Lecture 6 Outline (April 10, 2015)

Lecture 6 Outline (April 10, 2015)

Reading: § 23.1–2, [Bis07]
Assignments: Program 1, due April 15, 2015; Homework 1, due April 17, 2015

  1. Greetings and felicitations!
    1. Effective Monday, our class moves to room 6 Olson
    2. If you are on the waiting list, you will now get in (6 Olson holds 120)
    3. I have to move Monday’s office hours to 9:00-9:50am
  2. Discussion problem of the day
  3. Penetration Studies
    1. Why? Why not direct analysis?
    2. Effectiveness
    3. Interpretation
  4. Flaw Hypothesis Methodology
    1. System analysis
    2. Hypothesis generation
    3. Hypothesis testing
    4. Generalization
  5. System Analysis
    1. Learn everything you can about the system
    2. Learn everything you can about operational procedures
    3. Compare to other systems
  6. Hypothesis Generation
    1. Study the system, look for inconsistencies in interfaces
    2. Compare to other systems’ flaws
    3. Compare to vulnerabilities models
  7. Hypothesis testing
    1. Look at system code, see if it would work (live experiment may be unneeded)
    2. If live experiment needed, observe usual protocols
  8. Generalization
    1. See if other programs, interfaces, or subjects/objects suffer from the same problem
    2. See if this suggests a more generic type of flaw
  9. Elimination
  10. Where to start
    1. Unknown system
    2. Known system, no authorized access
    3. Known system, authorized access
  11. Examples
    1. Burroughs system
    2. Corporate site
  12. Vulnerability models
    1. PA model
    2. RISOS
    3. NRL
    4. Aslam
  13. Example Flaws
    1. fingerd buffer overflow
    2. xterm race condition

Discussion question. From Saul Alinsky, Rules for Radicals, Random House, Inc., New York, NY (1972) pp. 72–73:

Actually, Socrates was an organizer. The function of an organizer is to raise questions that agitate, that break through the accepted pattern. Socrates, with his goal of “know thyself,” was raising the internal questions within the individual that are so essential for the revolution which is external to the individual. So Socrates was carrying out the first stage of making revolutionaries. If he had been permitted to continue raising questions about the meaning of life, to examine life and refuse the conventional values, the internal revolution would soon have moved out into the political arena. Those who tried him and sentenced him to death knew what they were doing.

How might you apply this philosophy to computer security?

You can also obtain a PDF version of this. Version of April 10, 2015 at 11:50AM