ee515/is523 think like an adversary lecture 1 introduction yongdae kim

43
EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Upload: clarence-bates

Post on 13-Jan-2016

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

EE515/IS523 Think Like an

AdversaryLecture 1

Introduction

Yongdae Kim

Page 2: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Instructor, TA, Office Hours

Instructor Yongdae Kim

First time teaching in KAIST ;-) First time teaching EE515/IS523 16th time teaching a security class

Email: yongdaek (at) ee. kaist. ac. Kryongdaek (at) gmail. com

Please include ee515 or is523 in the subject of your mail Office: EE 1226 Office Hours: MW 2:45 ~ 3:45

TA Senior: Jaeseong Jeong jsjung(at)netsys.kaist.ac.kr Junior: Heeyoung Kim aliggo(at)kaist.ac.kr Office hours: by appointment only

Page 3: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

20 year career in security research Applied Cryptography, Group key agreement, Storage, P2P,

Mobile/Sensor/Ad-hoc/Cellular Networks, Social networks, Internet, Anonymity, Censorship

Published about 70 papers (3,000 Google scholar citations)

10 PhD, 9 MS, 15 BS advised

ETRIETRI

1993 1998 2002 2008 2012

USCUSC KAISTKAISTUMNUMN

Crypto Crypto+Security Network/Distributed System Security System Security

3

Page 4: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Class web page, e-mailhttp://syssec.kaist.ac.kr/courses/ee515

Read the page carefully and regularly!Read the Syllabus carefully.Check calendar.

E-mail policy Include [ee515] or [is523] in the subject of your e-

mail

Page 5: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

TextbookRequired: Papers!

OptionalHandbook of Applied Cryptography by Alfred J.

Menezes, Paul C. Van Oorschot, Scott A. Vanstone (Editor), CRC Press, ISBN 0849385237, (October 16, 1996) Available on-line at http://www.cacr.math.uwaterloo.ca/hac/

Security Engineering by Ross Anderson, Available at http://www.cl.cam.ac.uk/~rja14/book.html.

Page 6: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Overview To discover new attacks

The main objective of this course is to learn how to think like an adversary.

Review various ingenuous attacks and discuss why and how such attacks were possible.

Students who take this course will be able to analyze security of the practical systems and

Page 7: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Course Content Overview

Introduction Attack Model, Security Economics, Legal Issues, Ethics

Frequent mistakes User Interface and Psychological Failures Software Engineering Failures and Malpractices Data mining/Machine Learning Failures

Case Studies Peer-to-Peer System Security Social Network Security and Privacy Botnet/Malware Cloud Computing Security Internet Control Plane Security Cellular Network Security Mobile Phone Security Security of Automobiles Medical Device Security

Page 8: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Evaluation (IMPORTANT!)

News and paper survey (5%)

Lecture (20%)

Reading Report (21 x 2% = 42%)

Project (30%) and

participation (3%)

Page 9: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

News and Research Paper Survey

Every student needs to submit a summary of news or a research paper twice

Submission TBD

Submission date Check class calendar

Topic News and research papers should deal with security issues. Your content should be different from others. Therefore, always

check the current postings. Use twitter, google reader

Length: maximum 1,000 words, Grading: A – F Subject: Title – Author (ID) – #-th

Page 10: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

News Survey News must be fresh

published within two weeks from the due dates.

Investigative/data journalism No duplicate! Do not rely on a single source. Read related articles. Use your own language Bibliography should be added. "The register" (http://www.theregister.co.uk/) "Ars Technica" (http://arstechnica.com/) "Bruce Schneier's blog" (http://www.schneier.com/) F-secure web blog (http://www.f-secure.com/weblog/) etc.

Page 11: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Research Paper Summary Independent from your group project Published within the past three years. Top security conference papers

ACM CCS IEEE Symposium on Security and Privacy Usenix Security ISOC NDSS For papers published in other conference, please get

permission from me before posting

To summarize a paper, you often need to read more than one paper, as you might not have enough background on the topic.

Page 12: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

ParticipationDiscussion on the forum

Especially, news and paper summary

Discussion during the class

Page 13: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Group Projects Each project should have some "research" aspect. Group size

Min 1 Max 5

Important dates Pre-proposal: Sep 17, 9:00 AM. Full Proposal: Sep 24, 9:00 AM. Midterm report: Oct 24, 9:00 PM Final report: Dec 12, 9:00 AM. (NO EXTENSION!!).

Project examples Attack, attack, attack! Analysis Measurement

Page 14: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Grading Absolute (i.e. not on a curve)

But flexible ;-)

Grading will be as follows 93.0% or above yields an A, 90.0% an A- 85% = B+, 80% = B, 75% = B- 70% = C+, 65% = C, 60% = C- 55% = D+, 50% = D, and less than 50% yields an F.

Page 15: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

And… Incompletes (or make up exams) will in general not

be given. Exception: a provably serious family or personal emergency

arises with proof and the student has already completed all but a small portion of the work.

Scholastic conduct must be acceptable. Specifically, you must do your assignments, quizzes and examinations yourself, on your own.

Page 16: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim
Page 17: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

TSS Body Scanner

17

Page 18: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Security EngineeringBuilding a systems to remain dependable in

the face of malice, error or mischance

System ServiceAttack

Deny Service, Degrade QoS,

Misuse

SecurityPrevent Attacks

Communication Send message Eavesdrop Encryption

Web server Serving web page DoS CDN?

Computer ;-) Botnet Destroy

SMS Send SMSShutdown Cellular

NetworkRate Control,

Channel separation

Pacemaker Heartbeat ControlRemote programming

and eavesdroppingDistance bounding?

Nike+iPod Music + Pedometer Tracking Don’t use it?

Recommendation system

Collaborative filtering

Control rating using Ballot stuffing

?

Page 19: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

A FrameworkPolicy: what you are

supposed to achieveMechanism: ciphers,

access control,hardware tamperresistance

Assurance: the amount of reliance you can put on each mechanism

Incentive: to secure or to attack

PolicyPolicy IncentivesIncentives

MechanismMechanism AssuranceAssurance

Page 20: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Example (Airport Security) Allowing knife => Policy or mechanism? Explosive don’t contain nitrogen? Below half of the weapons taken through screening?

Priorities: $14.7 billion for passenger screening, $100 million for securing cockpit door

Bruce Schneier: Security theatre The incentives on the decision makes favor visible controls

over effective ones Measures designed to produce a feeling of security rather

than the reality

Page 21: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Example (Cablegate)What happened?

What was wrong?

What should have been done?

Page 22: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Design HierarchyWhat are we trying

to do?

How?

With what?

PolicyPolicy

ProtocolsProtocols

Hardware, crypto, ...Hardware, crypto, ...

Page 23: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Security vs DependabilityDependability = reliability + security Reliability and security are often strongly

correlated in practice

But malice is different from error!Reliability: “Bob will be able to read this file”Security: “The Chinese Government won’t be able

to read this file”

Proving a negative can be much harder …

Page 24: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Methodology 101 Sometimes you do a top-down development. In that

case you need to get the security spec right in the early stages of the project

More often it’s iterative. Then the problem is that the security requirements get detached

In the safety-critical systems world there are methodologies for maintaining the safety case

In security engineering, the big problem is often maintaining the security requirements, especially as the system – and the environment – evolve

Page 25: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

TerminologiesA system can be:

a product or component (PC, smartcard,…)some products plus O/S, comms and

infrastructure the above plus applications the above plus internal staff the above plus customers / external users

Common failing: policy drawn too narrowly

Page 26: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Terminologies A subject is a physical person

A person can also be a legal person (firm)

A principal can be a person equipment (PC, smartcard) a role (the officer of the watch) a complex role (Alice or Bob, Bob deputising for Alice)

The level of precision is variable – sometimes you need to distinguish ‘Bob’s smartcard representing Bob who’s standing in for Alice’ from ‘Bob using Alice’s card in her absence’. Sometimes you don’t

Page 27: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

TerminologiesSecrecy is a technical term – mechanisms

limiting the number of principals who can access information

Privacy means control of your own secrets

Confidentiality is an obligation to protect someone else’s secrets

Thus your medical privacy is protected by your doctors’ obligation of confidentiality

Page 28: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

TerminologiesAnonymity is about restricting access to

metadata. It has various flavors, from not being able to identify subjects to not being able to link their actions

An object’s integrity lies in its not having been altered since the last authorized modification

Authenticity has two common meanings – an object has integrity plus freshnessyou’re speaking to the right principal

Page 29: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

TerminologiesTrust vs. Trustworthy

Trusted system: whose failure can break the system

Trustworthy system: won’t fail

An NSA man selling key material to the Chinese is trusted but not trustworthy (assuming his action unauthorized)

Page 30: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Terminologies A security policy is a succinct statement of

protection goals – typically less than a page of normal language

A protection profile is a detailed statement of protection goals – typically dozens of pages of semi-formal language

A security target is a detailed statement of protection goals applied to a particular system – and may be hundreds of pages of specification for both functionality and testing

Page 31: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Threat ModelWhat property do we want to ensure against

what adversary?

Who is the adversary?What is his goal?What are his resources?

e.g. Computational, Physical, Monetary…

What is his motive?What attacks are out of scope?

Page 32: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Terminologies Attack: attempt to breach system security (DDoS)

Threat: a scenario that can harm a system (System unavailable)

Vulnerability: the “hole” that allows an attack to succeed (TCP)

Security goal: “claimed” objective; failure implies insecurity

Page 33: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Goals: ConfidentialityConfidentiality of information means that it is

accessible only by authorized entities

Contents, Existence, Availability, Origin, Destination, Ownership, Timing, etc… of:

Memory, processing, files, packets, devices, fields, programs, instructions, strings...

Page 34: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Goals: IntegrityIntegrity means that information can only be

modified by authorized entities

e.g. Contents, Existence, Availability, Origin, Destination, Ownership, Timing, etc… of:

Memory, processing, files, packets, devices, fields, programs, instructions, strings...

Page 35: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Goals: AvailabilityAvailability means that authorized entities

can access a system or service.

A failure of availability is often called Denial of Service:Packet droppingAccount freezing JammingQueue filling

Page 36: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Goals: AccountabilityEvery action can be traced to “the

responsible party.”

Example attacks:Microsoft certGuest accountStepping stones

Page 37: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Goals: DependabilityA system can be relied on to correctly deliver

serviceDependability failures:

Therac-25: a radiation therapy machine whose patients were given massive overdoses (100

times) of radiation bad software design and development practices:

impossible to test it in a clean automated way

Ariane 5: expendable launch system the rocket self-destructing 37 seconds after launch

because of a malfunction in the control software A data conversion from 64-bit floating point value to 16-

bit signed integer value

Page 38: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Interacting GoalsFailures of one kind can lead to failures of

another, e.g.: Integrity failure can cause Confidentiality failureAvailability failure can cause integrity,

confidentiality failureEtc…

Page 39: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Security AssessmentConfidentiality?

Availability?

Dependability?

“Security by Obscurity:”a system that is only

secure if the adversarydoesn’t know the details.

is not secure!

Page 40: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Rules of ThumbBe conservative: evaluate security under the

best conditions for the adversary

A system is as secure as the weakest link.

It is best to plan for unknown attacks.

Page 41: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Security & RiskWe only have finite resources for security…

If we only have $20K, which should we buy?

Product A

Prevents Attacks: U,W,Y,Z

Cost $10K

Product B

Prevents Attacks: V,X

Cost $20K

Page 42: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

RiskThe risk due to a set of attacks is the

expected (or average) cost per unit of time.One measure of risk is Annualized Loss

Expectancy, or ALE:

Σattack A

( pA × LA )

Annualized attack incidence

Cost per attack

ALE of attack A

Page 43: EE515/IS523 Think Like an Adversary Lecture 1 Introduction Yongdae Kim

Risk ReductionA defense mechanism may reduce the risk of

a set of attacks by reducing LA or pA. This is the gross risk reduction (GRR):

The mechanism also has a cost. The net risk reduction (NRR) is GRR – cost.

Σattack A

(pA × LA – p’A×L’A)