computer system engineering, lecture 20 20: introduction ... · 6.033 spring 2018 lecture #20 •...

Post on 05-Oct-2020

4 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

6.033 Spring 2018Lecture #20

• Introduction to security• Threat models, policy• Guard model

6.033 | spring 2018 | Katrina LaCurts 1

© Condé Nast. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use.

2

© Condé Nast. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use.

3

© Condé Nast. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use.

4

© Xudong Zheng. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use.

5

© Condé Nast. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use.

6

© Insider Inc. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use. 7

© Condé Nast. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use.

8

© Condé Nast. All rights reserved. This content is excluded from our Creative Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use.

9

what makes computer securityspecial?

6.033 | spring 2018 | Katrina LaCurts 10

why is security difficult?

6.033 | spring 2018 | Katrina LaCurts 11

steps towards building amore secure system:

1. be clear about goals (policy)

2. be clear about assumptions(threat model)

6.033 | spring 2018 | Katrina LaCurts 12

complete mediation: every request forresource goes through the guard

server

request guard resource principal

(identifies client on server)

authentication: is the principal who they claim to be?

authorization: does principal have access to perform request on resource?

6.033 | spring 2018 | Katrina LaCurts 13

what can go wrong with the guardmodel?

6.033 | spring 2018 | Katrina LaCurts 14

sql injection demo

username | email | public? karen | karen@fake.com | yes peter | peter@fake.com | yes katrina | no

SELECT username, email FROM users WHERE username='<username>' AND public='yes'

Let <username> = katrina' OR username='

6.033 | spring 2018 | Katrina LaCurts 15

sql injection demo

username | email | public? karen | karen@fake.com | yes peter | peter@fake.com | yes katrina | no

SELECT username, email FROM users WHERE username='katrina' OR username='' AND

public='yes'

6.033 | spring 2018 | Katrina LaCurts 16

> cd /mit/bob/project> cat ideas.txtHello world....> mail alice@mit.edu < ideas.txt

6.033 | spring 2018 | Katrina LaCurts 17

what can go wrong with the guardmodel?

6.033 | spring 2018 | Katrina LaCurts 18

• Adversarial attacks are different from “normal” failures.They’re targeted, rarely random, and rarely independent.Just one successful attack can bring down a system.

• Securing a system starts by specifying our goals (policy)and assumptions (threat model).

• The guard model provides complete mediation. Eventhough things can still go wrong, systems that use thismodel avoid common pitfalls.

6.033 | spring 2018 | Katrina LaCurts 19

MIT OpenCourseWare https://ocw.mit.edu

6.033 Computer System EngineeringSpring 2018

For information about citing these materials or our Terms of Use, visit: https://ocw.mit.edu/terms.

20

top related