320 likes | 475 Vues
Security. Dominik Streicher Vienna University of Technology. Hierachy of Needs. Figure1: Maslow Pyramide. IT Security. Security is dependability with respect to prevention of unauthorized access and / or handling of information and / or availability [1] .
E N D
Security Dominik Streicher Vienna University of Technology
Hierachyof Needs Figure1: Maslow Pyramide D. Streicher
IT Security Security isdependabilitywithrespecttopreventionofunauthorizedaccessand/orhandlingofinformationand/oravailability[1] D. Streicher
Why do people hack intosystems? • Recognition • Admiration • Curiosity • Power & Gain • Revenge • M.O.N.E.Y D. Streicher
Someinterestingnumbers Malware industryisworth ~100 billion Dollars 80-90% ofthee-mailtraffic out thereisspam 50-80% ofcomputersconnectedtothe Internet infectedwithspyware D. Streicher
Someinterestingnumbers A 26 year-oldmade 20 milliondollarswithspambeforebeingcaught Scarewareattacks (Polizei Virus) on Austrian end-users yielded >4k infections in 2012 (100€ per success) [3] D. Streicher
Goals Figure2: Goals of Security Confidentiality Integrity Availability But also: Authenticity Accountability D. Streicher
Risk Figure 4: Risk • Nothingisever 100 % secure Givenenough time, resourcesand motivationevery systemcanbe breaked D. Streicher
Software Security threats • Malicious Software (Malware) • Programsexploitingsystemsvulnerabilities • Database Security • SQL-Injections • Network Security • Sniffing, MITM • Denialof Service D. Streicher
Software Security threats (2) • Code Injection • XSS, Parameter-Injection • Social Engineering • Buffer Overflow D. Streicher
Countermeasures • Encryption • Symmetric • Asymmetric • Checksums • Access Control • Identification • Authentification • User Education • Increase Software quality • Combine SW and HW D. Streicher
Software Security (concl.) Hard tomeasure (cost/gain) Security is a process Depends on Language Security, Operating System and Hardware Reverse Engineering (Disassembly) D. Streicher
.NET Example D. Streicher
.NET Reflector D. Streicher
Software Security (concl.) Hard tomeasure (cost/gain) Security is a process Depends on Language Security, Operating System and Hardware Reverse Engineering (Disassembly) Veryhardtoachieve D. Streicher
Hardware Figure3: USB-Dongles • Itactslike a black box • Can beused • tosecure Software • Hardware-Dongle • forauthentification • Access-Cards • Biometrics D. Streicher
Computer Attacks Figure5: Computer • Device Attacks • Monitor • Keyboard • Printer • Computer Attacks • Network • Memory • Processor D. Streicher
Hardware Attacks D. Streicher
Blackbox Attack Reverse Engineering Try all possiblecombinations Extractinnerlogicfromoutput Depends on thecomplexityandprocessor power Not a real threatnowadays D. Streicher
PhysicalAttack Attackparts, whichare not availablethroughthe IO-Pins Hard toimplement D. Streicher
Side-Channel-Attack • Get information from physical implementation • Timing • Power consumption • Electromagnetic leaks • Differential Fault Analysis (DFA) • Introduce faults • Software countermeasures D. Streicher
FPGA Attacks D. Streicher
Readbackattack • Read configuration • JTAG • Programminginterface • XilinxJBits • Countermeasure • Security bit D. Streicher
Cloningof SRAM FPGAs • Configurationin NV-Memory • Countermeasure • NVRAM on chip • Encryption oftheconfigurationfile D. Streicher
Reverse-Engineering oftheBitstreams Bitstream = Configuration Data loadedinto a FPGA Torecover original netlist D. Streicher
Console Security • The best modern protectionis via theinternetandupdates: • Firmware Updates • Internet Banning • Requiresupdatedconsoletoplaynewgames D. Streicher
Consolesecuritypractices D. Streicher
XBOX 360 Operating System onlyrunssignedcode Nounencrypted, executablecodeiswrittentomemory All vulnerabilitiesarepatchedover Internet New consolesaresoldwithlatestupdates D. Streicher
XBOX 360 (2) • 768 bitsofeFuse • Preventdowngradingbyflashingkernel • Tightlycontrolledbootprocess • Write customfirmwareforthe DVD-ROM toplaycopiedgames D. Streicher
XBOX 360 (3) • Reverse Engineering of JTAG • Allowshackerstoset DMA • But JTAG isdisabledbyBootloader • SMC portcouldlaunch DMA, but could not settarget DMA addresses • Togetherthe JTAG/SMC couldtriggercontrolled DMA D. Streicher
XBOX 360 (4) Figure 6: JTAG D. Streicher
References [1]: Dependable Systems TU-Wien by Stefan Poledna [2]: Computer Security: PrinciplesandPractice byWilliam Stallings, Lawrence Brown [3]: http://www.bmi.gv.at/ Other sources: Security on FPGAs: State-of-the-Art Implementations andAttacksby Thomas Wollinger, Ruhr Universität Bochum, 2004 ACM 1539-9087/04/0800-0534 KeepingSecrets in Hardware: The Microsoft XboxTM Case Study by Andrew Huang, MIT, Cambridge A Hardware-Based Software Protection Systems – Analysis of Security Dongles with Time Meters byIreneusz J. Jozwiakand Krzysztof Marczak, IEEEE Introductionto Embedded Security , Black Hat USA 2004 Briefings byJoe Grand FPGA Design Security Issues:UsingtheispXPGA® Family of FPGAs toAchieve High Design Security IT Security TU-Wien InternetSecurity TU-WIEN Breakthroughsiliconscanningdiscoversbackdoorin militarychip (DRAFT of 05 March 2012) Figure 1,3,5: http://en.wikipedia.org/ Figure 2: Computer Security: Principlesand Practice by William Stallings, Lawrence Brown Figure 4: Introductionto Embedded Security , Black Hat USA 2004 Briefings Figure 6: http://www.free60.org/File:X_Jtag_free60.png D. Streicher