Outline for January 18, 2002

  1. Greetings and Felicitations!
    1. Rules for scanning
  2. Puzzle of the day
  3. PA Model (Neumann's organization)
    1. Improper protection (initialization and enforcement)
      1. improper choice of initial protection domain
      2. improper isolation of implementation detail
      3. improper change
      4. improper naming
      5. improper deallocation or deletion
    2. Improper validation
    3. Improper synchronization;
      1. CLASS="Romanedi"> improper indivisibility
      2. improper sequencing
    4. Improper choice of operand or operation
  4. RISOS
    1. Incomplete parameter validation
    2. Inconsistent parameter validation
    3. Implicit sharing of privileged/confidential data
    4. Asynchronous validation/Inadequate serialization
    5. Inadequate identification/authentication/authorization
    6. Violable prohibition/limit
    7. Exploitable logic error
  5. Comparison and Problems
    1. Levels of abstraction
    2. Point of view
  6. Penetration Studies
    1. Why? Why not direct analysis?
    2. Effectiveness
    3. Interpretation
  7. Flaw Hypothesis Methodology
    1. System analysis
    2. Hypothesis generation
    3. Hypothesis testing
    4. Generalization
  8. System Analysis
    1. Learn everything you can about the system
    2. Learn everything you can about operational procedures
    3. Compare to models like PA, RISOS
  9. Hypothesis Generation
    1. Study the system, look for inconsistencies in interfaces
    2. Compare to previous systems
    3. Compare to models like PA, RISOS
  10. Hypothesis testing
    1. Look at system code, see if it would work (live experiment may be unneeded)
    2. If live experiment needed, observe usual protocols
  11. Generalization
    1. See if other programs, interfaces, or subjects/objects suffer from the same problem
    2. See if this suggests a more generic type of flaw
  12. Peeling the Onion
    1. You know very little (not even phone numbers or IP addresses)
    2. You know the phone number/IP address of system, but nothing else
    3. You have an unprivileged (guest) account on the system.
    4. You have an account with limited privileges.

ECS 153, Introduction to Computer Security
Winter Quarter 2002
Email: cs153@cs.ucdavis.edu