![SoftwareSecurity_Whatisit_,HistoryandSignificanceCPRE556__第1頁(yè)](http://file4.renrendoc.com/view/2073a85a59348c2442c605bce8b55093/2073a85a59348c2442c605bce8b550931.gif)
![SoftwareSecurity_Whatisit_,HistoryandSignificanceCPRE556__第2頁(yè)](http://file4.renrendoc.com/view/2073a85a59348c2442c605bce8b55093/2073a85a59348c2442c605bce8b550932.gif)
![SoftwareSecurity_Whatisit_,HistoryandSignificanceCPRE556__第3頁(yè)](http://file4.renrendoc.com/view/2073a85a59348c2442c605bce8b55093/2073a85a59348c2442c605bce8b550933.gif)
![SoftwareSecurity_Whatisit_,HistoryandSignificanceCPRE556__第4頁(yè)](http://file4.renrendoc.com/view/2073a85a59348c2442c605bce8b55093/2073a85a59348c2442c605bce8b550934.gif)
![SoftwareSecurity_Whatisit_,HistoryandSignificanceCPRE556__第5頁(yè)](http://file4.renrendoc.com/view/2073a85a59348c2442c605bce8b55093/2073a85a59348c2442c605bce8b550935.gif)
版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、Software Security: What is it?, History and SignificanceCPRE 556: Lecture 6, January 26, 2006Electrical and Computer Engineering Dept. Iowa State University1Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedCurrent Views on SecurityVulnerability = malicious functionality that extends pr
2、imary, intended design.Vulnerabilities may remain invisible until they are exploited.Software security = risk managementManagement = administrative policies + patch security holes + testing + auditing2Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedWhy is security a challengeComplexit
3、y of systems and software.Security is a cross-cutting concern pervading the entire system and its software.Lack of proactive techniques.One may say that it is better to design for security from scratch not possible in practice because:Significant investment in existing systems and software, practica
4、l realities rule out new replacements starting from scratch.Security standards and knowledge about security are still in evolutionary stage for building new systems.Software experts are not security experts. 3Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedManaging Security Risk Manag
5、ement = administrative policies + patch security holes + testing (current view) + auditing.Administrative policies (often amount restrictions on access) address only a subset of problems and leave other doors open for different types of attacks. For example, a password protected computer can be high
6、jacked by causing a buffer overflow.Patching is a reactive approach. Expensive damage can occur before patching. Testing is a proactive approach it has inherent limitations (we will elaborate and talk more about it later.)Auditing (often manual) is a proactive approach new improvements are needed fo
7、r automating and improving the quality of audits. 4Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSecurity: Software Problem Most people tend to think of security as a network problemThe truth: Security is often a software problem5Lecture Notes Copyright 2006 S. C. Kothari, All right
8、s reservedSecurity: When is it software problemWe can distinguish security problems by the mechanisms requiring changes to eliminate the vulnerability. Network Problem: requires changing networking mechanisms such as network protocols.OS Problem: requires changing OS mechanisms such OS resource mana
9、gement policies.Software Problem: requires changing software implementation or design 6Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSome ObservationsNote that in some cases:It may be a hybrid problem requiring more than one type of change.A change in a mechanism such as protocols m
10、ay be implemented in software or hardware.It may be possible to eliminate a problem by making a fundamental change in the processor hardware such as the stack mechanism for implementing subroutine calls.7Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSANS Top 10 Security Vulnerabilit
11、iesWindows: #1 - IISFailure to handle unanticipated requestsBuffer overflows: Code Red, NimdaPoor Defaults: Sample applicationsUnix: # 8 SendmailBuffer OverflowsInsecure defaultsSANS: /top20/top10.php8Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedSecurity Bugs Can Be ExpensiveBuffer
12、 overflow in IISEstimated cost: $3.26 billionBuffer overflow in SQL ServerEstimated cost: $1.2 billion 9Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedWhat Entrances Do the Hackers UseHackers exploit interactions with:Operating SystemUser InterfacesFile SystemLibraries10Lecture Notes
13、 Copyright 2006 S. C. Kothari, All rights reserved11Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedExample of an AttackBuffer Overflow Attack (BOA): Deadly attack underlying many computer highjackings in the past.12Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedBuffer
14、 Overflow AttackThe idea is simple: enter long strings into input fields, could be APIs/exposed internal objectsThis is an important bug because:copy/paste into inputs fields is a fairly common practiceBuffer overflow may be exploitable by a hacker to get arbitrary code to run on a system.13Lecture
15、Notes Copyright 2006 S. C. Kothari, All rights reservedDemonstration of Buffer Overflow Next we will see a brief demonstration.The demonstration will illustrate the buffer overflow attack as a high-level concept.Note that the demo makes simplifications and does not cover complex and subtle mechanism
16、 employed by BOA. These will be covered in a later lecture.The demo developed with NSF support is available at: /bom/ 14Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedExpected Work After the LectureYou will often find more information on lectures through papers and resources listed o
17、n the web. You should look for those, scan several, and read a few in more depth. You should report your interesting findings in class or by sending me an email. If you send email, identify the lecture number and your last name in the subject line (e.g. Lecture1-Smith) and also within your message.
18、Give proper references for each of your findings.This will be considered as a part of class participation. 15Lecture Notes Copyright 2006 S. C. Kothari, All rights reservedReferencesThese are a few additional references from CPRE 556 website that are related to this lecture:CERT Coordination Center, /Open Source Vulnerability Database, http:/ Linux Security, /content/view/101892/155/ Microsoft Security Bulletins, /technet/security/default.mspx Exploiting Software: The Achilles Heel of Cyber Defense, by Gary McGraw and Greg Hoglund, Cyber Defense Magazine, June 2004, /home/lieber/course
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年度大型工程項(xiàng)目土石方運(yùn)輸及堆放管理合同
- 2025年度五星級(jí)酒店品牌特許經(jīng)營(yíng)合同范本大全
- 2025年度體育場(chǎng)館技師承包運(yùn)營(yíng)管理合同
- 2025年度市政工程居間合同標(biāo)準(zhǔn)范本
- 2025年度國(guó)際原油倉(cāng)儲(chǔ)合同條款深度分析
- 2025年專(zhuān)用工作服生產(chǎn)加工合同模板(2篇)
- 2025年度合同法之貨物運(yùn)輸合同風(fēng)險(xiǎn)管理及保障措施
- 2025年度城市軌道交通建設(shè)合同中的擔(dān)保條款及運(yùn)營(yíng)維護(hù)責(zé)任
- 二零二五年度玻璃陽(yáng)光房行業(yè)標(biāo)準(zhǔn)制定合同3篇
- 2025年度婚紗攝影服務(wù)合同婚紗攝影后期制作合同
- GB/T 44143-2024科技人才評(píng)價(jià)規(guī)范
- 對(duì)醫(yī)院領(lǐng)導(dǎo)的批評(píng)意見(jiàn)怎么寫(xiě)更合適范文(6篇)
- 賬期協(xié)議書(shū)賬期合同書(shū)
- 2024年常德職業(yè)技術(shù)學(xué)院?jiǎn)握新殬I(yè)適應(yīng)性測(cè)試題庫(kù)完整
- 天津市河?xùn)|區(qū)2023-2024學(xué)年九年級(jí)上學(xué)期期末數(shù)學(xué)試題
- 工程防滲漏培訓(xùn)課件
- 黑龍江省哈爾濱市2024年數(shù)學(xué)八年級(jí)下冊(cè)期末經(jīng)典試題含解析
- 牛津3000核心詞匯表注釋加音標(biāo)1-4 完整版
- 高中英語(yǔ)以讀促寫(xiě)教學(xué)策略與實(shí)踐研究課件
- 金屬表面處理中的冷噴涂技術(shù)
- 河北省石家莊市2023-2024學(xué)年高一上學(xué)期期末教學(xué)質(zhì)量檢測(cè)化學(xué)試題(解析版)
評(píng)論
0/150
提交評(píng)論