You are currently in the first lecture of the Secure Programming module!
What will we do?
Introduce the principles, risks and mechanisms that impact software security, with emphasis on programming and related technologies
What should you be able to do at the end of the module?
CS education typically gives you solid design and programming skills...
But security is a key concern today:
Emphasis on practical aspects of security
Exposure to recent or seminal research work
Course design:
Slides and news (check regularly!):
Security principles
Analysis: techniques for finding vulnerabilities
Vulnerabilities, exploits, and remediations
“Hacking” challenges:
Environment:
Submission:
80% examination
closed book, pen and pencil
I will provide sample test in advance
20% continuous assessment
get points solving each challenge
hands-on, practical exercise
great preparation for final + real-world skills
fun!
Background
Participate in lectures
Absolutely no plagiarism!
I started at Bham in 2010
I am currently in secondment at Lastline, Inc.
I am active in the following main areas:
I am interested in most areas of system security
Drop me an email
m.cova@cs.bham.ac.uk
Office hours
Tuesdays, 3pm-5pm
Room 207
Any problem, doubt, special need: come talk to me
The term hacker was introduced at MIT in the '60s to describe computer wizards:
someone who lives and breathes computers
It has been eventually used to denote malicious hackers or crackers, that is, people that perform intrusions and misuse computer systems
Black-hats, white-hats, gray-hats
Source: http://web.nvd.nist.gov/view/vuln/statistics
Why does it stop at 2003?
Source: http://www.cert.org/stats/Given the widespread use of automated attack tools, attacks […] have become so commonplace that [their counts] provide little information with regard to assessing the scope and impact of attacks. Therefore, we stopped providing this statistic at the end of 2003.
Microsoft's Trustworthy Computing (2002)
Flaws […] affect […] our customers’ view of us as a company
R. Telang and S. Wattal, An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price IEEE TSE, vol. 33, issue 8, 2007
On average, a vendor loses around 0.6 percent value in stock price when a vulnerability is reported
DigiNotar compromise (2011)
We will look at how to break software and discuss attacks (“attacker mindset”)
None of this is in any way an invitation to undertake these attacks in any fashion other than with the informed consent of all involved parties
Ethics is knowing the difference between what you have a right to do and what is right to do.
If unsure, come talk with me first!
http://www.it.bham.ac.uk/policy
Any person who wilfully and knowingly gains unauthorised access to a computer system or attempts to disable a computer system commits a disciplinary offence.
http://www.it.bham.ac.uk/policy
Any person who wilfully, knowingly and without authorisation introduces or attempts to introduce a virus or other harmful or nuisance program or file, or to modify or destroy data […] commits a disciplinary offence.
http://www.it.bham.ac.uk/policy
Any person who wilfully, knowingly and without authorisation denies access or attempts to deny access […] commits a disciplinary offence
http://www.it.bham.ac.uk/policy
Any unauthorised person who attempts to monitor traffic on the University Network or any person who attempts to connect an unauthorised device with the intention of monitoring traffic (ie eavesdropping) commits a disciplinary offence
Yes!
No!
So you may be wondering, will Sophos hire virus writers?
Not on your nelly mate.
If your idea of fun includes finding and exploiting vulnerabilities, consider participating at the
hacking club [*]
Fridays, 3:30pm–5:30pm, Room 217
This class will be quite a bit of work
What you get out it depends on how much you put in
Have fun
Play nice (regulations and ethics)
We discuss security principles
Read A. Barth, C. Jackson, C. Reis, and the Google Chrome Team, The Security Architecture of the Chromium Browser