1 / 22

A Scientific Approach to Software Security Dennis Fisher May 15, 2012

The Kaspersky Lab Security News Service. A Scientific Approach to Software Security Dennis Fisher May 15, 2012. Software security pre-history. Software security pre-history. In the beginning, things were OK • Defenders had the advantage Computers were rare, code was impenetrable

lida
Download Presentation

A Scientific Approach to Software Security Dennis Fisher May 15, 2012

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Kaspersky Lab Security News Service A Scientific Approach to Software Security • Dennis Fisher • May 15, 2012

  2. Software security pre-history

  3. Software security pre-history • In the beginning, things were OK • •Defenders had the advantage • Computers were rare, code was impenetrable • Few people understood how to break software • •Computers were isolated • Not accessible to outside attackers • Physically secured • • Software was written by professionals • Purpose-built applications • No Web to worry about

  4. Software security pre-history

  5. Software security pre-history Source: Wikipedia

  6. Software security pre-history • Bugs were kind of cute • •Seen as problems to be solved • Bugs were studied as oddities, artifacts of the development process • •Defects rather than vulnerabilities • Developers learned actual lessons from mistakes • Information was shared • •Mostly unreachable by attackers • Needed local access, intimate knowledge of the software • Writing exploits was really hard

  7. And then this happened

  8. The game changed completely • Microsoft ruled the world • •Windows was ubiquitous • Software monoculture that gave attackers an advantage • Write once, hit many • •Vulnerabilities abounded • Buffer overflows • Memory corruption • •Security was an afterthought at best

  9. Pain begets change The Trustworthy Computing era •Focus on security over features •Development of SDLC process •Becomes a model for the industry and financial services companies

  10. Microsoft’s SDLC Source: Microsoft

  11. Software security matures The emergence of BSIMM •Comprehensive maturity model for software security programs •Developed through study of dozens of organizations’ programs •Describes 109 discrete activities across four domains

  12. + eleven unnamed firms Intel

  13. A framework for success Source: BSIMM

  14. Case study: Adobe

  15. Starting from zero (day) Adobe was the new Microsoft •Huge installed base of vulnerable users •Old development practices with no rigorous approach to threat modeling or code quality •Common set of vulnerabilities and weaknesses across applications

  16. FIGURE . Adobe Reader exploits by month in 2008, indexed to the monthly average for 2H08 July through December 2008 Pain begets change

  17. Reader 9 vs. Reader X The importance of the SDL •Reader 9 was developed without the current SDL or security as a priority •Reader 9 was the target of a high volume of malware •Helped spur a company wide change in practices and priorities

  18. Reader 9 vs. Reader X The importance of the SDL •Adobe implemented a rigorous software security program beginning in early 2009 •Included training and threat modeling and lessons learned from Microsoft’s SDL experience •Reader X developed with SDL in place, implementation of a sandbox and anti-exploit technologies

  19. Reader 9 vs. Reader X Results •Reader 9 had nine publicly disclosed zero day vulnerabilities •Reader X has NO zero days to date •Attackers have largely moved on to other products as main targets

  20. Conclusions Better software through science •Software security is gradually becoming a priority •Mature, formalized programs are having a measurable effect on defects and attacks •Internal development organizations can watch and learn from successes of vendors

  21. Questions? dennis@threatpost.com

More Related