Top Banner
Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare y 9:45 Daniel Jackson y 10:00 John Cameron y 10:30 Break y 11:00 Axel van Lamsweerde y 11:30 Anthony Hall y 12:00 Pamela Zave y 12:30 Lunch y 14:00 Cliff Jones y 14:30 Bashar Nuseibeh y 15:00 Daniel Jackson y 15:30 Break y 16:00 Michael Jackson responds y 17:00 Discussion y 17:30 Reception (ends 19:00)
22

Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Jul 18, 2018

Download

Documents

vuonghuong
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Tribute to Michael Jackson

9:00 Welcome (Bashar Nuseibeh)9:05 Pamela Zave – on Michael Jackson9:15 Tony Hoare9:45 Daniel Jackson10:00 John Cameron10:30Break11:00 Axel van Lamsweerde11:30 Anthony Hall12:00 Pamela Zave12:30 Lunch14:00 Cliff Jones14:30 Bashar Nuseibeh15:00 Daniel Jackson15:30 Break16:00 Michael Jackson responds17:00 Discussion17:30 Reception (ends 19:00)

Page 2: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

BASHAR NUSEIBEHT H E O P E N U N I V E R S I T Y ( O U ) , U K

Working with Michael Jackson

Page 3: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Michael Jackson @ The OU

Visiting Professor

Colleague

PhD Supervisor

Confidant

Page 4: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

If Software is the Solution, What is the Problem?

The world and the machine

Requirements and design

Problem-orientation

Specialisation

Page 5: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Problem Frames

Articulate the separation between world and machineDefining problem boundaries

Defining and scoping problem alphabet

Define and organise recurring patterns

Domain 2

Machine

P4

Domain 1P2

P1

P3

Requirements

Page 6: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

A security problem?

Page 7: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

A wicked problem

Security is a ‘wicked problem’ [Rittel], for which there is no perfect solution;

security implementations are a trade-off between costand effectiveness;

some assets are not worth protecting,

acceptable solutions vary from stakeholder to stakeholder,

the solution space is bounded by what the customer is willing to spend and what technology can provide.

Page 8: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Security goals – CIA … A

Confidentiality – ensure that an asset is visible only to actors authorized to see it.

Integrity – ensure that the asset is not corrupted.

Availability – ensure that the asset is readily accessible to agents that need it, when they need it

Authentication – ensure that the identity of the asset or actor is known.

… accountability … non-repudiation … authorisation …

Page 9: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Security is not football

Security is not a zero sum game:there is no exact equivalence between the losses incurred by the asset owner and the gains of the attacker.

So, the evaluation of possible harm to an asset can sometimes be carried out without reference to particular attackers; and

consideration of the goals of attackers cannot be used simply to arrive at the goals of a defender to prevent harm.

Page 10: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Problems of scope …

This cash machine has been designed with the most sophisticated password encryption.

Special precautions have been taken to ensure that only authorised users with valid smart cards can withdraw money.

Page 11: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Problems of scope …

Is it secure?

Page 12: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

A Problem

Not if the whole machine is stolen!

Page 13: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Not an isolated incident

This is a demo only!

In a hotel room in Shanghai(May 2006)

Page 14: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Anti-requirements

We define an anti-requirement as the requirement of a malicious user that subverts an existing requirement.

This is useful because:

If we can find circumstances in which both a requirements and an anti-requirement hold (compose), then we hypothesise that the conditions of composition identify a potential vulnerability in a system that implements both requirements.

Page 15: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Security & Safety

Security:incidents caused by intention

Safety: incidents caused by accident

Security & Safety are

very related

[From Charles Haley]

Page 16: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Problem Frames and Anti-requirements

Consider an anti-requirement (AR) as the requirement of a malicious user that subverts an existing requirement.

It defines a set of undesirable phenomenon that will ultimately cause the system to reach a vulnerable state.

Domain 2

Machine

P4

Domain 1P2

P1

P3

Requirements

Page 17: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Abuse Frames

The Base System (BS) is the system attacked.

The anti-requirement (AR) specifies the undesirable phenomena in terms of E1 in the Base System (BS).

E4 indicates that the Malicious User (MU) can interact with the BSthrough or unexpected phenomena.

The specification of the MM describes the interface over the E3 of the MUand the E2 of the BS that will existentially satisfy the AR.

ARMalicious

Machine (MM)

E3

BaseSystem (BS)E2 E1

E4MaliciousUser (MU)

Page 18: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Threat analysis Using Abuse Frames

Scope the problem and identify the subproblems

Describe the security concerns on the functionality to be achieved in each problem frame diagram.

Identify the threats and constructing abuse frames

Identify the anti-requirements.

Identify security vulnerabilities

Describe the domain properties.

Address security vulnerabilities

New security requirements?

Iterate

Page 19: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Abuse Frame Classes (Patterns)

Interception

Modification

Behavioural

Patterns of attack:

• Embody known attack possibilities

• Help to reveal composition possibilities

Page 20: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Other security patterns

Security patterns of base systemsCan embody avoidance of known failures

E.g., Single Point of Entry pattern

General patterns of base systemsHelp to focus on phenomena

Mandate explicit consideration of alphabets

Page 21: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

Thank you, Michael Jackson, from ...

Leonor BarrocaJohn BrierDavid BushJon HallCharles HaleyRobin LaneyZhi LiArmstrong NhlabatsiBashar NuseibehJonathan MoffettMarian PetreLucia RapanottiMohammed SalifuPete ThomasThein Than TunYijun Yu...

Page 22: Tribute to Michael Jackson - University of Oregon Nuseibe… · Tribute to Michael Jackson y 9:00 Welcome (Bashar Nuseibeh) y 9:05 Pamela Zave – on Michael Jackson y 9:15 Tony Hoare

OU Research in Problem Frames

Architecture Frames (AFrames)Rapanotti et al.

Composition FramesLaney et al

Change FramesBrier et al.

Coordination FramesBarroca et al

Abuse FramesLin et al.