01 Intro
01 Intro
edu/cs155
CS155
Computer Security
Course overview
Dan Boneh
The computer security problem
• Lots of buggy software
• Social engineering is very effective
date
Sample attacks
Dan Boneh
Why own client machines:
1. IP address and bandwidth stealing
Attacker’s goal: look like a random Internet user
• size: 3.5 KB
• spread via email
attachments
• also found on home routers
CryptoWall (2014-)
• targets Windows
• spread by spam emails
Dan Boneh
Why own machines:
4. Spread to isolated systems
Example: Stuxtnet
Windows infection ⇒
Siemens PCS 7 SCADA control software on Windows ⇒
Siemens device controller on isolated network
• Political motivation:
– DNC, Tunisia Facebook (Feb. 2011), GitHub (Mar. 2015)
⋮
Can security technology help?
Dan Boneh
How companies lose data
insider error
lost/stolen laptops
insider attack
malware/phishing
Dan Boneh
Marketplace for Vulnerabilities
Option 1: bug bounty programs (many)
• Google Vulnerability Reward Program: up to $31,337
• Microsoft Bounty Program: up to $100K
• Apple Bug Bounty program: up to $200K (secure boot firmware)
• Pwn2Own competition: $15K
Option 2:
• Zero day initiative (ZDI), iDefense (accenture): up to $25K
• Zerodium: $1.5M for iOS10, $200K for Android 7 (Sep. 2016)
Dan Boneh
Example: Mozilla
Dan Boneh
Marketplace for Vulnerabilities
Option 3: black market
PPI operation:
PPI service
1. Own victim’s machine
2. Download and install client’s code
3. Charge client
Victims
Source: Cabalerro et al. (www.icir.org/vern/papers/ppi-usesec11.pdf) Dan Boneh
Marketplace for owned machines
clients spam
keylogger
bot
Victims
Source: Cabalerro et al. (www.icir.org/vern/papers/ppi-usesec11.pdf) Dan Boneh
This course
Goals:
Dan Boneh
This course
Part 1: basics (architecting for security)
• Securing apps, OS, and legacy code
Isolation, authentication, and access control
Part 2: Web security (defending against a web attacker)
• Building robust web sites, understand the browser security model
Part 3: network security (defending against a network attacker)
• Monitoring and architecting secure networks.
Part 4: securing mobile applications
Dan Boneh
Don’t try this at home !
Dan Boneh
Ken Thompson’s clever Trojan
Dan Boneh