Speculating about Tomorrow’s Threats Simson L. Garfinkel MIT CSAIL 1 ? What’s the worst case scenario? 2 Worst Case Scenarios… • Turn off the electricity – Kills the computers • Turn off the water – Kills the people • Shut down websites/routers/countries/Internet • Make the democrats win an election – (to effect US foreign policy…) • Surely we can do better… 3 Computer Virus Jumps to Humans! • “A quickly spreading computer virus is somehow jumping from PCs to their human computer users --- and killing them!” 4 How would a computer make a human virus? • Nanometer-scale assemblers… ? Source: NASA Source: John Milanski 5 Mail Order Polio First Synthetic Virus Created: July 11, 2002 • Researchers @ Stony Brook • Polio Virus sequence downloaded from Internet • DNA sequence sent to a “mail-order supplier” • Transcribed to RNA in lab • Injected into mice. • “The animals were paralyzed and died.” 6 http://www.sciencenews.org/20020713/fob8.asp MWG RNA & siRNA synthesis How to order • Log in • Enter Ship to, Bill to, and PO • Enter oligos in large quantities by pasting in columns of name and sequence pairs from Excel” • Display sequence • Enter comments • Check out (877) MWG-BTEC 7 8 Making this threat credible… • Distribution of “dangerous” information that could be easily misused. • Computer viruses that become human viruses… • Hacking biological systems that makes products more dangerous than people suspect… 9 Take Home Point #1 Biology and IT are becoming the same thing. Viruses are information. … gives a whole new meaning to “blended threats…” 10 ? Can what’s on this disk kill you? 11 PGP was on that disk… • Back in the 1990s, the FBI said that encryption could kill us! • Encryption in the hands of: – – – – Drug dealers Terrorists Pedophiles Organized crime (The real threat was encryption in the hands of spammers…) 12 What if the disk just has an essay … or an article? 13 “The Riddle of the Universe and Its Solution” Professor Dizzard works on artificial intelligence software. Dizzard is found staring deep into his screen at the end of an Easter vacation.. Some of Dizzard’s students follow his unfinished work…. The students pass into the coma. An epidemic begins to spread…. At a university, a whole class goes off into the “Riddle Coma.” The coma is caused by: “The Gödel-sentence for the human Turing-machine – it causes the mind to jam." “There is no way to solve the Riddle coma… but we can decrease further coma outbreaks.” 14 Today’s Dangerous Ideas Distributed by networks; motivating people to violence “Leaderless Resistance” – Political violence without organization – Originated in America by Louis Beam for fight against US Government – Adopted by radical left. Abortion Doctor Killers – Nuremberg Files Website. SHAC (Stop Huntingdon Animal Cruelty) – Practically bankrupt Huntingdon Life Sciences. ELF (Earth Liberation Front) – arson training manual ELF Attacks: – August 1st - $20M fire in San Diego – August 22nd – Attacks against SUVs – July 2nd - $700,000 against two new homes. 15 “If you build it --- we will burn it” 16 … we don’t believe in censorship … • Unless it is “hate speech” and you are on a college campus • Unless it is “copyrighted music” (or samples of copyrighted music) and you are the RIAA • Unless it is “source code” and you are Diebold Election Systems Increasingly, the United States does believe in Censorship, and the Internet is making censorship harder… for many Americans, this is a worst case scenario! 17 DMCA & Friends Making Computers Less Secure • Outlawing computer security research? • Criminalizing disclosure of vulnerabilities? • The Future: Mandating Computer Systems With Back Doors for the RIAA! 18 Back to Computers… 19 Computer Worms and Viruses • Strengths of Today’s Worms and Viruses: – Clog email systems – Send spam – Plant backdoors – Fast spreading • Weaknesses: – Buggy – Poorly Designed Bellovin: No Network is safe! 20 PC Viruses for Spamming • Wake up at 2am • Get a HotMail account • Send 10,000 messages to Yahoo / AOL • Go back to sleep OLD SLIDE! • Yahoo and HotMail now using Reverse Turing Tests to prevent automated sign-up • Spammers now manipulating BGP announcements… Manual today… Could be automated tomorrow 21 Viruses that Destroy Hardware CHI/Chernobyl Virus – “Erase entire hard drive and overwrite the system BIOS.” – BIOS chip or motherboard must be replaced April 26, 1999 – One million computers destroyed. – Korea: $300M – China: $291M May be an easy attack today with web-based BIOS upgrades. 22 Computers can start fires! • HCF instruction joke • HP OfficeJet Printer fax copiers – March 1995 – 10,000 machines recalled – “generate internal temperatures high enough to burn a wayward human hand and … even start a fire” • Video Monitors? • SCADA systems have failsafes, but consumer equipment may not. 23 Shut down the 911 System! 911 ICMP Echo Request: +++ +++ATH0;M0:DT911 “+++ATH0;M0;DT911” attacker … ping 100,000 AOL or EarthLink subscribers Clueless Users 24 Shut down the Internet • Most of the Internet is run by Cisco Routers • Lots of equipment is in inaccessible locations – Equipment closets in unattended locations – Co-location facilities that are effectively unattended (“warm hands” are over-rated). 25 Cisco: Realistic Risk? Vulnerabilities and remote exploits have been found in Cisco’s operating system. Bellovin said that the source code is available — but does it matter? 26 Cisco Router Virus: Design • Phase 1: Penetrate • Phase 2: – Set up a large-scale distributed hash table using Chord or similar technology. – Distributed scanning for vulnerable machines. – Coordinate penetration and propagation of new machines. • Phase 3: – Simultaneously all infected routers stop routing packets. – Erase router configuration. – Flood all network interfaces with broadcast requests. 27 VoIP makes Router Attacks Better! When the Internet breaks, we call other people using the phone system. When the phone system breaks, we send email! With VoIP, the Internet is the phone system!!! … bad idea. 28 VoIP • Advantages: – A single wire for data & voice – Cuts cost of telecom • Disadvantages: – A single wire for data & voice (no redundancy) – Cuts cost of telecom (so security stands out more) • VoIP is growing fast: – Many home users are giving up on POTS – Increasingly, you may be using VoIP without knowing it! • The “Phone System” is not a higher-priced alternative internet. It increasingly the same Internet, just at a higher price 29 How fast can a virus propagate? • Code Red propagation statistics – Most hosts infected within 12 hours – Source: CAIDA (Cooperative Association for Internet Data Analysis) 30 Sapphire / Slammer • Doubled every 8.5 seconds • Infected 90% of vulnerable hosts in 30 minutes. – 74,855 hosts – Reasons: • 1 packet infection • UDP, not TCP 31 Theoretical Minimum: 30 seconds? • Flash Worm Paper – – – – “Flash Worms: Thirty Seconds to Infect the Internet” Stuart Staniford, Gary Grim, Roelof Jonkman http://www.silicondefense.com/flash/ August 16, 2001 • Warhol Worms – – – – “How to 0wn the Internet in your Spare Time” Stuart Staniford, Vern Paxson, Nicholas Weaver http://www.cs.berkeley.edu/~nweaver/cdc.web/ August 2002 32 Need for virus education! • Virus-writers are not reading the academic literature. • Perhaps that new “how to write a computer virus” course will help. 33 Perhaps “low and slow” is better • Much less likely to be detected • Less likely to attract media attention • The real reason that most worms have been caught is that their scanning and propagation functions overwhelm our networks. 34 “Netgear Attack” • Netgear hard-coded the address of WISC’s NTP server into its home router. • NTP implementation flawed: – instead of backing off on no answer, it pinged harder! • WISC’s initial contacts to Netgear ignored. • http://www.cs.wisc.edu/~plonka/netgear-sntp/ 35 Take Home Point #2 Computer/Network viruses can be far faster and more destructive than they are today Attacks might not even be intentional! 36 New Virus Platform #1: Cell phones? • Previous SMS viruses were pathetic – Fake ring tone? – Fake Java game? • Nokia has recalled vulnerable handsets 37 SMS Virus • A “really good” SMS Virus would: – Receive as an SMS message. – Sends self to • last 20 people who called phone • everybody in phone address book – Lock phone with new PIN. – After 4 hours, floods cell phone network with repeated phone calls and SMS message (DDOS) • Results: – Everybody needs a new cell phone – Cell phone network rendered inoperable. 38 What’s Needed for that SMS Virus? • Way to execute code on cell phone: – Open programming environment, or someone with inside knowledge. – Bug in incoming SMS message handler – Longer SMS messages, or way to string SMS messages together, or way to download code from a website – Perhaps you could do it today with a Palm or Windows “smart phone” … but not enough market penetration. – Java phones!!! • Serious network vulnerability … when? 2004? 2007? 39 Cell Phone Virus Alternative Instead of distributing from cell phones, distributed using a PCbased virus. Serious network vulnerability: today. 40 New Virus Platform #2: Car Computers (telematics) Radio-based: – Location monitoring – Position reporting Remote control: – Door lock/unlock – Ignition Kill Next-generation system: – Two-way communication – Integration with entertainment system Questions: – Security? – Authentication? – Encryption? #1 Danger: companies deploying these systems have little experience with network security. 41 OnStar: Security? “All communications between the vehicle and OnStar call center are through the analog wireless network at this time.” “OnStar uses a proprietary and confidential communication protocol (Air Interface) for transmitting and receiving data between the call center and the vehicle.” “OnStar uses an authentication process similar to those used by the cellular industry to prevent unauthorized access to the OnStar system in the vehicle.” 42 OnStar: Security? • 300-baud analog modem with analog cell phone • PPP with CHAP authentication • No encryption • Real question: authenticating the caller! – (but that probably isn’t an automated attack.) 43 Take Home Point #3 • New Platforms are opening up for attackers • Many opportunities for cross-platform attacks • Companies deploying new platforms have little experience with security issues. 44 Defending Against Tomorrow’s Threats… • Spyware… 45 Solution: Automatic Update… 1. 2. 3. Go to the Internet Download code Run it Keeps everybody’s operating system patched and up-to-date! Great for: 1. Updating buggy software 2. Adding bugs to reliable software 3. Taking over millions of machines simultaneously 46 But what’s the problem? • People don’t install patches? • Operating systems are buggy and overly complex? • Need for a continued revenue stream? • Need to find and destroy pirate copies? 47 Subvert Automatic Update! • Update from DNS name… – He who controls the DNS, controls the Internet! • Fortunately, most systems protected with digitally signed updates • Unfortunately, certificate authorities can be hacked… 48 Certificates that come with IE6 49 Solution: Notify People of Security Problems! From MAILER-DAEMON Wed Sep 10 16:37:13 2003 Date: Wed, 10 Sep 2003 16:36:50 -0400 From: "MailScanner" <postmaster@solucorp.qc.ca> To: simsong@acm.org Subject: Warning: E-mail viruses detected Seems like a good idea… …Until you get 3,000 alerts in one day! Our virus detector has just been triggered by a message you sent:To: jack@localhost Subject: Re: Thank you! Date: Wed Sep 10 16:36:49 2003 One or more of the attachments (your_document.pif) are on the list of unacceptable attachments for this site and will not have been delivered. Consider renaming the files or putting them into a "zip" file to avoid this constraint. The virus detector said this about the message: Report: Shortcuts to MS-Dos programs are very dangerous in email (your_document.pif) -MailScanner Email Virus Scanner www.mailscanner.info Mailscanner thanks transtec Computers for their support 50 Solution: Just Secure the Stuff That Matters… • Do you secure: – HTML rendering code? – JPEG display routines? – Keyboard drivers? – Macro engine? – File Load & Save routines? – XML parser? • What software does not need to be secured? 51 Solution: Diversity and Redundancy 52 Diversity is hard! (and expensive) • SNMP Vulnerability • OpenSSL Vulnerability • Sendmail vulnerabilities • In all of these cases: – Common implementation affected many platforms 53 Redundancy is hard! (and expensive) We expect reliability, but we don’t want to pay for it…. Do you have a backup: laptop? car? spouse? California Power Grid? QuickTi me™ and a TIFF (U ncompressed) decompressor are needed to see this picture. Should you build 1 data center or 2? (Even if the big companies learned from 9/11, many others didn’t.) Alternative: have just one, but take care of it. Does the future hold more redundancy, or less? 54 “Genetic Diversity” • The big take-home from yesterday was that Genetic Diversity is good! • But that’s just because we don’t have it today! – “The grass is always greener…” • Back in the 1980s, we had genetic diversity! – The reason that we standardized is that people couldn’t properly administer a diverse system! 55 Take Home Point #4: 4. 1 We don’t know if diversity or uniformity promotes a more secure computing environment 4.2 We don’t know how to build true diversity. (5 operating systems is not genetic diversity.) 56 Four “Next Generation” attacks: • Spam • Wi-Fi • RFID • MTM 57 Spam • The big problem. • How do we limit the use of a free resource? – Willingness to receive email? – Network bandwidth? – People’s attention? • Spammers are becoming exquisite attackers • Two kinds of solution: – Payment-based – Content analysis 58 Is this spam? To: simsong@mit.edu From: XXXXXX <XXXXXXXX@aol.com> Subject: Hi old friend! Dear Simson, We were best-friends back in forth grade. I saw your name the other day and remembered how we used to hang out together. Anyway, I hope that it’s okay for me to send you this email. I found some photos of you and uploaded to my web site at http://www.iphoto.com/XXXXXXX/for_simson.html. Take a look! 59 Is this spam? To: simsong@mit.edu From: CCCCCCCC <XXXXXXXX@yyyyyyyyyyyyy.com> Subject: Windowless Room In your O'Reilly "history article, you wrote: > Many schools found that buying a few Apples and putting them > on a table in a windowless storage room was a cheap way to > add "computing" to their curriculum I remember that room! :) XXXXXXXXXXXXXXXXXX XXXXXXXX@yyyyyyyyyy.com http://www.yyyyyyyy.com/~XXXXXXXXXXw 60 61 To: simsong@mit.edu From: XXXXXX <XXXXXXXX@aol.com> Subject: Hi old friend! Dear Simson, We were best-friends back in forth grade at Haverford Friends. I saw your name the other day and remembered how we used to hang out together. Anyway, I hope that it’s okay for me to send you this email. I found some photos of you and uploaded to my web site at http://www.iphoto.com/XXXXXXX/for_sim son.html. Take a look! “Windowless Room” 62 Wi-Fi (802.11) • Key issues to date have been: – Eavesdropping – User authentication • New issue: – Access Point authentication 63 ? 64 This attack is - Hard (impossible) to detect - Easy to implement - Portable 65 Monday Night, 8:34pm 66 QuickTime™ and a TIFF (LZW) decompressor are needed to see this picture. 67 Network Forensics • Does “default” at 68.86.222.205 know what I was sending across their Internet Connection? • Would it make sense for them to capture it? – 1/2 of a 60GB hard drive will hold 30 days of traffic for a typical cable modem… • Would it make sense for them to avoid capturing it? 68 RFID • Radio tags… 69 RFID Smaller than your fingernail… http://www.namazu.org/~satoru/playstand/ 70 RFID Everywhere… 71 RFID “Doomsday Scenario” • Link all objects with identity • Track everything everywhere • How do you tell legitimate readers? • How do you tell legitimate tags? • The “privacy” problem is really a security problem. 72 MTM: The “Ultimate” attack… 995719268 73 Mind-to-Machine http://bnb.spiritshigh.com/characters/traits/4831.html 74 75 Other approaches to M2M “Neural Interfaces” – Electrooculogram (EOG) (skin interface) – Electromyogram (EMG) (muscle movement) – Electroencephalogram (EEG) (brainwaves) – Electrocardiogram (EKG) (heart ) – Neural electrode (directly from brain) (source: betterhumans.com) 76 (source: DARPA) 77 M2M Applications “Reverend Ray Kurzweil” • Mind Uploading & Backup – Staggering copyright issues • Mind downloading – Keep the body; change the person – Better than the death penalty! • Mind wiretapping – Do you need a warrant under PATRIOT? • Do you need a firewall for your brain? – Merri does 78 These attacks are all “spoofing attacks” • Spam • Wi-Fi • RFID • MTM • Use computers to attack people. 79 Take Home Point #5: Spoofing attacks the human mind. We don’t know how to make humans more secure. 80 5 Ways to Build A More Secure Network. • Restrict the flow of dangerous code and information to prevent its misuse. (Polio Virus) • Stop Researching how to make “better viruses.” • Limit the extension and reach of computer technology: keep computers in their place. • Standardize on one computing platform and make sure it is secure. • Teach people how to recognize and avoid spoofing attacks. ? • Celebrate the flow of dangerous information; actively research better defenses. • Teach virus-writing and viruscracking. • Aggressively put advanced computer technology everywhere: the benefits outweigh the risks. • Deploy many different architectures and operating systems. • Automate decision making to eliminate the reliance on the human element. 81 Remember • Napoleon didn’t want good generals, he wanted lucky generals 82