Chapter 19- Malicious Logic.ppt
《Chapter 19- Malicious Logic.ppt》由会员分享,可在线阅读,更多相关《Chapter 19- Malicious Logic.ppt(66页珍藏版)》请在麦多课文档分享上搜索。
1、November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-1,Chapter 19: Malicious Logic,What is malicious logic Types of malicious logic Defenses,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-2,Overview,Defining malicious logic Types Trojan horses
2、Computer viruses and worms Other types Defenses Properties of malicious logic Trust,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-3,Malicious Logic,Set of instructions that cause site security policy to be violated,November 1, 2004,Introduction to Computer Security 20
3、04 Matt Bishop,Slide #19-4,Example,Shell script on a UNIX system: cp /bin/sh /tmp/.xyzzy chmod u+s,o+x /tmp/.xyzzy rm ./ls ls $* Place in program called “ls” and trick someone into executing it You now have a setuid-to-them shell!,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,S
4、lide #19-5,Trojan Horse,Program with an overt purpose (known to user) and a covert purpose (unknown to user) Often called a Trojan Named by Dan Edwards in Anderson Report Example: previous script is Trojan horse Overt purpose: list files in directory Covert purpose: create setuid shell,November 1, 2
5、004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-6,Example: NetBus,Designed for Windows NT system Victim uploads and installs this Usually disguised as a game program, or in one Acts as a server, accepting and executing commands for remote administrator This includes intercepting key
6、strokes and mouse motions and sending them to attacker Also allows attacker to upload, download files,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-7,Replicating Trojan Horse,Trojan horse that makes copies of itself Also called propagating Trojan horse Early version o
7、f animal game used this to delete copies of itself Hard to detect 1976: Karger and Schell suggested modifying compiler to include Trojan horse that copied itself into specific programs including later version of the compiler 1980s: Thompson implements this,November 1, 2004,Introduction to Computer S
8、ecurity 2004 Matt Bishop,Slide #19-8,Thompsons Compiler,Modify the compiler so that when it compiles login , login accepts the users correct password or a fixed password (the same one for all users) Then modify the compiler again, so when it compiles a new version of the compiler, the extra code to
9、do the first step is automatically inserted Recompile the compiler Delete the source containing the modification and put the undoctored source back,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-9,login source,correct compiler,login executable,user password,login sourc
10、e,doctored compiler,login executable,magic password,user password or,logged in,logged in,The Login Program,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-10,compiler source,correct compiler,compiler executable,login source,compiler source,doctored compiler,compiler exe
11、cutable,correct login executable,login source,rigged login executable,The Compiler,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-11,Comments,Great pains taken to ensure second version of compiler never released Finally deleted when a new compiler executable from a dif
12、ferent system overwrote the doctored compiler The point: no amount of source-level verification or scrutiny will protect you from using untrusted code Also: having source code helps, but does not ensure youre safe,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-12,Compu
13、ter Virus,Program that inserts itself into one or more files and performs some action Insertion phase is inserting itself into file Execution phase is performing some (possibly null) action Insertion phase must be present Need not always be executed Lehigh virus inserted itself into boot file only i
14、f boot file not infected,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-13,Pseudocode,beginvirus:if spread-condition then beginfor some set of target files do beginif target is not infected then begindetermine where to place virus instructionscopy instructions from beg
15、invirus to endvirusinto targetalter target to execute added instructionsend;end;end;perform some action(s)goto beginning of infected program endvirus:,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-14,Trojan Horse Or Not?,Yes Overt action = infected programs actions Co
16、vert action = virus actions (infect, execute) No Overt purpose = virus actions (infect, execute) Covert purpose = none Semantic, philosophical differences Defenses against Trojan horse also inhibit computer viruses,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-15,Hist
17、ory,Programmers for Apple II wrote some Not called viruses; very experimental Fred Cohen Graduate student who described them Teacher (Adleman) named it “computer virus” Tested idea on UNIX systems and UNIVAC 1108 system,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-16
18、,Cohens Experiments,UNIX systems: goal was to get superuser privileges Max time 60m, min time 5m, average 30m Virus small, so no degrading of response time Virus tagged, so it could be removed quickly UNIVAC 1108 system: goal was to spread Implemented simple security property of Bell-LaPadula As wri
19、ting not inhibited (no *-property enforcement), viruses spread easily,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-17,First Reports,Brain (Pakistani) virus (1986) Written for IBM PCs Alters boot sectors of floppies, spreads to other floppies MacMag Peace virus (1987)
20、 Written for Macintosh Prints “universal message of peace” on March 2, 1988 and deletes itself,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-18,More Reports,Duffs experiments (1987) Small virus placed on UNIX system, spread to 46 systems in 8 days Wrote a Bourne shell
21、 script virus Highlands Lotus 1-2-3 virus (1989) Stored as a set of commands in a spreadsheet and loaded when spreadsheet opened Changed a value in a specific row, column and spread to other files,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-19,Types of Viruses,Boot
22、sector infectors Executable infectors Multipartite viruses TSR viruses Stealth viruses Encrypted viruses Polymorphic viruses Macro viruses,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-20,Boot Sector Infectors,A virus that inserts itself into the boot sector of a disk
23、 Section of disk containing code Executed when system first “sees” the disk Including at boot time Example: Brain virus Moves disk interrupt vector from 13H to 6DH Sets new interrupt vector to invoke Brain virus When new floppy seen, check for 1234H at location 4 If not there, copies itself onto dis
24、k after saving original boot block,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-21,Executable Infectors,A virus that infects executable programs Can infect either .EXE or .COM on PCs May prepend itself (as shown) or put itself anywhere, fixing up binary so it is exec
25、uted at some point,November 1, 2004,Introduction to Computer Security 2004 Matt Bishop,Slide #19-22,Executable Infectors (cont),Jerusalem (Israeli) virus Checks if system infected If not, set up to respond to requests to execute files Checks date If not 1987 or Friday 13th, set up to respond to cloc
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CHAPTER19MALICIOUSLOGICPPT
