EFTA02409737.pdf
PDF Source (No Download)
Extracted Text (OCR)
RSACONFERENCE2008
Darwin & Security:
What Evolution Tells Us About the Past and Future of Security
Paul Kocher I Cryptography Research. Inc. 04K19/08, 84:50em I Session Code: EXP-201
CITTIOGLUIrt RBUJOI
RSA
2008
RSACONFERENCE 20
The theory of this talk...
• Instead of focusing on isolated events,
we can learn more (and make better
predictions) by analyzing how
attacks and defenses evolve together
2
EFTA_R1_01470124
EFTA02409737
RSACONFERENCE2008
RSACONFERENCE2008
Brief introduction
• Focus on real-world cryptographic systems
- Systems, architectures, protocols (SSL 3.0...)
— Organization & management challenges in security
• Highly technical team
— High-assurance emphasis
— Customers: Financial, technology, entertainment, pay TV,
communications, anti-counterfeiting
R&D-based business
— Services: Design, implementation, evaluation, education
- Licensing: Tamper-resistance/DPA, secure ASIC technologies
— Systems designed by CRI engineers protect »$100B annually
3
(rattrap., h
RSACONFERENCE2008
In this talk, I'll explore security as an evolutionary
process between attacker and defender
— How defensive measures influence attacks
— How attackers gain advantages by manipulating our
defensive strategies and perceptions of risk
But first a quick look at what's missing from
traditional (non-evolutionary) perspectives...
4
buio.,ur limn.
EFTA_R1_01470125
EFTA02409738
RSACONFERENCE2008
Traditional security emphasis:
-- Vulnerabilities --
• Evaluations = checking for vulnerabilities
• Attacking = exploiting vulnerabilities
• Responding = patching vulnerabilities
• Engineering = introducing vulnerabilities 0
It's all very tidy
- Defenders have nice lists of fixed flaws
— It appears that progress being made...
... but if this was working. the attackers would
be giving up — which isn't happening ...
(rnitm;
hums
a/Leask.
Obni$3,1
et tigalea W•43.41091.,011
"LW.
Vitt. Ito Vabas**14.114.1
Leery yds Iv Wet. *0313•170
arkoriardotio Oa Wader* 1•011103014)
re Snip Web.
wrOxne0110214•1
II leant WI* lerMrotbrri eta/Mg
'Up: Web %teas
WAS la twork..ofelt9:1011
fif Stoat. We. fetVatleves.03.1090)
fir Lorry uple• I. Wed., *01171•411
erfoort•lidit•OvWeders•OrtNni
tr WOO. b
41000371
t Swots WebrwvwWn 4•01193441)
Sly
t4
a•0 onnool
W Wawa wet..
ingaleal
fineoetaidthi f windows .001Zikal
34C.Ity lade, I, Wag., warriatalt
(tbannode. .0 weconntat M. MI
$.0,00.1S4 Its Wesi....019.110.,
V
k
W
*
,
*sea for Vorstw4
0397)7Th
er ievartnisles
Vretion *ammo+
a eer., VW** ••• %Wen§ *D10.1%40
t SeterValateintawet101.1100)
V upfseek• tvedam or (M42,01
VSeareptedilsOerWedent
0791110.1
ti Swiet• US. I. %Won Pf0M0•15)
tarLiela Is warm • (0041644)
Cr Sart, Lidis Is Way* gr OPT•4•XOsi
Stoat, upclehe Is VIMOM •01140194
EFTA_R1_01470126
EFTA02409739
RSACONFERENCE2008
A simple problem...
Q: Suppose a product undergoes
two independent security reviews:
— Review #1 funds 16 bugs
— Review #2 finds 15 new bugs
+ 2 that were also found by #1
— All of these bugs get patched
before the product ships
If we assume all bugs are equally
easy for reviewers to catch, how
many unpatched bugs are
expected in the shipped product?
((meantime('
RSACONFERENCE20I
Solution:
Total bugs: B
Review #1 found 16/B
Review #2 found 17/B
Bugs found by both:
B(16/8)(17/B) = 2
Solve for B = 136
Unfixed bugs: B-16-15
(If some bugs are harder to
detect than others, the
answer becomes larger.)
7
The basic evolutionary cycle...
Crown tun
New defense
Prey
(aka defender)
Predator
(aka attacker)
[ New exploit
Predators & prey must adapt or die.
— Prey die off if they cannot find a workable defense
— Predators die off if they can't find workable attacks
(although the predators doing pretty well these days.. )
EFTA_R1_01470127
EFTA02409740
RSACONFERENCE2008
RSACONFERENCE2008
An example... website blacklisting
• Websites serving exploits get blacklisted
— Blocked sites don't propagate malware very well
— Selection pressure: attacks that lead to rapid blacklisting
are less fit
• What are obvious responses?
— Infect legitimate (e.g., whitelisted) sites to make them
serve malware
— Prevent blacklisting services from detecting the malware
9
(tar ur, tarn hymn
RSACONFERENCE2008
An example... website blacklisting
"random js" attack
— Installed on ISP web servers that are serving multiple domains
— Dynamically embeds malicious javascript into webpages
— Serves out an updateable cocktail of exploits (13 as of Dec. 2007).
which install a nasty data harvesting Trojan
— 10.000 legitimate domains hosting the attack
— The attack is only served out once per visiting IP address
(Saxe £ H mere ',brew. see iovn MCAC WOW riven In 2C04)
• Widespread use of blacklisting has caused adversaries to:
...focus more on compromising legitimate websites
...use code morphing to randomize their malware
...limit infection attempts to conceal machines serving out malware
io
Inno.urn Puny
EFTA_R1_01470128
EFTA02409741
RSACONFERENCE2008
Evolving resistance
Breakable security responses work
like antibiotics
- Work wonderfully at first
- ... so they get used widely
- ... creating a huge selection pressure
- ... so the pathogens evolve immunity
- ... leading to an even nastier problem
Classic Prisoners' Dilemma:
— With many defenders, unified strategies are impractical
- Attacker evolution is inevitable (a few participants denying
themselves a benefit won't fix the trend)
A— Smart participants take benefits when they can
(sown ilium.
11
On-line piracy: Past evolutionary steps
• Original problem:
Distribution of pirated content
• Original response:
Prosecution
Evolutionary sequence:
• Attack #2:
Distribute circumvention tools instead pirate copies
• Response #2: Digital Millennium Copyright Act (1998)
• Attack #3:
Napster
• Response #3: Litigation (Napster shut down 2001)
• Attack #4:
Grokster & others test the lines of legality
• Response #4: MGM v. Grokster (Grokster shut down 2005)
• Attack #5:
Rise of BitTorrent
• Response #5: Attack trackers (torrent.ls, Demonlod, OINK.ed... In 2007)
• Attack #6:
Trackers in "safe" jurisdictions; trackerless protocols
Vit>DMCA =>
=>0 ra BitTorrent
EFTA_R1_01470129
EFTA02409742
RSACONFERENCE2008
RSACONFERENCE2008
On-line piracy: Predicting future evolution
Communication & storage advances.
Current efforts by rights holders
— Laws requiring increased responses by ISPs
— Increased prosecution of individuals
— International legal efforts (such as vs. The Pirate Bay)
• Which will lead to increased...
— Funding of legal counterattacks (such as Sweden's Pirate Party)
— Decentralized, anonymous, encrypted file sharing systems
• Which will lead to...
— Efforts to increase penalties for those who get caught (like mail
theft)
— Dramatically increased effort to flood pirate networks with fake
files and degrade the pirate user experience
• Which will lead to...
— Sympathy campaigns for targets
— Public key reputation systems to authenticate posted files
13
RSACONFERENCE2008
Pay TV signal theft...
• Another interesting case study:
— Long history of co-evolution
— Sophisticated participants
— Broad range of strategies attempted
— Significant attacks are visible
firmo.wir lump
0>
New demos
Prey
(aka defender)
Predator
(aka attacker)
Na exploit
EFTA_R1_01470130
EFTA02409743
RSACONFERENCE2008
RSACONFERENCE2
Pay TV signal theft...
Example: Popular channels like HBO, ESPN, etc. are not
legally available in Canada (don't meet local rules)
— Result: Thriving black market
(Canadians pay more than what US subscribers pay)
— Pirates have made a fortune breaking security
• Example: "vcipher" raid = $13M (CDN) cash/checks/bonds
+ 10,000 access cards + guns... Est revenue: $10M/year
— Attacks spill back into the US market
Result: Extreme pressure on the technical systems
• • ,
MI Is Et
o
i
4
•
t+rtAiiNia4:‘;:•iii.,i1.....
Pay TV signal theft...
Numerous examples of evolutionary sequences:
- Analog traps. DISCRET, OAK. EBU... attacked using pirate boxes
- VideoCipher II. VideoCipher II+ ... attacked by VMS & other attacks
- VideoCrypt:
• First 5 card gens: Limit voltage/current on 21V external prog pin
• 6th card gen: PIC-based message blocker ("Kentucky Fried Chip")
• 7th card gen: PIC16C84-based blocker/emulator ("Ho Lee Fook")
• 7th card gen: PC-based emulator by Markus Kuhn
• 8th card gen: Abandoned. (Same as 7th with different keys)
• 9th card gen: Phoenix programs (record & replay activations)
• 9th card gen: Full emulator cards (-battery cards*, Dallas 5002FP)
• 9th card gen: SEASON programs
• 10th card gen: Phoenix programs, battery cards
• 11th card gen: Replaced (reason unknown)
• 12th card gen: (migration to new architecture)
to man hum,
EFTA_R1_01470131
EFTA02409744
RSACONFERENCE2008
RSACONFERENCE2OO8
Pay TV
Tradition of high hopes then disappointment
— New products were expected to work, but didn't
— Each product's generation addressed the previous failure, not
necessarily logical predictions about future risks
- Risks hidden until commercial exploits arose
• Humans instinctively obsess over measures to fix past
failures
- Good vs animal predators
- Not against agile attackers.
Q: If attacks were less visible, would the first
card generation have ever been replaced?
a-=
17
(inktom•hi.ifron.
RSACONFERENCE2OO8
Detectability & Information asymmetries
• As defenders, we optimize based on what we know
— Defending is much harder if we don't know the attack
— Smart adversaries hide information
• Unnecessarily visible attacks (such as viruses/worms that
replicate in the wild) are generally the stupidest
— Example: Information theft for insider trading
• Detected attacks = stopped and/or prosecuted
• Strategy: Stealth + narrow targeting
— Ex: Anti-virus/blacklisting software is useless
• Defender uncertainty:
Am I dangerously exposed... or overly paranoid?
18
EFTA_R1_01470132
EFTA02409745
RSACONFERENCE2008
Revisiting the cycle...
r
Attacker gains if the
response takes longer
Defender loses
if there is no
effective fix
RSACONFERENCE20
Defender wins if no attack
attempted (e.g., system is obscure,
doesn't appear to be worth
attacking, or defender is lucky)
New defense
Prey
(aka defender)
Defender loses if the
attack is catastrophic
(= detection irrelevant)
Predator
(aka attacker)
New exploit
Defender loses if no
response because
attack is not detected
Defender wins if attacker
fails (robust design, luck.
attacker resource limits...)
"Success" is measured as a cost/benefit:
,==
• Defender. Cost of defense vs. reduction in loss
19
freKrautr htun
• Attacker: Cost/risk of attack vs. benefits
A zero-sum game?
When attackers are thriving, the
burden is felt disproportionally by
some targets
- Attackers pick easiest victims
• If one target becomes
harder to catch, predators
switch to the easier prey
- Attackers expect changes and
diversify (Pay TV, credit card fraud, bogus checks. drugs, weapons...)
• Consequence #1: Security improvements offer a double reward
— Eliminate the problem and competitors face extra predation
• Consequence #2: Benefits are local, not systemic
— Fraud is redistributed, but the impact on the predator is often small
(The delta between the original attack and the next-best alternative)
•r
e...1111r.;
I
r it
T
C
/
A
i n
74
.
•
•
* •
• 4
•
(voltam*, hum)
-
•
Hungry lions stalking zebra a ric
impala in the Okavanco Delta
20
EFTA_R1_01470133
EFTA02409746
RSACONFERENCE2008
vpm.
In-SOO
,
Many strategies can work, but in all cases the
long-term survival of prey species depends on
evolving as predators become more effective
[We're the prey]
•
-4:7,1-wir4V
t.
EFTA_R1_01470134
EFTA02409747
RSACONFERENCE2008
"If the bad guys appreciated how much
effort we put into patching, do you think
they might stop compromising our system?"
23
RSACONFERENCE2008
Evolving faster & better...
• Genetic improvements happen gradually
- Less fit organisms don't propagate
• A few species specialize in a much faster
way to adapt
— Learning
24
Nino.inututh.
EFTA_R1_01470135
EFTA02409748
RSACONFERENCE2008
RSACONFERENCE2
Address information
asymmetries that limit
evolution
Attackers hide information to prevent
good strategic decisions
• Many examples
- Britain & US lives sacrificed to keep Germany
from knowing the Enigma was broken
• But adversaries often leave hints...
- Germans knew U-boat losses were inexplicably
high, but had too much faith in the Enigma
— Is card use at certain merchants linked to subsequent fraud?
— Is stock trading correlated to pending M&A announcements?
— Are solicitations from customers being sent to addresses in your
mailing list?
(Tricky to distinguish clever inferences from stolen info!)
26
EFTA_R1_01470136
EFTA02409749
RSACONFERENCE2008
Example #1:
Academy screeners...
• Academy members need to see
movies so they can vote for them
- Problem: Rampant piracy of screeners
— Too expensive & difficult to make uncopyable
• Solution: Forensic marking
ishr
— Unique identifying marks in each original
- Enables copies to be traced to the Academy member
• Extra information forced the predators into the open
— Today, movies still get pirated, but the sources get shut off quickly
(+ prosecuted if appropriate, e.g. Russell Sprague)
- Successful: Piracy from Academy screeners is now self-limiting
Umixam,hvom
RSACONFERENCE2008
Example #2: Honeypots, etc.
• Problem: How to tell if outside attackers have breached
a network
- Approach: Put a honeypot on the network that will tempt
adversaries who have breached the perimeter & alert you
• If it is raided: proof something is horribly wrong
• Useful datapoint (though not conclusive) if not breached
Related approaches for other problems, e.g.:
— Tempting URL in comments in sensitive source code
— Traceable addresses in mailing list copies
Unwovhmoy
28
EFTA_R1_01470137
EFTA02409750
RSACONFERENCE2008
RSACONFERENCE2008
Allocate resources to maximize
the ability to evolve —
and limit adversaries' ability
29
(inktom•hi.ifron.
RSACONFERENCE20O8
How should resources be allocated?
Option #1: Invest in many incremental responses:
— Each provides some temporary relief... but will never 'win'
— Pros: Disrupts pirate viewers, low-cost, easy to develop
— Cons: Gets broken quickly; continuous investment required
Option #2: Invest in a major defensive upgrade
— The best strategy if the attackers can be driven away to other targets
— Pros: Potential to fundamentally change the situation
— Cons: Long lead time. more expensive, requires skilled engineering
Game theory problem — right answer depends on risk model
- Non-evolutionary models biased toward incremental approaches
- Evolution-aware models tend to favor decisive efforts, if available
• Iterative processes train adversaries + can increase attacker
profits (= stronger attacker next time)
sa
• If attacker dies or specializes in other prey, a broad range of
-=-=-
risks decrease (e.g., if attack infrastructure is dismantled, it 30
0,„"„,,h,„,0 won't be there to exploit future vulnerabilities)
EFTA_R1_01470138
EFTA02409751
RSACONFERENCE2008
'CONFERENCE?
Contrasting strategies we've built and deployed
Self-Protecting Digital Content
Renewable anti-piracy system:
Enable defenses to evolve
- Integrates security software
with content
- Each disc./title carries security
code for its own playback
- Enables new discs to carry
new countermeasures
- Complements (imperfect)
defenses
- Deployed in Blu-ray (BD+)
CryptoFirewall
Tamper-resistant silicon core:
Goal to completely end attacks
— Typically manufactured as part
of a larger ASIC
— Intra-chip security perimeter:
secure even if rest of chip fails
— Far stronger and more cost-
effective than general purpose
chips (e.g.. smart cards)
— 50M+ pay N chips deployed
(t.
,
•:4
!
Utilize indirect information
effectively
EFTA_R1_01470139
EFTA02409752
RSACONFERENCE2008
Organizational perspective
• How well does your organization
learn from past failures?
— Example — airplane crashes
- Good example: FAA
- Mediocre: TSA
• Immediate causes are usually obvious
— A specific vulnerability
— Patching the immediate cause wastes a valuable opportunity
• The proximal and root causes are most important
— Poor communication between engineering groups?
— Critical design tasks performed by unassisted novices?
— Insufficient security budget?
etc.
Itamorn Monti
Organizational perspective
• Different organizations have different problems
- Smaller organizations
• Challenges tend to be lack of infrastructure, resources
— Bigger organizations:
• Can develop internal expertise by exposing a few people
to problems across the organization
• ... but tend to overload people with policies & politics
• ... and consequences of failure are larger
Inno.onn lump
34
EFTA_R1_01470140
EFTA02409753
RSACONFERENCE2008
RSACONFERENCE2008
Consistency vs. flexibility
Policy compliance can be mind-numbing
- ISO 9000, SOX, HIPAA,
— Encourage uniformity, limits flexibility
— Policy overhead distracts (or drives away) the best people
A question of balance...
- Security policies cannot substitute for common sense or hiring
smart trustworthy people
— Carelessness about consistency are also creates risk
35
nructm, Mom.
"Look at the bright side. The total network
meltdown will free the IT department to
focus on our core mission: audit paperwork."
36
EFTA_R1_01470141
EFTA02409754
RSACONFERENCE2008
RSACONFERENCE2
Put yourself in the
adversary's shoes
Think a few moves ahead
• How will the adversary respond?
— What will be the new optimal strategy for the adversary?
• Will this be better or worse for me than the old attack?
— Will the adversary give up? Attack the competition?
• How will the my organization respond to the
updated attack?
- Will people be surprised? Upset?
— Do we have the next response planned? How long will it
take to roll out? What will it cost? ...
2--
Itoto.umhtutto
EFTA_R1_01470142
EFTA02409755
RSACONFERENCE2008
Trying on a black hat
Internal "black hat" security brainstorming
— Identify how your team would attack your own systems if they
were disgruntled employees, competitors, extortionists, etc...
— If an attack succeeded, what signs could observe that would
suggest a breach?
— What defensive upgrades could address the risks? If these were
deployed, how would adversaries adapt?
• Offer small prizes for the best insights
— Goal: Encourage team to stop focusing on the why systems are
strong, and instead ask how they can be made to fail
Closing thoughts
dJ
EFTA_R1_01470143
EFTA02409756
RSACONFERENCE2008
On "Intelligent Design'
• Can intelligent people
build a complex system
and get it right?
— Doubtful... Windows... Linux... FreeBSD... etc.
= too many interactions, too complex to secure reliably
• Yet we can build complex systems that can
evolve in response to new threats
— Windows update, SPDC...
Dn. ic
oet•in. ma:rrv1.u,
. Ow.). 00alfl. mg•tdo• thy
ri.mg thAp
nuietial .?•.••1•11.< oppo,aned -Pal an.pn nupd.
aclulp.
,,,,, Jl. ,t, ,,Icrol
ippeosa Al
aM (0.np &rut of f doo
flowerafaft. ..lotch 2k 1M11
Perhaps our best hope is to harness
evolutionary processes to create systems
that meet our needs...
L.
RSACONFERENCE2008
A thought experiment on factoring...
If we want to evolve the ultimate factoring algorithm...
O Create a random algorithm
0 Create some medium-sized random test integers
O Test whether if algorithm can factor the test integers
quickly
• If not, randomly modify the algorithm and go to step 2.
O Stop
Even a completely dumb process will eventually stumble
upon the optimal factoring algorithm, but smarter
Lapproaches should yield results faster
(1O,0OO1, h.f /110
42
EFTA_R1_01470144
EFTA02409757
RSACONFERENCE2008
OVPI0GRAPH, Rtst ARCH
tan
.
at implemen
asic
x entities that study thetde
find the answer, stop the siliAlatio
RSACONFERENCE20
For a copy of my slides:
Paul Kocher
paul@cryptography.com
We're hiring... Ask me or visit
www.cryptography.com/jobs
EFTA_R1_01470145
EFTA02409758
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Extracted Information
Email Addresses
Document Details
| Filename | EFTA02409737.pdf |
| File Size | 1581.0 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 20,395 characters |
| Indexed | 2026-02-12T16:26:49.401935 |