-
Notifications
You must be signed in to change notification settings - Fork 18
/
2021index.html
executable file
·285 lines (229 loc) · 20 KB
/
2021index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<html>
<head>
<meta http-equiv="content-type" content="text/html">
<title>CS7NS5/CSU44032 Security and Privacy</title>
</head>
<body bgcolor="#fffedc">
<h1>CS7NS5/CSU44032 Security and Privacy</h1>
<p>This is the 2021 version. Last updated 20210419 by stephen.farrell@cs.tcd.ie</p>
<h2>Lecture slots</h2>
<p>Our online lecture slots this year will all use "blackboard collaborate ultra" and are:
<ul>
<li>Monday 1600-1750</li>
<li>Wednesday 1700-1750</li>
</ul>
</p>
<p>I'll also hang out in the "office hours" blackboard collab room on Tuesday's at 1400 - feel free to
pop in there and ask whatever.</p>
<p>If you're not registered for the module on blackboard, just email me and I can send a guest link
to give you access.<p>
<h2>More detail...</h2>
<ul>
<li>The canonical URL for this stuff is:
<a href="https://down.dsg.cs.tcd.ie/cs7053/">https://down.dsg.cs.tcd.ie/cs7053/</a>
and the latest source is in a github repo at
<a href="https://github.com/sftcd/cs7053">https://github.com/sftcd/cs7053</a></li>
<li>Over the years, this course has had lots of course codes, it was also
previously CS4407, CS7453 and CS7074, and before that
<a href="https://down.dsg.cs.tcd.ie/cs7012/">CS7012</a> and before that
<a href="https://down.dsg.cs.tcd.ie/nds106u1/">NDS106</a> (the last two
links are to the old lectures etc.) But when I created the github repo it
was CS7053, so I stick with that for the URLs:-) The content overlaps a
good bit but always evolves.</li>
<li>The <a href="#Lecture">Lecture slides</a> section below has links to
open-office/ppt/pdf versions of all the lectures for the course. The PDFs
should be fine as there're no fancy PPT features used.</li>
<li>The <a href="#stories">News</a> section below has links to relevant
articles usually from the technical media.</a>
<li>The <a href="#materials">Materials</a> section below has links to, and/or
local copies of, some background information/papers etc. For assessment
purposes, you won't need anything else other than easily available things
like RFCs and the materials below that are mentioned in class (You are of
course encouraged to read more widely).</li>
<li>You can look at loads of
<a href="https://down.dsg.cs.tcd.ie/old-exams/index.html">old exams</a>
with both questions and answers/marking schemes.</li>
<li>There will be two mid-term assignments, totalling 20% of the marks for
the module (so the exam replacement is worth 80%). </li>
<li>Note that I <strong>will</strong> be changing the slides as I go.
Depending on stuff ahead of time may be wasted effort:-)</li>
</ul>
<h2>Lecture Slides</h2>
<ol>
<li>Quick intro/logistics (<a href="lectures/00-quick-intro.odp">O-O</a>,<a href="lectures/00-quick-intro.pdf">pdf</a>)</li>
<li>Some history and issues (from heanet talk) (<a href="lectures/heanet-farrell.odp">O-O</a>, <a href="lectures/heanet-farrell.pdf">PDF</a>)</li>
<li>General intro (<a href="lectures/01-intro.ppt">ppt</a>,<a href="lectures/01-intro.pdf">pdf</a>)</li>
<li>Concepts (<a href="lectures/02-concepts.ppt">ppt</a>,<a href="lectures/02-concepts.pdf">pdf</a>)</li>
<li>Passwords (<a href="lectures/03-passwords.odp">O-O</a>,<a href="lectures/03-passwords.pdf">pdf</a>)</li>
<li>Crypto stuff (<a href="lectures/04-crypto.odp">O-O</a>,<a href="lectures/04-crypto.pdf">pdf</a>)
<ul>
<li>Post-quantum stuff: <a href="https://csrc.nist.gov/CSRC/media/Presentations/the-2nd-round-of-the-nist-pqc-standardization-proc/images-media/moody-opening-remarks.pdf">NIST slides</a> (<a href="lectures/moody-opening-remarks.pdf">local copy</a>)</li>
</ul>
<li>Standard security protocols (<a href="lectures/05-protocols.odp">odp</a>,<a href="lectures/05-protocols.pdf">pdf</a>)</li>
<li>Problems with real-world TLS (<a href="lectures/06-tls-problems.odp">odp</a>,<a href="lectures/06-tls-problems.pdf">pdf</a>)
<ul>
<li>SAAG presentation on BEAST and CRIME (<a href="https://www.ietf.org/proceedings/85/slides/slides-85-saag-1.pdf">ietf site</a>,<a href="materials/slides-85-saag-1.pdf">local</a>)</li>
</ul>
</li>
<li>TLSv1.3 (<a href="lectures/07-tls13.odp">odp</a>,<a href="lectures/07-tls13.pdf">pdf</a>)</li>
<li>DNS (<a href="lectures/08-dns.pdf">PDF</a>,<a href="lectures/08-dns.ppt">PPT</a>)
<ul>Materials used from <a href="http://www.dns-school.org/Slides/index.html">Olaf Kolkman's DNS school</a>
<li>DNS (<a href="2016lectures/Block_01_introduction_alternative.pdf">pdf</a>)</li>
<li>DNSSEC (<a href="2016lectures/Block_03_DNSSEC_Theory.pdf">pdf</a>)</li>
</ul>
</li>
<br/><em>Stuff above modified for 2021, stuff below still TBD</em><br/><br/>
<li>Mail and Spam (<a href="2016lectures/04-spam.ppt">ppt</a>,<a href="2016lectures/04-spam.pdf">pdf</a>)
<ul>
<li>Jim Fenton's spam slides (<a href="2016lectures/fenton.pdf">pdf</a>)</li>
<li>Murray Kucheraway's DMARC slides (<a href="2016lectures/slides-87-dmarc-3.pdf">pdf</a>)</li>
</ul>
</li>
<br/>
<li>Loads more on TLS:
<ul>
<li>Problems with real-world TLS (<a href="2016lectures/07-tls-problems.ppt">ppt</a>,<a href="2016lectures/07-tls-problems.pdf">pdf</a>)</li>
<li>SAAG presentation on BEAST and CRIME (<a href="https://www.ietf.org/proceedings/85/slides/slides-85-saag-1.pdf">ietf site</a>,<a href="materials/slides-85-saag-1.pdf">local</a>)</li>
<li>TLSv1.2 details (<a href="2016lectures/07-tls-details.ppt">ppt</a>,<a href="2016lectures/07-tls-details.pdf">pdf</a>)
<li>TLSv1.3 (<a href="2016lectures/07-tls13.ppt">ppt</a>,<a href="2016lectures/07-tls13.pdf">pdf</a>)
<li>As background: a 2017 look at TLS1.3, from 33C3 <a href="2016lectures/CCC_TLS_1.3_copy.pdf">slides</a> (<a href="https://speakerd.s3.amazonaws.com/presentations/53e226b000e24ffb90c1de816aecd4ca/CCC_TLS_1.3_copy.pdf">original</a>, <a href="https://media.ccc.de/v/33c3-8348-deploying_tls_1_3_the_great_the_good_and_the_bad">video</a>) from Nick Sullivan and Filippo Valsorda</li>
</ul>
</li>
<li>Encrypted SNI/ECHO (<a href="2016lectures/13-echo.odp">O-O</a>,<a href="2016lectures/13-echo.pdf">PDF</a>)</li>
<li>WebRTC (<a href="2016lectures/12-webrtc.odp">O-O</a>,<a href="2016lectures/12-webrtc.pdf">PDF</a>)</li>
<br/>
</ol>
<p>Probably won't cover these this year:</p>
<ul>
<li>Snowdonia (<a href="2016lectures/08-snowdonia.ppt">ppt</a>, <a href="2016lectures/08-snowdonia.pdf">pdf</a>)</li>
<li>Developing stuff with security in mind (<a href="2016lectures/07.5-developing.ppt">ppt</a>,
<a href="2016lectures/07.5-developing.pdf">pdf</a>)</li>
<li>Phil Hunt (Oracle) OAuth intro (<a href="2016lectures/09-oauth.ppt">ppt</a>)</li>
</ul>
<h2><a name="stories">News Stories</a></h2>
<p>I usually update this sporadically during the run-time of the module with
links to stories that I might want to reference in class.</p>
<h3>2021</h3>
<ul>
<li>It's quite old, but I've only read it now, so worth nothing that this
<a href="https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/">explanation of Meltown</a> is the best I've seen, so worth a read. (It's from the founder of
the rPi foundation, and is really well written.)</li>
<li>We often forget how we depend on the kindness of strangers: a
<a href="https://www.zdnet.com/article/yandex-said-it-caught-an-employee-selling-access-to-users-inboxes/">reminder</a>
of that when a sysadmin sells access to customers email accounts.</li>
<li>Another WebPKI CA in trouble:
the <a href="https://www.theregister.com/2021/02/02/chrome_camerfirma_certificates/">El reg article</a> is ok,
but the real meat is in the <a href="https://wiki.mozilla.org/CA:Camerfirma_Issues">Mozilla wiki</a> and the links from
there. </li>
<li>Two recent interesting "tracking" stories - one from the <a href="https://www.nytimes.com/2021/02/05/opinion/capitol-attack-cellphone-data.html">NY Times</a>
on how AD IDs allow tracking of people who were around the US Capitol building on Jan 6th, and another from
<a href="https://www.bellingcat.com/resources/2020/12/14/navalny-fsb-methodology/">Bellingcat</a> describing how
they claim to have determined who likely carried out a recent poisoning. When reading these, try consider
how your opinion may change if you were sympathetic to those being tracked.</li>
</ul>
<h3>2020 and before</h3>
<ul>
<li>Fine Apple WiFi <a href="https://googleprojectzero.blogspot.com/2020/12/an-ios-zero-click-radio-proximity.html">hack description</a> incl. lots of tooling.</li>
<li>Nice DNSSEC Root re-signing ceremony and covid-19 <a href="https://www.theregister.co.uk/2020/04/22/iana_delay_coronavirus/">story</a>.
You really can't plan for every eventuality!</li>
<li>Fingerprints are still crap in 2020: <a href="https://blog.talosintelligence.com/2020/04/fingerprint-research.html">talos blog</a></li>
<li>Snafu in <a href="https://www.theregister.co.uk/2020/02/13/iana_dnssec_ksk_delay/">root key signing</a> that has useful links to process things</li>
<li>Jan 2020 Msft x.509 vuln (CVE-2020-0601) - dodgy x.509 handling of custom ECC params:
<ul>
<li><a href="https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF">NSA advisory</a></li>
<li><a href="https://blog.trailofbits.com/2020/01/16/exploiting-the-windows-cryptoapi-vulnerability/">trailofbits explainer</a></li>
<li><a href="https://research.kudelskisecurity.com/2020/01/15/cve-2020-0601-the-chainoffools-attack-explained-with-poc/">proof of concept exploit</a></li>
</ul>
</li>
<li>Yet another <a href="https://fil.forbrukerradet.no/wp-content/uploads/2020/01/2020-01-14-out-of-control-final-version.pdf">report</a>
(<a href="materials/2020-01-14-out-of-control-final-version.pdf">local copy</a>), Norwegian this time,
about advertising-driven surveillance.</li>
<li>MITRE common weakness enumeration
<a href="https://cwe.mitre.org/top25/archive/2019/2019_cwe_top25.html">list</a> of bug precursors.</li>
<li>A lovely <a
href="https://docs.fcc.gov/public/attachments/DOC-359134A1.pdf">FCC
report</a> on a 37-hour CenturyLink (aka level3) US nationwide outage caused by 4
weirdo packets!</li>
<li><a href="https://www.vpnmentor.com/blog/report-biostar2-leak/">Biometric DB leak,</a></li>
<li><a href="https://krebsonsecurity.com/2019/02/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks/">Krebs</a>
article on DNS infrastructure attack that's close to home actually!</li>
<li><a
href="https://www.zdnet.com/article/unsecured-mongodb-databases-expose-kremlins-backdoor-into-russian-businesses/">ZDnet
story</a> on Russian govt special access via same username/pwd on
many systems</li>
<li>Merging images of people in <a href="https://motherboard.vice.com/en_us/article/pa9vyb/peng-collective-artists-hack-german-passport">passports</a></li>
<li>Who's a good IdP? We thought the megascalers might be but... <a href="https://arstechnica.com/tech-policy/2018/10/google-exposed-non-public-data-for-500k-users-then-kept-it-quiet/">google</a> and <a href="https://www.thesslstore.com/blog/facebook-data-leak-cambridge-analytica/">facebook</a> both recently mucked up somewhat, at mega-scale of course;-(
</li>
<li><a href="https://www.zdnet.com/article/french-police-officer-caught-selling-confidential-police-data-on-the-dark-web/">ZDnet</a>
story about French police officer selling access to police/national security data on the dark web.</li>
<li>A <a href="https://www.theregister.co.uk/2018/10/08/super_micro_us_uk_intelligence/">disputed</a> Bloomberg story claiming the Chinese gov. were <a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies">board stuffing</a> in an interesting manner. Regardless of the veracity or otherwise of this report the security of the supply chain issue
highlights the need for much more/better open-source hardware. (I'm involved a bit with one such <a href="https://cryptech.is">effort</a>.</li>
<li><a href="https://www.theregister.co.uk/2018/09/25/cisco_hardcoded_credentials/">Cisco</a> hardcoded root a/c in video kit.</li>
<li>Nice <a href="https://www.theregister.co.uk/2018/09/12/feedify_magecart_javascript_library_hacked/">el reg</a>
story (if true!) about borked JS code being loaded from a 3rd (or 4th, if true) party.</li>
<li> An <a href="https://www.theregister.co.uk/2018/08/09/neural_network_malware/">El-reg article</a> with a cute idea
for how to construct malware (add DeepLocker reference when available) </li>
</ul>
<h2><a name="materials">Materials</a></h2>
<p>This is a list of good things to read. What you need for
assessment purposes is all mentioned in the lecture slides.
The full directory is <a href="materials/">here</a> if you
just want to browse it.</p>
<ol>
<li>A study of web censorship in India (<a href="https://arxiv.org/abs/1912.08590">Arxiv</a>,
<a href="materials/india-censorship-1912.08590.pdf">local copy</a>).</li>
<li>A <a href="materials/lightweight-crypto-survey.pdf">survey</a> of
"lightweight" cryptography. (<a href="https://eprint.iacr.org/2017/511.pdf">iacr version</a>)</li>
<li><a href="materials/simplified-DES.pdf">A simplified version of DES</a> contributed by a student, originally developed by <a href="http://math.scu.edu/~eschaefe/">Ed Schaefer</a></li>
<li><a href="https://obj.umiacs.umd.edu/papers_for_stories/crlite_oakland17.pdf">CRLite</a> (<a href="materials/crlite_oakland17.pdf">local copy</a>), a mozilla experiment to do better than CRLs or OCSP</li>
<li><a href="https://arxiv.org/pdf/2001.07421.pdf">Google paper</a> (<a href="materials/2001.07421.pdf">local copy</a>) on issues with
Apple's intelligent tracking protection and how it could be used to track someone</li>
<li><a href="https://www.greenbone.net/wp-content/uploads/Greenbone_Security_Report_Unprotected_Patient_Data_a_Review.pdf">Report on publicly accessible medical images</a>(<a href="materials/https://www.greenbone.net/wp-content/uploads/Greenbone_Security_Report_Unprotected_Patient_Data_a_Review.pdf">local copy</a>)</li>
<li><a href="https://eprint.iacr.org/2020/014">SHA-1 is a shambles</a> (<a href="materials/2020-014.pdf">local copy</a>)
describes now-practical chosen prefix attacks on sha-1.</li>
<li>Johnny is fired (<a href="https://github.com/RUB-NDS/Johnny-You-Are-Fired">github</a>,<a href="materials/johnny-fired.pdf">local pdf</a>)</li>
<li>A paper on guessed Etherium private keys (need to read) <a href=https://www.securityevaluators.com/casestudies/ethercombing/">htmll</a></li>
<li>A paper on DNS privacy related issues (<a href="https://doi.org/10.1002/poi3.195">paywall</a>,<a href="materials/dnspolicy-10.1002@poi3.195.pdf">local copy</a>)</li>
<li>A survey paper on attack surface definitions (<a href="https://doi.org/10.1016/j.infsof.2018.07.008">paywall</a>,<a href="materials/attack-surface--1-s2.0-S0950584918301514-main.pdf">local pdf</a>)</li>
<li>A post-mortem on the equifax hack (<a href="materials/Equifax-Report.pdf">local</a>,<a href="https://oversight.house.gov/wp-content/uploads/2018/12/Equifax-Report.pdf">original</a>
<li>" The Sorry State of TLS Security in Enterprise Interception Appliances" in 2018! <a href="https://arxiv.org/abs/1809.08729">arxiv.org</a>,<a href="materials/tls-mitm-boxed.pdf">local</a>).</li>
<li> The 2003 paper on rainbow tables (<a href="https://lasec.epfl.ch/pub/lasec/doc/Oech03.pdf">epfl.ch</a>,
<a href="materials/Oech03.pdf">local pdf</a>)</li>
<li>"Screaming Channels:" another side-channel - mixed digital/analogue chips exposing keys (<a href="http://s3.eurecom.fr/docs/ccs18_camurati_preprint.pdf">(no HTTPs!) pdf</a>,
<a href="materials/https://s3.eurecom.fr/docs/ccs18_camurati_preprint.pdf">local pdf</a>)</li>
<li>Nethammer: <a href="materials/nethammer-1805.04956.pdf">local pdf</a>(add link to original)</li>
<li>The "Efail" PGP and S/MIME attack (<a href="https://efail.de/efail-attack-paper.pdf">efail.de</a>,<a href="materials/efail-attack-paper.pdf">local pdf</a>)</li>
<li>The 1988 Internet worm (<a href="http://spaf.cerias.purdue.edu/tech-reps/823.pdf">purdue</a>,<a href="materials/spafford88internet.pdf">local</a>)</li>
<li>The end-to-end argument in system design (<a href="http://web.mit.edu/Saltzer/www/publications/endtoend/endtoend.pdf">MIT</a>,<a href="materials/endtoend.pdf">local</a>)</li>
<li>NDSS 2017 paper on TLS MitM box insecurity (<a href="https://jhalderm.com/pub/papers/interception-ndss17.pdf">remote</a>, <a href="materials/interception-ndss17.pdf">local</a>)</li>
<li>Bleichenbacher's attack (<a href="http://link.springer.com/chapter/10.1007/BFb0055716">springer</a>,<a href="materials/bleichenbacher-pkcs.pdf">local</a>)</li>
<li>DROWN attack (<a href="https://drownattack.com/drown-attack-paper.pdf">drownattack.com</a>,<a href="materials/drown-attack-paper.pdf">local</a>)</li>
<li>Stagefright (<a href="https://www.exploit-db.com/docs/39527.pdf">exploit-db.com</a>,<a href="materials/stagefright.pdf">local<a>)</li>
<li>Some DES history (<a href="https://www.princeton.edu/~ota/disk2/1987/8706/870612.PDF">remote</a>,<a href="materials/des-870612.pdf">local</a>) which is
part of a <a href="https://www.princeton.edu/~ota/disk2/1987/8706.html">a book</a></li>
<li>Attacking ASLR via javascript and an MMU - nice! (<a href="http://www.cs.vu.nl//~herbertb/download/papers/anc_ndss17.pdf">Author's site</a>,<a href="materials/anc_ndss17.pdf">local</a>)</li>
<li>Not a paper, but an Intercept <a href="https://theintercept.com/2017/02/20/how-to-run-a-rogue-government-twitter-account-with-an-anonymous-email-address-and-a-burner-phone/">article</a> with a step-by-step on the "fun"
required to create and operate a sorta-anonymous twitter a/c. </li>
<li>A (long, 38pp;-) paper by a lawyer about how Internet technical standards
might be quite telling - good if you're interested in this corner of nerdville;-) (<a href="https://poseidon01.ssrn.com/delivery.php?ID=582114003071118109104006093031125081029032054004040066067028092028071100106089012096122097062099041113051096017083114065113111126050004093022006016108092064092011019002077080118070103066027000022097106081109119109121119012022026002108092100071083124111&EXT=pdf">Original</a>,<a href="materials/SSRN-id2911978.pdf">local copy</a>)</li>
<li>A real sha-1 collision! (<a href="https://shattered.io/">website</a>,
<a href="materials/shattered.pdf">local copy of paper</a>) and the two
colliding files: <a href="https://shattered.io/static/shattered-1.pdf">1</a>
<a href="https://shattered.io/static/shattered-2.pdf">2</a>. (Note
that those two aren't in my git repo - I didn't wanna play with git's
dependency on sha-1;-)</li>
<li>RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis (<a href="https://eprint.iacr.org/2013/857.pdf">eprint</a>,<a href="materials/rsa-acoustic-857.pdf">local</a>)</li>
<li>Local copies of the papers for some recent notable attacks on CPUs:
<a href="materials/meltdown.pdf">meltdown</a>,
<a href="materials/spectre.pdf">spectre</a>
</li>
<li>The <a href="materials/robot-1189.pdf">ROBOT</a> attack paper.</li>
<li>An attack on machne learning for image processing: <a href="materials/patch-1712.09665.pdf">adversarial patches</a>, and
another one against machine learning called <a href="materials/foolbox-1712.04248.pdf">foolbox</a></li>
<li>A CCC presentation on the 2010 Sony hack (<a href="https://events.ccc.de/congress/2010/Fahrplan/attachments/1780_27c3_console_hacking_2010.pdf">original</a>,<a href="materials/1780_27c3_console_hacking_2010.pdf">local</a>)</li>
<li>The details of Galois-Counter Mode (<a href="https://eprint.iacr.org/2004/193.pdf">iacr version</a>,<a href="materials/gcm.pdf">local</a>) </li>
<li>A comparison of some AEAD modes (<a href="https://www.fi.muni.cz/~xsvenda/docs/AE_comparison_ipics04.pdf">original</a>,<a href="materials/AE_comparison_ipics04.pdf">local</a>)</li>
</ol>
</body>
</html>