Lecture 26, May 31
Reading: §22 (not 22.6), 26.3, [Nac97] (This is available in the Resources area of SmartSite; look in the folder “Handouts”)
Due: Homework #5, due June 6, 2013 at 11:55pm
Discussion Problem. It has often been said that the only way to decipher a message that has been enciphered using RSA is to factor the modulus n used by the cipher. If you were told that an enciphered message was on a computer that you controlled, and that the message was enciphered using RSA with an n of 1024 bits (about 309 decimal digits), how would you find the encrypter’s private key?
Lecture outline.
- Greetings and Felicitations!
- Review session: Friday, June 7, at 11:00am–12:00pm in room 184 Young (this room!)
- Types of malicious logic (con’t)
- Computer worm
- Bacterium, rabbit
- Logic bomb
- Ideal: program to detect malicious logic
- Can be shown: not possible to be precise in most general case
- Can detect all such programs if willing to accept false positives
- Can constrain case enough to locate specific malicious logic
- Defenses
- Type checking (data vs. instructions)
- Limiting rights (sandboxing)
- Limiting sharing
- Preventing or detecting changes to files
- Prevent code from acting beyond specification (proof carrying code)
- Static signature checking
- Behavioral analysis
- Check statistical characteristics of programs
- Network Security
- Firewalls
- Network organization, DMZ
- Hiding internal addresses