Databases- A class break by design! Is there a class defense-.ppt
《Databases- A class break by design! Is there a class defense-.ppt》由会员分享,可在线阅读,更多相关《Databases- A class break by design! Is there a class defense-.ppt(44页珍藏版)》请在麦多课文档分享上搜索。
1、Databases: A class break by design! Is there a class defense?,Dr Steve Moyle Founder/CTO SecernoE: T: +44 7801749587,Edinburgh Chapter February 2008,2,“Sensitive customer information is like asbestos. Weve been building housing with it for years and only recently discovered its toxic when airborne”
2、.Andrew Jaquith Yankee, September 2007,3,“In my opinion, database security is riddled with holes and its the biggest problem we face in IT today.Database attacks offer the biggest potential for fraudulent activity and damage to companies reputations and customer confidence”.David Litchfield, Managin
3、g Director NGSS Keynote, Black Hats Conference Las Vegas, August 2006,4,Databases: The class break by design! Is there a class defense?,Outline Class breaks Database principles The infinite language space Class Defenses Informed Security Automatic unique language subspace,5,Databases the good news,U
4、biquitous persistent storage fielded in millions of systems Skills availability Standards based common language Long history Multi featured Aggregated storage of valuable data,6,Ubiquitous persistent storage,How many fielded systems? $14 billion database market in 2005 Source: Gartner 2005 135,166,4
5、73 “up” web sites Source: Netcraft September 2007 How many “unknown” systems? Products built on a database that the owner knows nothing about Persistent storage Microsoft was rumoured to have considered it as an alternative component of their operating system for its file-store,7,Mature market,Marke
6、tplace of alternatives “simple” for customers to switch Database skill sets DBAs Applications Development (But what about database security?) Very stable technology 80% budget spent “keeping the lights on” Difficult to start again with a “clean sheet”Competition is good for customers as it drives st
7、andardisation but standardisation leads to a single point of failure,8,Databases are one of many components in complicated systems Abstracting complexity into large components obfuscates security issues Evolution of data usage Data processing systems Client-server SOAHow many legacy database systems
8、 secure in yesteryear are wrapped to deliver SOA?,Aggregated data aggregating risk,9,Databases the not so good news,Ubiquitous persistent storage fielded in millions of systems every one has got one Skills availability every one knows how they work Standards based common language Long history old fa
9、shioned Multi featured vast vulnerability surface Aggregated storage of valuable data all eggs in a single basket,Class Breaks,11,Class breaks,What is a “class break?” In network security jargon, thats what happens when one breach leads to a whole new “class” of attacks on various systems, using sim
10、ilar methods. Source: http:/www.doubletongued.org/index.php/citations/class_break_1/“Technological advances bring with them standardization, which also adds to security vulnerabilities, because they make it possible for attackers to carry out class breaks: attacks that can break every instance of so
11、me feature in a security system. Class breaks mean that you can be vulnerable simply because your systems are the same as everyone elses. And once attackers discover a class break, theyll exploit it again and again until the manufacturer fixes the problem (or until technology advances in favor of th
12、e defender again).“ Source: Bruce Schneier, “Beyond Fear“, 2003, pp 93-4,12,Classic class break,Combining control and data channels“For decades, phone companies have been fighting against class breaks. In the 1970s, for example, some people discovered that they could emulate a telephone operators co
13、nsole with a 2600-Hz tone, enabling them to make telephone calls for free, from any telephone” Source: Bruce Schneier, “Beyond Fear“, 2003, pp 93-4,13,Lessons from history,What can go wrong when combining static data & dynamic control in the one channel? Microsoft Word Words/Paragraphs + Word Basic
14、Macros Macro viruses Web browsers Static Web pages + JavaScript Cross-site scripting (XSS) Databases Valuable data + Data Control Language, Data Manipulation Language SQL Injection, ,Remote Database Control,14,Principles of databases,History Original research due to Ted Codd in the 1960s Codds 12 ru
15、les for defining a fully relational database Source: E.F. Codd, : “Is Your DBMS Really Relational?“, ComputerWorld, 1985The “breakthrough” everything is a relation (i.e. a table of records)Everything is accessed by the same language Structured Query Language is the most popular computer language use
16、d to create, modify, retrieve and manipulate data from relational database management systems.,15,Codds Principles: Rule #4,Codds 12 rules for defining a fully relational databaseRule 4: Dynamic On-line Catalog Based on the Relational Model The database description is represented at the logical leve
17、l in the same way as ordinary data, so authorized users can apply the same relational language to its interrogation as they apply to regular data.,16,Database Class break Component #1,Database nitric acid (nitro)Combining control and data channelsTo be a relational database it must combine data and
18、control in the same Physical channel (the network) Logical channel (the language),17,The Language space,How many sentences are allowed in a language? How many SQL statements can we write? Can we index an infinite space?,18,Database Class break Component #2,Database glycerineConsider the Database as
19、a scripting engine SQL is a powerful, common, standard scripting (a.k.a. macro) language. What functionality can be achieved with a modern database? Data access (e.g. read) yes Data manipulation (e.g. write) yes operating system interaction sure Anything that is computable (?),19,The database vulner
20、ability surface,The infinite language spaceApplication programming errorsinappropriate setup E.g. Over provisioning, ACL,+,+,= ,20,How does an application talk to the database?,Assembling a Normal SQL statement SELECT * from dvd_stock where catalog-no = PHE8131 and location = 1The parameters in the
21、statement come from user input (e.g. a web browser). The application layer accepts the values for catalog-no and location (PHE8131, 1) and pastes them into the pre-canned query template.SELECT * from dvd_stock where catalog-no = and location =,PHE8131,1,21,Database answers,Results from a Normal quer
22、y.Statement: SELECT * from dvd_stock where catalog-no = PHE8131 and location = 1Output:,Star Trek - The Next Generation Season 2 39.35 15 Star Trek - The Next Generation Season 3 39.35 12 Star Trek - The Next Generation Season 4 39.35 13 Star Trek - The Next Generation Season 5 39.35 17,22,Assemblin
23、g an abnormal SQL statement: SQL Injection,Instead of inputting a sensible value for catalog-no in the web browser the user enters union select name, id, 0 from sysobjects where xtype=U;- which the application layer pastes into the pre-canned query template.,SELECT * from dvd_stock where catalog-no
24、= , and location =,union select name, id, 0 from sysobjects where xtype=U;-,1,23,Codds Achilles heal,Using “union“ in the select returns meta-data about the tables within the database. Statement: SELECT * from dvd_stock where catalog-no = union select name, id, 0 from sysobjects where xtype=U;- and
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- DATABASESACLASSBREAKBYDESIGNISTHEREACLASSDEFENSEPPT

链接地址:http://www.mydoc123.com/p-372909.html