lecture 2 threat modeling - uni paderborn

Post on 17-Feb-2022

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Lecture 2

Threat Modeling

Dr. Lotfi ben Othmane

23 October 2015

1. Vulnerabilities in the news: Adobe flash player vulnerability by Manjiri

Birajdar

2. SSD Labs by Lisa

3. Lecture by Sven Türpe and Andreas Poller from Fraunhofer SIT

Agenda

2

Thanks to the students who took the survey (even incomplete).

Survey

3

SVN

The SVN for the course is now available

https://repository.st.informatik.tu-darmstadt.de/sse/secdev/2015/

Accessible from the TU network VPN information: http://www.hrz.tu-

darmstadt.de/netz/netz_datennetz_internet_1/netz_datennetz_internet_vpn_1/netz_vpn_

downloads_1/index.de.jsp

4

Labs

Only the groups who have registered through the form (not the spreadsheet) will

be registered for the labs

The registered groups are considered final

Group numbers will be communicated via the students‘ TU emails

Groups with at least one member not registered in TUCaN will not be registered

Groups not submitting on time will not be graded

5

When finding vulnerabilities:

No disclosure

Limited disclosure

Full disclosure

Responsible disclosure

Balance between

Informing the public

Giving the vendor‘s time to respond properly

Responsible Disclosure

6

It is tempting to gloat …

Responsible Disclosure

Look at me! I did it! The vulnerability

in the powerplant‘s

control system

is right here!

7

… but it is also dangerous to the public …

Responsible Disclosure

… and to yourself

Responsible Disclosure

Responsible Disclosure

Keep silent Inform vendors Wait

- Short term anonymous buzz + Long lasting reputation

Gloat moderately

What is responsible disclosure?

10

Responsible disclosure

Is encouraged, and sometimes rewarded

Responsible Disclosure

11

Responsible disclosure

Is encouraged, and sometimes rewarded

Responsible Disclosure

12

Responsible disclosure

Is encouraged, and sometimes rewarded

Responsible Disclosure

13

769 Google Security Reward recipients between 2010 and 2015

519 people additionally reported confirmed vulnerabilities

155 GitHub bounty hunters since June 2013

And many more, especially in research groups

Examples of Responsible Disclosure

https://www.google.com/about/appsecurity/

https://bounty.github.com/

14

Why is this an irresponsible disclosure?

What should the bug finder have done?

Example of Irresponsible Disclosure

15

We encourage you to find flaws

BUT do it ethically.

From now on in this course:

Responsible disclosure will be rewarded

Irresponsible disclosure will be sanctioned

Responsible Disclosure

16

Students will choose one of two subjects:

Set-UID

Web same-origin policy

Available on TUCAN and the course‘s webpage

Due: Thursday, Nov 5th, 23:59

Lab 1

17

Secure Software Development Course Threat Modeling

Sven Türpe, Andreas Poller

Introduction to Threat Modeling

2

Lets talk about threats!

3

What is a threat?

• "A threat is an intent to inflict damage on a system.” (Landwehr 2001)

• "A threat consists of an adverse action performed by a threat agent on an asset." (Common Criteria)

• "Who might attack against what assets, using what resources, with what goal in mind, when/where/why, and with what probability.” (Johnston 2010)

• "Threats remain ideas until practical examples have been demonstrated.“ (Schäfer 2009)

• "A threat is a potential cause of an unwanted incident.” (Lund 2011)

4

What is a threat?

• “A threat is an entity that wants to do harm to you or something you care about” (http://www.bitsmasherpress.com/?p=67)

• “intended cause” (Pieters 2011)

• "A potential for harm of an asset.“ (Yoshioka 2008)

• “Threats are the likelihood of, or potential for, hazardous events occurring.” (Schumacher 2006)

• "A threat is the potential for abuse of an asset that will cause harm in the context of the problem“ (Haley 2004)

• “Threat is a general condition, situation, or state ([…]) that may result in one or more related attacks” (Firesmith 2004)

5

The concept of „threats“ is ….

• … ambiguous

• … approached from various perspectives

• … subjective dependent on who talks about threats

• … often used inappropriately (e.g. as synonym for vulnerabilities)

• … but crucial to understand security problem at hand.

6

Components of a Security Problem

7

Vulnerabilities Assets

Threats

Secrets System integrity Hardware value

Petty criminals Organized crime Law enforcement

No encryption Software defects Mobile gadget

Components of a Security Problem

8

Vulnerabilities Assets

Threats

Attacks

Secrets System integrity Hardware value

Petty criminals Organized crime Law enforcement

No encryption Software defects Mobile gadget

Approaches to Threat Modeling

9

Software-Centric Asset-Centric

Attacker-Centric

What’s there to protect? What would hurt me?

Who are my opponents? How will they act?

How am I vulnerable? What can attacks achieve?

Threat Modeling as a Development Activity

10

Threat Modeling in Software Development

11

Regulatory System

Evaluating

GoalSetting

Sensing

Acting

Secure Software Engineering

Security ProblemAnalysis

ThreatModeling

SecurityDesign

Modeling

RiskAssessment

etc.

Implemen-tation

Testingand

Review

Evaluationand

Certification

Documen-tation

Security Design

SecurityConcept

SecurityFunctions

DesignTrust

Model

etc.

Make decisions

Inform decisions

Feedback

Threat Modeling Techniques

12

0

200

400

600

800

1000

1200

Number of references

User,Browser

Web Server

ApplicationServer

DB Server

CustomerDatabase

MS SDL Threat Modeling

13

2. Create checklist

1. Describe system

3. Assess impact and find countermeasures for each item

Spoofing Tampering Repudiation Information disclosure Denial of service Elevation of privilege

STRIDE, Data Flow Diagrams

DFD entity S T R I D E

External Entity X X

Data Flow X X X

Data Store X (X) X X

Process X X X X X X

14

ProcessComplex Process

External Entity

Data Store

Data Flow

Trust Boundaries

Demo: MS Threat Modeling Tool

15

Example: The famous web shop

16

17

18

Summary: Challenges for Using MS SDL Threat Modeling

19

When Three Engineers Interpret a Threat Model …

20

Subject 2

Subject 1

Subject 3

SDL Threat Modeling in the Wild: Research Setting

21

Data Archive Staff

IT Services

Social Scientist

Computer Scientist

22

SDC client @Gesis

Remote Desktop

OS @User

User

Data Server

SDC Staff

Remote Computer

User

SDC Staff?Prepare data

I6: Big Picture

I5: Solution Proposal

Individual Perspectives

23

What can you build?

What do you need?

Wrap-up

24

Where Is the Sweet Spot?

25

Design Freedom

Formal Rigor

Abstraction Detail

Hygiene High

Assurance

• Little empirical evidence

• Moving targets – security designs evolve

• Tacit knowledge – documentation is always outdated

Tools

27 Source: http://worrydream.com/#!/ABriefRantOnTheFutureOfInteractionDesign

Developer Team Process Organization

Problem: Identify security concerns

Back to Laptop Scenario

28

When is HDD Encryption required?

29

When is HDD Encryption not required?

30

Is there a reasonable threat for this bug?

31

32

@ sit.fraunhofer.de

@ sit.fraunhofer.de

andreas.poller

sven.tuerpe

http://testlab.sit.fraunhofer.de

top related