Advanced Systems Security

Similar documents
CSE598k / CSE545 Advanced Network Security

Lecture 1 - Overview

Advanced System Security

Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

CSC574 - Computer and Network Security Module: Introduction

Module: Introduction. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

CIS433/533 - Computer and Network Security Introduction

Virtual Machine Security

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

CSE543 - Introduction to Computer and Network Security. Module: Final review

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Advanced Systems Security: Retrofitting Commercial Systems

EC Council Certified Ethical Hacker V8

CIS 4204 Ethical Hacking Fall, 2014

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

UVic Department of Electrical and Computer Engineering

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

LINUX / INFORMATION SECURITY

Priority One: Client-side software that remains unpatched. Priority Two: Internet-facing web sites that are vulnerable.

The Top Cyber Security Risks Two risks dwarf all others, but organizations fail to mitigate them

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Web Application Report

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

CEH Version8 Course Outline

Securing External Name Servers

CRYPTUS DIPLOMA IN IT SECURITY

USM IT Security Council Guide for Security Event Logging. Version 1.1

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Web App Security Audit Services

Keyword: Cloud computing, service model, deployment model, network layer security.

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

[CEH]: Ethical Hacking and Countermeasures

WHITEPAPER. Nessus Exploit Integration

Trent Jaeger Systems and Internet Infrastructure Security Lab Pennsylvania State University

Integrigy Corporate Overview

Information Technology Policy

What is Web Security? Motivation

Linux Kernel. Security Report

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Network Threats and Vulnerabilities. Ed Crowley

Web attacks and security: SQL injection and cross-site scripting (XSS)

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

MCAFEE FOUNDSTONE FSL UPDATE

Secure Software Development Lifecycle. Security... Not getting better

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Summary of the SEED Labs For Authors and Publishers

Certified Ethical Hacker (CEH)


Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

EECS 354 Network Security. Introduction

CompTIA Security+ (Exam SY0-410)

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

INSTRUCTOR: Dwight Makaroff - Thorvaldson x8656. Available via appointment.

Unix Security Technologies. Pete Markowsky <peterm[at] ccs.neu.edu>

Web Application Security

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

DMZ Gateways: Secret Weapons for Data Security

The monsters under the bed are real World Tour

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

RMAR Technologies Pvt. Ltd.

Barracuda Web Site Firewall Ensures PCI DSS Compliance

STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington October 21, 2013

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

CNA 432/532 OSI Layers Security

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Virtualization for Cloud Computing

INFORMATION SECURITY REVIEW

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Security Testing & Load Testing for Online Document Management system

Protecting the Cloud from Inside

Master of Science in Information Systems & Security Management. Courses Descriptions

Lecture 15 - Web Security

Software Development: The Next Security Frontier

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Hands-on Hacking Unlimited

Network Test Labs (NTL) Software Testing Services for igaming

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Virtualization System Security

Data Breaches and Web Servers: The Giant Sucking Sound

X Network, Operating System, and Database Security. Fall 2014, Registration Number W. UCLA EXTENSION: Computer Science.

Cloud Computing Security Master Seminar, Summer 2011

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters rd@rd1.net

Transcription:

Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Lab Computer Science and Engineering Department Pennsylvania State University January 14, 2010 Page 1

About Me Trent Jaeger (PhD, University of Michigan) Associate Professor, CSE -- after 9 years at IBM Research Research: Operating System Security Example Projects L4 Microkernel -- minimal, high performance OS Linux -- Open source, UNIX variant Xen hypervisor -- Open source, virtual machine platform Office Hours: Tu 4-5, W 1-2, or by appointment Office: 346A IST Bldg Email: tjaeger@cse.psu.edu Page 2

Motivation Security mechanisms and policies have been implemented at several system layers (app, OS, VM, network) Are we now secure? Page 3

Current Security Problems Most current security problems are based on the failure of people to deploy hosts securely Botnets Rootkits Web attacks: XSS, SQL Inject, Worms (Conficker) Password Guessing Buffer Overflows Arbitrary App Flaws Page 4

Security State SANS Top Security Risks http://www.sans.org/top-cyber-security-risks/ Client-side software is unpatched (apps patched slower) Web servers are vulnerable (XSS are 80%) Application vulnerabilities exceed OS vulnerabilities Attacks on Mac systems (QuickTime) US is the major attack target (30:1) Still buffer (and heap) overflows We will study the structure of attacks on hosts and a general procedure for their prevention Page 5

Cross-site Scripting (XSS) Aim: Get a client to run an attackers code at higher privilege (Privilege Escalation) Attack: Attacker places content on trusted site Client downloads content and attacks unpatched client program (e.g., media player) Attacker can run as client user Install reverse shell backdoor (outbound HTTPS) Download local privilege escalation program (again unpatched client code) Attack other machines Windows domain controller Page 6

Security Mythology Claim: All these problems were solved in Multics Is this claim true? Why not just use it? What is necessary? By whom? Can we make it happen? Claim: We are still trying to solve the same security problems since Multics Page 7

Who Has a Role? We want to examine what all the interested parties do/do not want for security/function and what they can/cannot know to resolve conflicts Programmers (may be multiple groups) OS Distributors Administrators Users Service Providers Content Providers Page 8

This course. Is a systems course that teaches principles for building a secure system and techniques for implementing those principles Caveat: We are still trying to figure out the latter Topics: What makes a system secure (mechanisms and policies); Example implementations of such principles (at OS, VMM, and application); Tools to assist in such implementations; How do we put it together; Recent research in secure systems design Page 9

Background Required: CSE 543 Expected: Solid OS and PL background Additional: Willingness to read We are going to read a lot of systems security papers Willingness to program We are going to have some OS programming assignments (Linux) Page 10

Course Materials Website http://www.cse.psu.edu/~tjaeger/cse544-s10/ Course assignments, slides, etc. will be placed here Check back often -- I may change some of the papers/assignments Course Textbook My book: Operating Systems Security Augmented with research papers Page 11

Course Calendar The course calendar has all the details Links to online papers for readings Links to projects Please check the calendar frequently it s the real-time state of the course Page 12

Course Mailing List Via ANGEL Use with care I will send a test email Please reply if you do not receive by Fr May need to forward to your CSE account Can use to email me Please use 544 in the subject 13 Page

Grading Exams (50%) Midterm (25%) Take home do the readings Final (25%) In class Projects (40%) 4 programming projects OS and Source code analysis Participation (10%) Page 14

Projects We are going to have four project deliverables Per person Topics Buffer Overflow Linux Security Module Security Policy Source Code Analysis for Security C programming required Kernel debugging also Page 15

Lateness Policy Assignments and project milestones are assessed a 20% per-day late penalty, up to a maximum of 4 days. Unless the problem is apocalyptic, don t give me excuses. Students with legitimate reasons who contact the professor before the deadline may apply for an extension. You decide what you turn in Page 16

Ethics Statement This course considers topics involving personal and public privacy and security. As part of this investigation we will cover technologies whose abuse may infringe on the rights of others. As an instructor, I rely on the ethical use of these technologies. Unethical use may include circumvention of existing security or privacy measurements for any purpose, or the dissemination, promotion, or exploitation of vulnerabilities of these services. Exceptions to these guidelines may occur in the process of reporting vulnerabilities through public and authoritative channels. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class. When in doubt, please contact the instructor for advice. Do not undertake any action which could be perceived as technology misuse anywhere and/or under any circumstances unless you have received explicit permission from Professor Jaeger. Page 17

Road Map Introduction 1. What is security? 2. What are the fundamental principles if secure execution? Designing for Security and Protection 1. Experiences with Multics and UNIX/Windows Mandatory Access Control 1. Policy Models 2. Lattice Models in Depth Systems Security Architectures 1. Security Kernels 2. Secure UNIX Variants 3. Capability Systems 4. VM Systems Assurance 1. Common Criteria 2. Program Analysis Practical System Integrity 1. System Integrity Models 2. Decentralized Label Model 3. Data/Control Flow Integrity Special Topics 1. Trustworthy Computing 2. Device Security 3. Storage Security 4. Web Security Page 18

Review Are we speaking the same language? General Terms Principals/Subjects and Adversaries/Attackers Trust Model Threat Model Security Model We will develop (semi-)formal models for each Page 19