Outline for December 1, 2003

Reading: Chapters 22.5, 23

Discussion Problem

Two MIT graduate students bought a number of used hard drives on E-Bay and analyzed them. They were able to recover lots of files, including files containing very personal information (such as a love letter), and in some cases even restore the operating system of the computer to which the hard drive belonged. Some of these disks had simply been discarded, but others had files deleted, or were reformatted--and still the students could recover the files!

The news article said that the students' results showed how unaware people were of security issues. Is the data being on the discarded disks in fact a vulnerability? Are the "delete," "rm," "format," and other such commands used to erase these disks secure? If not, what is the vulnerability in these programs, and how would you fix it?

Outline for the Day

  1. Practise: detecting writing
    1. a. Integrity check files such as binaudit, tripwire; go through signature block
    2. b. LOCUS approach: encipher program, decipher as you execute.
    3. c. Co-processors: checksum each sequence of instructions, compute checksum as run; if different, complain
    4. Sandboxes: confine protection domain of process
  2. Penetration Studies
    1. Why? Why not direct analysis?
    2. Effectiveness
    3. Interpretation
  3. Flaw Hypothesis Methodology
    1. System analysis
    2. Hypothesis generation
    3. Hypothesis testing
    4. Generalization
  4. System Analysis
    1. Learn everything you can about the system
    2. Learn everything you can about operational procedures
    3. Compare to other systems


Here is a PDF version of this document.