Introduction to Cybersecurity Prof. Dr. Michael Backes Director, CISPA – Center for IT Security, Privacy, and Accountability Chair for IT-security & Cryptography
Organisation Course Registration / Course Number (97380) - Register both in L:admin and in HISPOS (links on the course website) - Deadline for registration in L:admin: Monday 07 November 2016, 23:59 Lectures: When and where? - Friday 14:00-16:00 - Building E2 2, Günter-Hotz-Hörsaal Tutorials: - 6 Tutorials - more information on the course website Tutorial assignment on Wednesday, 09 Nov 2015 (after registration deadline) Foundations of Cybersecurity 2016 1
Organisation Tutors’ office hour for general questions & advice: - Tuesday 13:00-14:00 - Room TBA (see course website) - Starting Tuesday, 08 November 2015 Course website: https://infsec.cs.uni-saarland.de/index.php%3Fp=1758.html Lecture notes / references will be published on website after each lecture Mailing list for discussions: cysec16@mail-infsec.cs.uni-saarland.de Foundations of Cybersecurity 2016 2
Organisation Teaching assistants Oliver Schranz System Security, Web Security Praveen Manoharan Cryptography, Privacy, Theory Foundations of Cybersecurity 2016 3
Organisation Prerequisites: - Mathematical / logical understanding - Should attend Programmierung 1 in parallel, or have attended in the past - Should attend MfI 1 in parallel, or have attended in the past Homeworks: - Theoretical exercises alone; practical projects may be groups of 2 people - Given out at the lecture in written form - To be handed in before the start of the resp. lecture (typically by email) - Email to: cysec16-submissions@mail-infsec.cs.uni-saarland.de For some practical projects, you will need CIP pool accounts! - Make sure your solutions work on these machines - Subscribe for an account by filling out registration form that we hand out Foundations of Cybersecurity 2016 4
Organization Exam - Thursday, 23.02.17, 09:00-12:00 - E2 2, Günter-Hotz-Hörsaal + E1 3, HS002 Requirements for passing the course - To attend exam, must achieve • 50% in theoretical exercises and • 50% in practical projects - To pass the course, must achieve 50% in exam Grading: - 60% from exam, 20% from theoretical exercises, 20% from practical projects Foundations of Cybersecurity 2016 5
Structure of this lecture This lecture consists of five parts (“chapters”) 1. Basics of System Security 2. Basics of Web Security 3. Basics of Cryptography 4. Basics of Data Privacy 5. Basics of Formal Methods in Security Today’s lecture: General introduction to Cybersecurity and historical cryptography Foundations of Cybersecurity 2016 6
Why Cyber attacks? Foundations of Cybersecurity 2016 7
Hackers prior to 2003 Profile: - Male - Between 14 and 34 years of age - Computer addicted - No permanent girlfriend No commercial Interest Source: Raimund Genes Foundations of Cybersecurity 2016 8
Hackers after 2003 - Commercialization Option 1 : bug bounty programs (many) Google Vulnerability Reward Program: up to 20K $ - For Chrome exploits even up to 50K $ Microsoft Bounty Program: up to 100K $ - For Browser exploits up to 100K $ and for novel browser defenses up to 50k $ Mozilla Bug Bounty program: 500$ - 3000$ Pwn2Own competition: 15K $ Zero Day Initiative, Verisign iDefense: 2K – 25K $ - ZDI even has a ‘rewards program’ similar to a ‘frequent flyer program’ Foundations of Cybersecurity 2016 9
Hackers after 2003 - Commercialization Option 2 : Black/Grey Market - What did a Mozilla zero-day exploit in 2007 buy you? • $500: A Playstation 4 - What did an Adobe Reader zero-day exploit in 2012 buy you? • $5,000 - $30,000: Extreme gaming PC Yoyotech’s XDNA Aurum 24K - What did an iOS zero-day exploit in 2012 buy you? • $100,000 - $250,000: 2014 Lamborghini Gallardo Foundations of Cybersecurity 2016 10
Hackers after 2003 - Commercialization Option 2 : Black/Grey market Source: Rand Corp., National Security Research Division. Markets for Cybercrime Tools and Stolen Data: Hackers ’ Bazaar Foundations of Cybersecurity 2016 11
Marketplace for Owned Machines spam Pay-per-install (PPI) services Clients keylogger bot PPI operation: 1. Own victim’s machine 2. Download and install client’s code PPI service 3. Charge client Cost: US - 100-180$ / 1000 machines Asia - 7-8$ / 1000 machines Victims Source: Caballero et al. (www.icir.org/vern/papers/ppi-usesec11.pdf) Foundations of Cybersecurity 2016 12
Tracking vulnerability disclosures CVSS Base Score composed from different factors such as: Access Vector - - Access Complexity - Confidentiality Impact - Integrity Impact Higher score Higher security impact Source: http://www.cvedetails.com/cvss-score-distribution.php ; 04/09/2014 Cumulative Disclosures 1988-2014 80.000 Source: http://web.nvd.nist.gov/view/vuln/statistics-results?adv_search=true&cves=on 60.000 40.000 20.000 0 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 Foundations of Cybersecurity 2016 13
CVSS Score Distribution For Top 30 Products By Total Number Of "Distinct" Vulnerabilities Source: http://www.cvedetails.com/top-50-product-cvssscore-distribution.php Foundations of Cybersecurity 2016 14
World’s biggest data breaches Hacked Poor security Inside job Lost/stolen computer Lost/stolen media Accidentally published All Source: http://www.informationisbeautiful.net/ visualizations/worlds-biggest-data- breaches-hacks/ Foundations of Cybersecurity 2016 15
What is Cybersecurity? What needs to be secured? Foundations of Cybersecurity 2016 16
Attacking the software – slot machines Developer of the software modifies the code If a sequence of 10, 5, 25, 10, 5,… cent coins is inserted, the machine gives out the jackpot. He was caught because he was greedy. Foundations of Cybersecurity 2016 17
Attacking the software – horse races Developer of the software modifies the code Allows to place a bet after the race is over. He was caught because he was greedy. Foundations of Cybersecurity 2016 18
What is Cybersecurity? Software OS Foundations of Cybersecurity 2016 20
Hacking Computer via USB Hey, I am a Virus makes USB key’s firmware keyboard. impersonate a keyboard. OK, so tell me what you are typing. Stuxnet uses USB keys to attack computers that are not online. Targeting uranium enrichment fabrics in Iran. - Goal: Destroy parts of the fabric Foundations of Cybersecurity 2016 21
New era of mobile phone attacks Baseband attacks: infiltrate your phone through the airwaves themselves. Completely bypasses operating system and antivirus software to hack directly into the radio processor. USB attacks: Use a hidden device https://www.usenix.org/conference/woot12/workshop -program/presentation/weinmann packed inside a telephone charger or docking station to casually mining phone for personal data. Steal saved passwords, pictures, and probably deliver some nasty malware for good measure. http://i1227.photobucket.com/albums/ee430/kalsta1 /malicious-usb-charger.jpg Foundations of Cybersecurity 2016 22
What is Cybersecurity? Software OS Hardware Foundations of Cybersecurity 2016 23
Mifare Classic and Crypto Used a microscope to see which hardware is inside the card Analyzed 10,000 blocks on the chip 70 different types Reconstructed random number generation - Had only 16-bit keys: 2 16 = 65.536 Use case of such cards were (!) students’ IDs Foundations of Cybersecurity 2016 24
What is Cybersecurity? Software Crypto OS Hardware Foundations of Cybersecurity 2016 25
Phishing Looks normal... …b ut is not! Foundations of Cybersecurity 2016 26
Social Engineering Sometimes you just need to ask nicely Foundations of Cybersecurity 2016 27
What is Cybersecurity? User Software Crypto OS Hardware Foundations of Cybersecurity 2016 28
Could Hackers Take Your Car for a Ride? Attack categories: - Attacks requiring vehicle access : Attackers uses specially crafted CDs or media files (e.g., mp3) that include a Trojan horse to gain control of various automotive systems - Remote attacks: Attacking weaknesses in the baseband GPRS cellular, FM Radio Data System (RDS), SMS infrastructures used in remote- vehicular assistance services, or in Internet- enabled systems [https://www.youtube.com/watch?v=yTBfIrnSDQk] 2015 good year for car hacking - BlackHat 2015: Charlie Miller and Chris Valasek demonstrate how to hack the CAN bus of Jeep via the multimedia system controller’s WiFi interface - W00t’15: Remotely compromising the telematics control unit (TCU) allows arbitrary remote control of the vehicle NCC Group: Use fake digital audio broadcasting - (DAB) station to exploit bug in DAB system of car to seize control of a vehicle's brakes and other critical systems http://upload.wikimedia.org/wikipedia/commons/a/a3/Tesla_ Model_S_digital_panels.jpg Foundations of Cybersecurity 2016 29
Recommend
More recommend