar5mb files 10.0% 0.15% strings List all strings in a binary file 6.4% 2.4% find Find a string in a 500KB file 19.0% 16.7% objdump Show object headers in an EXE file 3.5% 0.8% 2/8/06 Blackhat Federal
41 Binary PAID 2/8/06 Blackhat Federal
42 Throughput Overhead 2/8/06 Blackhat Federal
43 Other Application: FOOD Goal: Ensure no dynamically injected code can run by monitoring target addresses of all indirect branches Assumption: no self modifying code, thus read-only text segment Approach: check the legitimacy of each instruction based on its location rather than its content Intercept at all indirect jumps/calls, return instructions and invocation of exception handlers Overhead: 10-25% 2/8/06 Blackhat Federal
44 Conclusion PAID is the most efficient, comprehensive and accurate host-based intrusion prevention (HIPS) system on both Linux and Windows platform Automatically generates per-application system call policy Guarantee 0 false positive and almost 0 false negative Effective countermeasures against mimicry attacks, Extensive system call argument checks Load-time insertion of random null system calls Return address sequence check Can handle function pointers, asynchronous control transfer, threads, exceptions, and DLL 2/8/06 Blackhat Federal
45 Future Work Further reduce the latency/throughput overhead of Binary PAID Reduce the percentage of dynamic variable category of system call arguments Apply it to generate security policy for SELinux automatically Create a counterpart of PAID for NIDS 2/8/06 Blackhat Federal
46 For more information Project Page: Thank You! 2/8/06 Blackhat Federal
How to Automatically and Accurately Sandbox Microsoft IIS
How to Automatically and Accurately Sandbox Microsoft IIS Wei Li Lap-chung Lam Tzi-cker Chiueh Computer Science Department Stony Brook University Abstract Comparing the system call sequence of a network
Transparent Monitoring of a Process Self in a Virtual Environment
Transparent Monitoring of a Process Self in a Virtual Environment PhD Lunchtime Seminar Università di Pisa 24 Giugno 2008 Outline Background Process Self Attacks Against the Self Dynamic and Static Analysis
Automating Mimicry Attacks Using Static Binary Analysis
Automating Mimicry Attacks Using Static Binary Analysis Christopher Kruegel and Engin Kirda Technical University Vienna [email protected], [email protected] Darren Mutz, William Robertson,
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation. Mathias Payer, ETH Zurich
I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation Mathias Payer, ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application
Automatic Application-Specific Sandboxing for Win32/X86 Binaries
1 Automatic Application-Specific Sandboxing for Win32/X86 Binaries Wei Li Lap-chung Lam Tzi-cker Chiueh Computer Science Department Stony Brook University Abstract Comparing the system call sequence of
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Intrusion Detection via Static Analysis
Intrusion Detection via Static Analysis IEEE Symposium on Security & Privacy 01 David Wagner Drew Dean Presented by Yongjian Hu Outline Introduction Motivation Models Trivial model Callgraph model Abstract
Eugene Tsyrklevich. Ozone HIPS: Unbreakable Windows
Eugene Tsyrklevich Eugene Tsyrklevich has an extensive security background ranging from designing and implementing Host Intrusion Prevention Systems to training people in research, corporate, and military
Bypassing Memory Protections: The Future of Exploitation
Bypassing Memory Protections: The Future of Exploitation Alexander Sotirov [email protected] About me Exploit development since 1999 Research into reliable exploitation techniques: Heap Feng Shui in JavaScript
Defense in Depth: Protecting Against Zero-Day Attacks
Defense in Depth: Protecting Against Zero-Day Attacks Chris McNab FIRST 16, Budapest 2004 Agenda Exploits through the ages Discussion of stack and heap overflows Common attack behavior Defense in depth
Software security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security
Software security Buffer overflow attacks SQL injections Lecture 11 EIT060 Computer Security Buffer overflow attacks Buffer overrun is another common term Definition A condition at an interface under which
Attacking Obfuscated Code with IDA Pro. Chris Eagle
Attacking Obfuscated Code with IDA Pro Chris Eagle Outline Introduction Operation Demos Summary 2 First Order Of Business MOVE UP AND IN! There is plenty of room up front I can't increase the font size
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Bypassing Browser Memory Protections in Windows Vista
Bypassing Browser Memory Protections in Windows Vista Mark Dowd & Alexander Sotirov [email protected] [email protected] Setting back browser security by 10 years Part I: Introduction Thesis Introduction
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Building accurate intrusion detection systems. Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory
Building accurate intrusion detection systems Diego Zamboni Global Security Analysis Lab IBM Zürich Research Laboratory Outline Brief introduction to intrusion detection The MAFTIA project Accurate intrusion
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Scalable Network-Based Buffer Overflow Attack Detection
Scalable Network-Based Buffer Overflow Attack Detection Paper ID: 327 14 pages Abstract Buffer overflow attack is the main attack method that most if not all existing malicious worms use to propagate themselves
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
Run-Time Deep Virtual Machine Introspection & Its Applications
Run-Time Deep Virtual Machine Introspection & Its Applications Jennia Hizver Computer Science Department Stony Brook University, NY, USA Tzi-cker Chiueh Cloud Computing Center Industrial Technology Research
Habanero Extreme Scale Software Research Project
Habanero Extreme Scale Software Research Project Comp215: Java Method Dispatch Zoran Budimlić (Rice University) Always remember that you are absolutely unique. Just like everyone else. - Margaret Mead
Where s the FEEB? The Effectiveness of Instruction Set Randomization
Where s the FEEB? The Effectiveness of Instruction Set Randomization Ana Nora Sovarel David Evans Nathanael Paul University of Virginia, Department of Computer Science http://www.cs.virginia.edu/feeb Abstract
Software Vulnerabilities
Software Vulnerabilities -- stack overflow Code based security Code based security discusses typical vulnerabilities made by programmers that can be exploited by miscreants Implementing safe software in
On Gray-Box Program Tracking for Anomaly Detection
On Gray-Box rogram Tracking for Anomaly Detection Debin Gao Michael K. eiter Dawn ong Carnegie Mellon University [email protected] [email protected] [email protected] Abstract Many host-based anomaly detection
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu Georgia Institute of Technology Annual Computer Security Applications Conference
Buffer Overflows. Code Security: Buffer Overflows. Buffer Overflows are everywhere. 13 Buffer Overflow 12 Nov 2015
CSCD27 Computer and Network Security Code Security: Buffer Overflows 13 Buffer Overflow CSCD27 Computer and Network Security 1 Buffer Overflows Extremely common bug. First major exploit: 1988 Internet
Korset: Code-based Intrusion Detection for Linux
Problem Korset Theory Implementation Evaluation Epilogue Korset: Code-based Intrusion Detection for Linux Ohad Ben-Cohen Avishai Wool Tel Aviv University Problem Korset Theory Implementation Evaluation
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
Automatic Logging of Operating System Effects to Guide Application-Level Architecture Simulation
Automatic Logging of Operating System Effects to Guide Application-Level Architecture Simulation Satish Narayanasamy, Cristiano Pereira, Harish Patil, Robert Cohn, and Brad Calder Computer Science and
CSC 405 Introduction to Computer Security
CSC 405 Introduction to Computer Security Topic 3. Program Security -- Part II CSC 405 Dr. Peng Ning 1 Targeted Malicious Code General purpose malicious code Affect users and machines indiscriminately
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Introduction to Information Security
Introduction to Information Security 0368-3065, Spring 2015 Lecture 1: Introduction, Control Hijacking (1/2) Eran Tromer Slides credit: Avishai Wool, Tel Aviv University 1 Administration Lecturer: Eran
Custom Penetration Testing
Custom Penetration Testing Compromising a Vulnerability through Discovery and Custom Exploitation Stephen Sims Advanced Penetration Testing - 2009 SANS 1 Objectives Penetration Testing Precompiled Tools
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
Fine-Grained User-Space Security Through Virtualization. Mathias Payer and Thomas R. Gross ETH Zurich
Fine-Grained User-Space Security Through Virtualization Mathias Payer and Thomas R. Gross ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application access
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
AUTOMATED TEST GENERATION FOR SOFTWARE COMPONENTS
TKK Reports in Information and Computer Science Espoo 2009 TKK-ICS-R26 AUTOMATED TEST GENERATION FOR SOFTWARE COMPONENTS Kari Kähkönen ABTEKNILLINEN KORKEAKOULU TEKNISKA HÖGSKOLAN HELSINKI UNIVERSITY OF
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
The Advantages of Block-Based Protocol Analysis for Security Testing
The Advantages of Block-Based Protocol Analysis for Security Testing Dave Aitel Immunity,Inc. 111 E. 7 th St. Suite 64, NY NY 10009, USA [email protected] February, 4 2002 Abstract. This paper describes
X05. An Overview of Source Code Scanning Tools. Loulwa Salem. Las Vegas, NV. IBM Corporation 2006. IBM System p, AIX 5L & Linux Technical University
X05 An Overview of Source Code Scanning Tools Loulwa Salem Las Vegas, NV Objectives This session will introduce better coding practices and tools available to aid developers in producing more secure code.
Hotpatching and the Rise of Third-Party Patches
Hotpatching and the Rise of Third-Party Patches Alexander Sotirov [email protected] BlackHat USA 2006 Overview In the next one hour, we will cover: Third-party security patches _ recent developments
Korset: Automated, Zero False-Alarm Intrusion Detection for Linux
Korset: Automated, Zero False-Alarm Intrusion Detection for Linux Ohad Ben-Cohen Tel-Aviv University [email protected] Avishai Wool Tel-Aviv University [email protected] Abstract Host-based Intrusion Detection
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
N-Variant Systems. Slides extracted from talk by David Evans. (provenance in footer) http://www.cs.virginia.edu/evans/sdwest
1 N-Variant Systems Slides extracted from talk by David Evans (provenance in footer) 2 Inevitability of Failure Despite all the best efforts to build secure software, we will still fail (or have to run
Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>
Unix Security Technologies Pete Markowsky What is this about? The goal of this CPU/SWS are: Introduce you to classic vulnerabilities Get you to understand security advisories Make
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 39 System Security Welcome
Basics of VTune Performance Analyzer. Intel Software College. Objectives. VTune Performance Analyzer. Agenda
Objectives At the completion of this module, you will be able to: Understand the intended purpose and usage models supported by the VTune Performance Analyzer. Identify hotspots by drilling down through
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Betriebssysteme KU Security
Betriebssysteme KU Security IAIK Graz University of Technology 1 1. Drivers 2. Security - The simple stuff 3. Code injection attacks 4. Side-channel attacks 2 1. Drivers 2. Security - The simple stuff
Interpreters and virtual machines. Interpreters. Interpreters. Why interpreters? Tree-based interpreters. Text-based interpreters
Interpreters and virtual machines Michel Schinz 2007 03 23 Interpreters Interpreters Why interpreters? An interpreter is a program that executes another program, represented as some kind of data-structure.
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Cloud Computing. Up until now
Cloud Computing Lecture 11 Virtualization 2011-2012 Up until now Introduction. Definition of Cloud Computing Grid Computing Content Distribution Networks Map Reduce Cycle-Sharing 1 Process Virtual Machines
CS 155 Final Exam. CS 155: Spring 2013 June 11, 2013
CS 155: Spring 2013 June 11, 2013 CS 155 Final Exam This exam is open book and open notes. You may use course notes and documents that you have stored on a laptop, but you may NOT use the network connection
Idea: Measuring the Effect of Code Complexity on Static Analysis Results
Idea: Measuring the Effect of Code Complexity on Static Analysis Results James Walden, Adam Messer, and Alex Kuhl Department of Computer Science Northern Kentucky University Highland Heights, KY 41099
Data Structure Reverse Engineering
Data Structure Reverse Engineering Digging for Data Structures Polymorphic Software with DSLR Scott Hand October 28 th, 2011 Outline 1 Digging for Data Structures Motivations Introduction Laika Details
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Taxonomic Modeling of Security Threats in Software Defined Networking
Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.
Return-oriented programming without returns
Faculty of Computer Science Institute for System Architecture, Operating Systems Group Return-oriented programming without urns S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, M. Winandy
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION. Integrated Information Systems Group, Ruhr University Bochum, Germany
USING LOCAL NETWORK AUDIT SENSORS AS DATA SOURCES FOR INTRUSION DETECTION Daniel Hamburg,1 York Tüchelmann Integrated Information Systems Group, Ruhr University Bochum, Germany Abstract: The increase of
IJOART. 1. Introduction. 2. Evolution of Cloud Services
International Journal of Advancements in Research & Technology, Volume 4, Issue 2, February -2015 81 An analysis of Security Attacks on Cloud wrt SaaS Ms. Shaheen Ayyub, Mr. Praveen Kaushik Research Scholar
Chapter 15 Operating System Security
Operating Systems: Internals and Design Principles Chapter 15 Operating System Security Eighth Edition By William Stallings System Access Threats System access threats fall into two general categories:
X86-64 Architecture Guide
X86-64 Architecture Guide For the code-generation project, we shall expose you to a simplified version of the x86-64 platform. Example Consider the following Decaf program: class Program { int foo(int
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
Quiz I Solutions MASSACHUSETTS INSTITUTE OF TECHNOLOGY. 6.858 Fall 2012. Department of Electrical Engineering and Computer Science
Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.858 Fall 2012 Quiz I Solutions 30 Grade for q1 25 20 15 10 5 0 0 10 20 30 40 50 60 70 80 90 100 Histogram
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Program Security: Buffer Overflow 1 Buffer Overflow BO Basics Stack smashing Other buffer overflow
Replication on Virtual Machines
Replication on Virtual Machines Siggi Cherem CS 717 November 23rd, 2004 Outline 1 Introduction The Java Virtual Machine 2 Napper, Alvisi, Vin - DSN 2003 Introduction JVM as state machine Addressing non-determinism
Lecture 10: Dynamic Memory Allocation 1: Into the jaws of malloc()
CS61: Systems Programming and Machine Organization Harvard University, Fall 2009 Lecture 10: Dynamic Memory Allocation 1: Into the jaws of malloc() Prof. Matt Welsh October 6, 2009 Topics for today Dynamic
Bug hunting. Vulnerability finding methods in Windows 32 environments compared. FX of Phenoelit
Bug hunting Vulnerability finding methods in Windows 32 environments compared FX of Phenoelit The goal: 0day What we are looking for: Handles network side input Runs on a remote system Is complex enough
A very short history of networking
A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the
Understanding Precision in Host Based Intrusion Detection
Understanding Precision in Host Based Intrusion Detection Formal Analysis and Practical Models Monirul Sharif, Kapil Singh, Jonathon Giffin, and Wenke Lee School of Computer Science, Georgia Institute
Exceptions in MIPS. know the exception mechanism in MIPS be able to write a simple exception handler for a MIPS machine
7 Objectives After completing this lab you will: know the exception mechanism in MIPS be able to write a simple exception handler for a MIPS machine Introduction Branches and jumps provide ways to change
Full System Emulation:
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware Christopher Kruegel Lastline, Inc. [email protected] 1 Introduction Automated malware analysis systems (or sandboxes)
Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications
Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications Jun Wang, Xi Xiong, Peng Liu Penn State Cyber Security Lab 1 An inherent security limitation
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
EECS 354 Network Security. Introduction
EECS 354 Network Security Introduction Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how to think like an attacker Defense then becomes second-nature
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Asynchronous intrusion recovery for interconnected web services
Asynchronous intrusion recovery for interconnected web services Ramesh Chandra, Taesoo Kim, Nickolai Zeldovich MIT CSAIL Today's web services are highly interconnected Many web services provide APIs to
C Compiler Targeting the Java Virtual Machine
C Compiler Targeting the Java Virtual Machine Jack Pien Senior Honors Thesis (Advisor: Javed A. Aslam) Dartmouth College Computer Science Technical Report PCS-TR98-334 May 30, 1998 Abstract One of the
Vigilante: End-to-End Containment of Internet Worms
Vigilante: End-to-End Containment of Internet Worms Manuel Costa 1,2, Jon Crowcroft 1, Miguel Castro 2, Antony Rowstron 2, Lidong Zhou 3, Lintao Zhang 3 and Paul Barham 2 1 University of Cambridge, Computer
An Analysis of Address Space Layout Randomization on Windows Vista
ADVANCED THREAT RESEARCH 2007 Symantec Corporation 1 An Analysis of Address Space Layout Randomization on Windows Vista Ollie Whitehouse, Architect, Symantec Advanced Threat Research Abstract: Address
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
Database Application Developer Tools Using Static Analysis and Dynamic Profiling
Database Application Developer Tools Using Static Analysis and Dynamic Profiling Surajit Chaudhuri, Vivek Narasayya, Manoj Syamala Microsoft Research {surajitc,viveknar,manojsy}@microsoft.com Abstract
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
System Calls and Standard I/O
System Calls and Standard I/O Professor Jennifer Rexford http://www.cs.princeton.edu/~jrex 1 Goals of Today s Class System calls o How a user process contacts the Operating System o For advanced services
Stack machines The MIPS assembly language A simple source language Stack-machine implementation of the simple language Readings: 9.1-9.
Code Generation I Stack machines The MIPS assembly language A simple source language Stack-machine implementation of the simple language Readings: 9.1-9.7 Stack Machines A simple evaluation model No variables
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips Agenda Overview W32/Xpaj analysis Overview of a virtual machine Software protection trends W32/Winemmem analysis W32/Induc
