CSE 127 Computer Security



Similar documents
Physical Security: From Locks to Dox

LOCKS AND HIGH INSECURITY: PROTECTING CRITICAL INFRASTRUCTURE

Section 2.2 Locks and Keys. Legal Notice

Techno Security's Guide to Securing SCADA

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks

MIT Guide to Lock Picking. Ted the Tool

Maker: Call a 3D Locksmith How 3D Printing can Defeat Physical Security

Padlocks. 146 Padlocks FEATURES

Notes on Network Security - Introduction

Degree Key System. Technical Manual

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

Ten Things Everyone Should Know About Lockpicking & Physical Security Deviant Ollam

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

CPSC 467b: Cryptography and Computer Security

Key Systems Answer Book

Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel

Pretty Good Privacy (PGP)

Milling Tools These are the tools currently available for use with the milling machine

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

Security Through Transparency: An Open Source Approach to Physical Security

A secure login system using virtual password

Paper Airplanes & Scientific Methods

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

The Basics of Robot Mazes Teacher Notes

VERY IMPORTANT NOTE! - RAID

Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage

Patented technology ASSA P600. Reliable master key system. ASSA ABLOY, the global leader in door opening solutions

Management Information System Prof. Biswajit Mahanty Department of Industrial Engineering & Management Indian Institute of Technology, Kharagpur

White Paper. Top Five Ways to Cheat a Truck Scale. How To Prevent it from Happening to You

GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT

Project 25 Security Services Overview

Lead Screw Backlash and Mach3, version 2

The Hive Bodies. In the Beekeeper s Work Shop. Building a Bee Hive: The Hive Bodies. by Stephen E. Tilmann

HIGHER STANDARDS. For Magnetic Contacts Needed As Security Vulnerabilities Are Exposed WHITE PAPER

Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security

What locks do I have Timber Doors

Remote Access Securing Your Employees Out of the Office

Geotechnical Measurements and Explorations Prof. Nihar Ranjan Patra Department of Civil Engineering Indian Institute of Technology, Kanpur

Encoded Phased Array Bridge Pin Inspection

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

Policy for Protecting Customer Data

A Primer on Cyber Threat Intelligence

Optimizing Network Vulnerability

Your Mobility Strategy Guide Book

Detect, Contain and Control Cyberthreats

Bridging the gap between COTS tool alerting and raw data analysis

Computer and Network Security

More details >>> HERE <<<

Assignment 1 Biometric authentication

Choosing a Computer for Running SLX, P3D, and P5

Skoot Secure File Transfer

Twist Drill Grinding Attachment By Steven Skiprat Jackson June 2009

M113 VEHICLE FAMILY RUBBER TRACK INSTALLATION INSTRUCTIONS SOUCY TRACK SYSTEM 04-M113-1ENS (SPLIT IDLER) Litho d in Canada 1 04-M113-1ENS

ikompass PMP Exam tips

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Media Damage and Hard Drive Data Recovery. The term media refers to the platters. Data resides on the platter surfaces.

Measuring Software Security

Intrusion Detection Systems

TS93 EMR T/PT/TDE. Surface applied door closer

Columbia University Web Security Standards and Practices. Objective and Scope

Incident Response. Six Best Practices for Managing Cyber Breaches.

Combining Digital and Traditional Output in Prints

SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E)

10 Quick Tips to Mobile Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

EasiShare Whitepaper - Empowering Your Mobile Workforce

OPERATING INSTRUCTIONS FOR THE MODEL 210B-2 SRA

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Knowledge Based Authentication (KBA) Metrics

Application Intrusion Detection

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

8 secrets. Your Burglar Won't Tell You

Cylinders. Hardware By Professionals For Professionals. Hardware By Professionals For Professionals 223

Using CAD Data in Assembly - Advantages and Pitfalls

Getting Started with WebSite Tonight

Contents TABLE OF. List of Illustrations... IX. Preface... XV. Chapter 1: How the Burglar Breaks into Your Home... 1

AZEK Rail Install Guide

Palm Beach County Sheriff s Office

White Paper Barcoding

Belt Drives and Chain Drives. Power Train. Power Train


RadianceRail Installation Guide

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

EECS 588: Computer and Network Security. Introduction January 14, 2014

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Transcription:

CSE 127 Computer Security Fall 2012 Lecture #12 Physical Security Stefan Savage

Physical security What is physical security about? Controlling access to a physical space or object Examples: Gates/Barriers Locks Safes Alarms Mantraps Scanners

Same kind of problems as computer security Usability Security through obscurity Side channels Misplaced assumptions Securing the wrong thing Weakest link Lets look at some of this via locks

Locks Worlds oldest (pre-biblical) and most pervasive form of access control Egyptian tumbler lock design ~1000 BCE Modern Cylinder lock

How physical locks work Shear line Driver pins Plug Bottom pins courtesy Matt Blaze 5

How physical locks work courtesy Matt Blaze 6

Shared secrets There is a shared secret between the lock and the key its shape In fact, it s a digital code

Bitting codes A key can be precisely described with a discrete code Cuts at regular intervals (4-6 cuts) Depth of cuts quantized in standard fashion (typically 6-9 bins) 6 4 6 7 8 4-6 digits sufficient to describe most keys 8

Design assumptions If you don t know the secret code, you can t open the lock The secret code is secret If you can t open the lock, everything is fine

Design assumptions If you don t know the secret code, you can t open the lock The secret code is secret If you can t open the lock, everything is fine

Lock bypass via manipulation Picking & Raking Bumping 11

Picking 12

Picking Two parts Tension wrench used to apply slight lateral force on plug Pick used to lift individual bottom pins to the shear line Tension causes driver pins to bind above shear line 13

Picking 14

Raking Similar idea, but less finesse Rake pick moved in and out quickly imparts force to bottom pins; driver pins bind Quick & easy

Bumping Similar idea to raking, but does all pins in parallel; super easy to do Max-depth key (bump key) used to impart force to bottom pins who transfer energy to driver pins (think billiards) 16

Bumping 17

Some defenses Security pins Spool pins, mushroom pins, interlocking pins» Shapes that get stuck when plug under tension

Some defenses Security pins Spool pins, mushroom pins, interlocking pins» Shapes that get stuck when plug under tension Pin rotation (angled cuts on keys)

Some defenses Ancillary locking mechanisms; sidebars (2)

Side issue: master keying How do master keys work? Second set of pins (spacers); multiple shear lines

Hmmm. problem? Suppose 6 pins and 10 positions per pin In principal 10 6 combinations; can t guess master But what if you have one working key Scenario: your key: 557346, master: 232346 Make key: 157346; does it work? No, cut groove down one position; at position N it works! If N is not equal to 5, then N is the master cut for that pin Repeat for each pin; six keys are sufficient if all six pins have master pins; Rights Amplification 22

Design assumptions If you don t know the secret code, you can t open the lock The secret code is secret If you can t open the lock, everything is fine

Design assumptions If you don t know the secret code, you can t open the lock The secret code is secret If you can t open the lock, everything is fine

Problem The bitting code is only secret if the key is kept secure What if I borrow your key?

Lock bypass via surreptitious duplication Field casting Decoding 26

The power of decoding + + 64678 = 6 4 6 7 8 Key Blank Key replica Code key cutting machine 27

28

29

5 3 3 8 6 30

Optical decoding Decode keys semi-automatically from photos Traditional computer vision problem (photometry) Normalize for scale and rotation 31

Sneakey: UCSD Reference key measured at control points User supplies correspondences between target key and reference image Image normalized (homographic transform), cut locations identified and cut depths measured (n guesses) 32

Works really well Almost perfectly from up close photos (e.g., cell phone cameras, etc) But that s no fun what would James Bond do?

Distance experiments 34

Where s the Key? 74753 35

One defense: restricted keyways Key shape registered to customer and not avaialble for sale to anyone else 36

One defense: restricted keyways But 3D Printers Key milling machines 37

A better approach Electronic & mechanical keys Challenge/response via RF But own issues; batteries, replay, how to program, etc

Very high security Electronic; no battery; self-erase; heavy RF shielding; different combination for each user; unerasable audit log

Design assumptions If you don t know the secret code, you can t open the lock The secret code is secret If you can t open the lock, you can t access what is protected

Design assumptions If you don t know the secret code, you can t open the lock The secret code is secret If you can t open the lock, everything is fine

Taking the big picture What is the threat? Capabilities, resources, goals Faster than the bear or faster than the next guy? What are all the ways the adversary might get access (the attack surface )?

Deterrence No physical security is perfect For indiscriminate adversary (e.g., burglar) goal is to make cost higher than its worth Go elsewhere Deterrence can be indirect Lojack story Determined adversary may not be deterable How to increase risk, response, cost, time E.g. time locks, relockers

Physical security metrics What are you protecting against? Covert entry Time oriented» Group 1: resist expert manipulation for 20 hrs» Group 2m: resist expert manipulation for 2hrs Capability oriented» Group 1r: sub-category of group 1 that resists radiological probing Destructive entry Container drill resistance (e.g., 15, 30, 60 mins)

Defying assumptions

Also: Denial of service 47

Worse denial of service

For those interested Check out Matt Blaze s work» Safecracking for the Computer Scientist» Cryptology and Physical Security: Rights Amplification in Master- Keyed Mechanical Locks» Notes on Picking Pin Tumbler Locks, MIT Guide to Lockpicking Locksport International (http://locksport.com/) Matt Tobias s books (Locks, Safes and Security the bible) However NEVER pick a lock you do not own ALWAYS know the local law about using such tools 49

Comparison Both physical and computer security require similar mindset What could an adversary do, what is the easiest way for them to do it, what is the easiest way to stop them, etc Both vulnerable to technological surprise Lock bumping and computational code solving Some differences Physical objects subject to physical laws, but imprecise notion of hardness to break (e.g., Class I safes); less complex dependencies Digital objects exist in largely self-contained world; hardness can sometime be precise; complex dependencies 50

Next time Malware I And midterm return 51