Courses/Computer Science/CPSC 601.29.ISSA.W2014
Information Systems Security Analysis
A graduate seminar on systems security.
The course is held once per week from 4pm to 6:45pm in ICT 616. There will be a short break around 5:15pm.
This is a graduate seminar. Your grade is based on your ability to critically assess and present research work in the field of systems security. You will have the opportunity to make three presentations.
Session List and Schedule
This is the schedule of papers to read and presentations. Everyone is responsible for reading the "primary reading" each week (1 or 2 papers). Presenters are responsible for reading both the background readings and the primary readings.
|Session||Date||Topic||Primary Readings||Background Readings||Presenter|
|1||13 Jan.||Introduction, Overview||Hacking the Abacus: Chapter 2||1 2 3||Locasto|
|2||20 Jan.||S1: History of Memory Corruption, S2: ibid||1 2 3 4 5||slides||Locasto|
|3||27 Jan.||S1: Chukuka talk, S2: Heap Feng Shui||paper1||(s1, s4, s5)||Chukuka|
|4||3 Feb.||S1: Laing talk, S2: Exploitation and State Machines PDF slides||x||(x, x, x)||Laing|
|5||10 Feb.||S1: Navabisohi talk, S2: TBD||x||(x, x, x)||Navabisohi|
|6||17 Feb.||no class: reading week||no class||catch up on readings||(none)|
||S1: Rougeau talk, S2: (EDURange/ScapyHunt exercise?)||x||(x, x, x)||Rougeau|
|8||3 March||S1: TBD, S2: TBD||x||(x, x, x)||Chukuka|
|9||10 March||S1: TBD, S2: TBD||x||(x, x, x)||Laing|
|10||17 March||S1: TBD, S2: TBD||x||(x, x, x)||Navabisohi|
|11||24 March||S1: TBD, S2: TBD||x||(x, x, x)||Rougeau|
|12||31 March||S1: TBD, S2: TBD||x||(x, x, x)||Chukuka|
|13||7 April||S1: TBD, S2: TBD||x||(x, x, x)||Laing|
|14||14 April||S1: TBD, S2: TBD||x1, x2||(x, x, x)||Navabisohi, Rougeau|
High--Level Syllabus / Topics
- Code Injection (Attacks and Countermeasures)
- return-to-libc, ROP
- Artificial Diversity
- Defensive Weird Machines
- Isolation, Approaches to System Instrumentation
- Virtualization and Security
- Confusion, Parsing
- Filtering and Reverse Engineering Network Protocols and File Formats
Papers (Primary Readings)
- (TOPIC: Sandboxing) "Improving Host Security with System Call Policies" by Niels Provos, 12th USENIX Security Symposium, Washington, DC, August 2003. PDF
- (TOPIC: Sandboxing/Policy Enforcement) Watson, R. N. M., Anderson, J., Laurie, B., and Kennaway, K. Capsicum: practical capabilities for UNIX. In Proceedings of the 19th USENIX Security Symposium, Washington, DC, August 2010
- (TOPIC: Practical Provable Protection) seL4: http://www.ssrg.nicta.com.au/publications/papers/Klein_EHACDEEKNSTW_09.pdf
- (TOPIC: Virtualization) "A Virtual Machine Introspection Architecture for Intrusion Detection" (NDSS 2003)
- (TOPIC: Virtualization) Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection. Brendan Dolan-Ââ€Gavitt, Tim Leek, Michael Zhivich, Jonathon Giffin, and Wenke Lee. In Proceedings of The 2011 IEEE Symposium on Security and Privacy. Oakland, CA, May 2011.
- (TOPIC: NIDS/LangSec) Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. Mark Handley and Vern Paxson and Christian Kreibich USENIX paper [http://www.icir.org/vern/papers/norm-usenix-sec-01-html/ html
- (TOPIC: NIDS/LangSec) Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection by Thomas H Ptacek and Timothy M. Newsham
- SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures (NDSS 2011)
- TIE: Principled Reverse Engineering of Types in Binary Programs, JongHyup Lee, Thanassis Avgerinos, and David Brumley (NDSS 2011)
- Discovering Semantic Data of Interest from Un-mappable Memory with Confidence by Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang and Dongyan Xu (NDSS 2012)
- Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, and Frederic T. Chong. On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits. In the proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005). Alexandria, Virginia. November 2005 http://www.cs.unm.edu/~crandall/ccsdacoda.pdf
- "Return Oriented Rootkits" by Hund, Holz, and Freiling
Papers (Supplemental Readings)
Classic Protection Papers
- "Protection in Operating Systems" by Michael A. Harrison, Walter L. Ruzzo, and Jeffrey D. Ullman (ACM Digital Library, available via U of C with appropriate network address)
- "The (Almost) Complete History of Memory Corruption Attacks" http://prezi.com/iemlmzvpnk_d/the-almost-complete-history-of-memory-corruption-attacks/
- Protection. Proc. 5th Princeton Conf. on Information Sciences and Systems, Princeton, 1971. Reprinted in ACM Operating Systems Rev. 8, 1 (Jan. 1974), pp 18-24 PDF
- "Protection in an information processing utility" http://www.multicians.org/graham-pipu.pdf
- "A hardware architecture for implementing protection rings" http://www.multicians.org/protection.html
- "The Protection of Information in Computer Systems" by Jerome H. Saltzer and Michael D. Schroeder
- http://nob.cs.ucdavis.edu/history/papers/bell76.pdf (Sections 1 and 2)
- http://nob.cs.ucdavis.edu/history/CD/biba75.pdf (Abstract, Section 1 and 2)
Sandboxing / Policy Enforcement
- XFI: Software Guards for System Address Spaces
- "Vx32: Lightweight User-level Sandboxing on the x86" (USENIX ATC 2008)
- "Native Client: A Sandbox for Portable, Untrusted x86 Native Code" (Oakland 2009)
- "Hardware Enforcement of Application Security Policies Using Tagged Memory" (OSDI 2008)
- "Make Least Privilege a Right (Not a Privilege)" (HotOS 2005)
- F. B. Schneider. Enforceable Security Policies. ACM Transactions on Information and System Security, 2(4), Mar. 2000.
Exploits and Weird Machines
Defensive Weird Machines (i.e., Countermeasures)
- "Transparent Runtime Defense Against Stack Smashing Attacks"
- "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks"
- PointGuard(TM): Protecting Pointers From Buffer Overflow Vulnerabilities
- "Building Diverse Computer Systems"
- "Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks"
- "Countering Code-Injection Attacks with Instruction-Set Randomization"
Virtualization, Monitoring, Inspection
- "Mystifying the debugger for ultimate stealthiness" http://www.phrack.org/issues.html?issue=65&id=8&mode=txt
- Steven M. Bellovin. Virtual machines, virtual security. Communications of the ACM, 49(10), October 2006. “Inside RISKS” column. html
- VM-based Security Overkill: A Lament for Applied Systems Security Research. Sergey Bratus, Michael E. Locasto, Ashwin Ramaswamy, and Sean W. Smith. Proceedings of the 19th New Security Paradigms Workshop (NSPW 2010). September 2010. Concord, MA, USA. PDF
- Efficient Monitoring of Untrusted Kernel-Mode Execution (NDSS 2011)
- traditional return-to-libc: "Getting around non-executable stack (and fix)" Solar Designer http://www.clip.dia.fi.upm.es/~alopez/bugs/bugtraq2/0287.html
- return-to-libc: Nergal, "Advanced return-into-lib(c) Exploits: PaX Case Study," Phrack 58:4
- Return-oriented programming: The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) Hovav Shacham. In Proceedings of CCS 2007, pages 552–561. ACM Press, Oct. 2007. http://cseweb.ucsd.edu/~hovav/papers/s07.html
- http://pages.cpsc.ucalgary.ca/~locasto/papers/model-polymorphic-decoders.pdf On the Infeasibility of Modeling Polymorphic Shellcode. Yingbo Song, Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis, and Salvatore J. Stolfo. In the Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007). pp. 541--551. October 2007, Alexandria, VA.
- English Shellcode Mason, Small, Monrose, MacManus. CCS 2009.
Security Measurement, Benchmarking
- "A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention"
- RIPE:Runtime Intrusion Prevention Evaluator
- "On the Effectiveness of Address Space Randomization"
- "Secure open source collaboration: an empirical study of Linus' law" http://dl.acm.org/citation.cfm?doid=1653662.1653717
- Familiarity Breeds Contempt: The Honeymoon Effect and The Role of Legacy Code in Zero-Day Vulnerabilities
- Hacking the Abacus (private release - contact the instructor for a copy)
- IJ of PoC or GTFO http://pocorgtfo.freshdefense.net/
- Locasto's CPSC 525 http://wiki.ucalgary.ca/page/Courses/Computer_Science/CPSC_525.W2013
- A Language-Based Approach to Security. Fred B. Schneider, Greg Morrisett, and Robert Harper2
- LKM signing by bx: http://cs.dartmouth.edu/~bx/code-signing/talks/shmoocon-2014.pdf
- Smashing The Kernel Stack For Fun And Profit http://www.phrack.org/issues.html?issue=60&id=6&mode=txt
Ethics and OPSEC
- http://www.phrack.org/issues.html?issue=68&id=16&mode=txt Lines in the Sand: Which Side Are You On in the Hacker Class War
- Mindset: http://www.nukees.com/d/20070328.html
- It's OK to let students hack: http://geekout.blogs.cnn.com/2012/04/23/students-chow-down-on-cyber-security-weaknesses/?hpt=hp_bn10
- On "The Research Value of Publishing Attacks" http://cacm.acm.org/magazines/2012/11/156578-the-research-value-of-publishing-attacks/abstract
- ethics of error prevention: http://www.infoq.com/presentations/error-prevention-ethics