Difference between revisions of "Courses/Computer Science/CPSC 601.29.ISSA.W2014"

From wiki.ucalgary.ca
Jump to: navigation, search
m (Papers (raw))
m (Papers (raw))
Line 188: Line 188:
 
* "[http://www.cs.virginia.edu/~evans/cs551/saltzer/ The Protection of Information in Computer Systems]" by Jerome H. Saltzer and Michael D. Schroeder
 
* "[http://www.cs.virginia.edu/~evans/cs551/saltzer/ The Protection of Information in Computer Systems]" by Jerome H. Saltzer and Michael D. Schroeder
  
 +
* http://geer.tinho.net/geer.nro.6xi13.txt
  
 
     http://nob.cs.ucdavis.edu/history/papers/bell76.pdf (Sections 1 and 2)
 
     http://nob.cs.ucdavis.edu/history/papers/bell76.pdf (Sections 1 and 2)

Revision as of 20:31, 17 January 2014

Information Systems Security Analysis

A graduate seminar on systems security.

Logistics

The course is held once per week from 4pm to 6:45pm in ICT 616. There will be a short break around 5:15pm.

Policies

This is a graduate seminar. Your grade is based on your ability to critically assess and present research work in the field of systems security. You will have the opportunity to make three presentations.

Session List and Schedule

This is the schedule of papers to read and presentations. Everyone is responsible for reading the "primary readings" each week. Presenters are responsible for reading both the background reading and the primary reading.

Sessions
Session Date Topic Primary Readings Background Readings Presenter
1 13 Jan. Introduction, Overview x 1 2 3) x
2 20 Jan. S1: TBD, S2: TBD x (x) x
3 27 Jan. S1: TBD, S2: TBD x (x, x, x) x
4 3 Feb. S1: TBD, S2: TBD x (x, x, x) x
5 10 Feb. S1: TBD, S2: TBD x (x, x, x) x
6 17 Feb. no class: reading week x (x, x, x) x
7 24 Feb. class will be rescheduled x (x, x, x) x
8 3 March S1: TBD, S2: TBD x (x, x, x) x
9 10 March S1: TBD, S2: TBD x (x, x, x) x
10 17 March S1: TBD, S2: TBD x (x, x, x) x
11 24 March S1: TBD, S2: TBD x (x, x, x) x
12 31 March S1: TBD, S2: TBD x (x, x, x) x
13 7 April S1: TBD, S2: TBD x (x, x, x) x
14 14 April S1: TBD, S2: TBD x (x, x, x) x

Topics

  • Ethics
  • Code Injection (Attacks and Countermeasures)
    • stack
    • heap
    • countermeasures
  • Isolation
    • classic work / multics
    • Janus
    • systrace
    • bsd jail
    • privilege separation
  • Virtualization and Security
  • Trust Management
  • Artificial Diversity
  • ROP
  • Self--Healing
  • Filtering and Reverse Engineering Network Protocols and File Formats
    • Tupni
  • IDS
  • LangSec
  • Approaches to System Instrumentation
  • Fault tolerance

Selected Hacker Talks (to view)

  • TBD
  • TBD
  • ...

Uncategorized and Miscellaneous Links

Papers (raw)

  • Protection. Proc. 5th Princeton Conf. on Information Sciences and Systems, Princeton, 1971. Reprinted in ACM Operating Systems Rev. 8, 1 (Jan. 1974), pp 18-24 PDF
  • "Protection in Operating Systems" by Michael A. Harrison, Walter L. Ruzzo, and Jeffrey D. Ullman (ACM Digital Library, available via U of C with appropriate network address)
   http://nob.cs.ucdavis.edu/history/papers/bell76.pdf (Sections 1 and 2)
   http://nob.cs.ucdavis.edu/history/CD/biba75.pdf (Abstract, Section 1 and 2)
Thomas Dullien and Halvar Flake "Exploitation and State Machines" PDF
  • F. B. Schneider. Enforceable Security Policies. ACM Transactions on Information and System Security, 2(4), Mar. 2000.
  • A Language-Based Approach to Security. Fred B. Schneider, Greg Morrisett, and Robert Harper2

http://www.hpl.hp.com/techreports/2012/HPL-2012-63R1.html

Bugs in Open Source Software:

  • Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection by Thomas H Ptacek and Timothy M. Newsham
  • Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. Mark Handley and Vern Paxson and Christian Kreibich USENIX paperhtml

seL4: http://www.ssrg.nicta.com.au/publications/papers/Klein_EHACDEEKNSTW_09.pdf

  • Steven M. Bellovin. Virtual machines, virtual security. Communications of the ACM, 49(10), October 2006. “Inside RISKS” column. html
  • VM-based Security Overkill: A Lament for Applied Systems Security Research. Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, and Sean W. Smith. Proceedings of the 19th New Security Paradigms Workshop (NSPW 2010). September 2010. Concord, MA, USA. PDF

Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, and Frederic T. Chong. On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits. In the proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005). Alexandria, Virginia. November 2005 http://www.cs.unm.edu/~crandall/ccsdacoda.pdf

English Shellcode http://www.cs.jhu.edu/~sam/ccs243-mason.pdf

[in an information processing utility] [hardware architecture for implementing protection rings] [in Operating Systems] [the Infeasibility of Modeling Polymorphic Shellcode]. Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, and Salvatore J. Stolfo. In the Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007). pp. 541--551. October 2007, Alexandria, VA. [Shellcode] Mason, Small, Monrose, MacManus. CCS 2009. [Software Guards for System Address Spaces] ["Transparent Runtime Defense Against Stack Smashing Attacks"] ["StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks"] ["On the Effectiveness of Address Space Randomization"] ["Return Oriented Rootkits"] by Hund, Holz, and Freiling ["Building Diverse Computer Systems"] ["Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks"] or ["Countering Code-Injection Attacks with Instruction-Set Randomization"] ["The Geometry of Innocent Flesh on the Bone"] ["A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention"] [Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks] [Protecting Pointers From Buffer Overflow Vulnerabilities] [Intrusion Prevention Evaluator] ['em Where it Hurts: A Live Security Exercise on Cyber Situational Awareness]



http://www.prisonexp.org/ http://sunnyday.mit.edu/papers/therac.pdf http://www.acm.org/about/code-of-ethics

http://stallman.org/articles/on-hacking.html

http://www.theatlantic.com/technology/archive/12/07/if-hackers-didnt-exist-governments-would-have-to-invent-them/259463/

http://www.cs.dartmouth.edu/~sws/pubs/pretending.pdf

Mindset: http://www.nukees.com/d/20070328.html

It's OK to let students hack: http://geekout.blogs.cnn.com/2012/04/23/students-chow-down-on-cyber-security-weaknesses/?hpt=hp_bn10

On "The Research Value of Publishing Attacks" http://cacm.acm.org/magazines/2012/11/156578-the-research-value-of-publishing-attacks/abstract

http://www.slideshare.net/grugq/opsec-for-hackers

ethics of error prevention: http://www.infoq.com/presentations/error-prevention-ethics

News