secure coding practices nicholas weavercs161/fa16/slides/lec3.pdf · computer science 161 fall 2016...
TRANSCRIPT
![Page 1: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/1.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
"Secure" Coding Practices Nicholas Weaver
based on David Wagner’s slides from Sp 2016
1
![Page 2: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/2.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
Administrivia
2
![Page 3: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/3.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
3
![Page 4: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/4.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
This is a Remarkably Typical CProblem
• Someone attempted to add this checking code into the Linux kernel back in 2003
• It goes caught only because they didn't have proper write permission so it was flagged as anomalous
• If you use the proper compiler flags, it should gripe when you do this
4
if ((options == (__WCLONE|__WALL)) && (current->uid = 0)) retval = -EINVAL;
![Page 5: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/5.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
Why does software have vulnerabilities?
• Programmers are humans.And humans make mistakes.• Use tools
• Programmers often aren’t security-aware.• Learn about common types of security flaws.
• Programming languages aren’t designed well for security.• Use better languages (Java, Python, …).
5
![Page 6: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/6.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
Testing for Software Security Issues
• What makes testing a program for security problems difficult?• We need to test for the absence of something• Security is a negative property!
• “nothing bad happens, even in really unusual circumstances”
• Normal inputs rarely stress security-vulnerable code
• How can we test more thoroughly?• Random inputs (fuzz testing)• Mutation• Spec-driven
• How do we tell when we’ve found a problem?• Crash or other deviant behavior
• How do we tell that we’ve tested enough?• Hard: but code-coverage tools can help
6
![Page 7: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/7.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
Testing for Software Security Issues
• What makes testing a program for security problems difficult?• We need to test for the absence of something• Security is a negative property!
• “nothing bad happens, even in really unusual circumstances”
• Normal inputs rarely stress security-vulnerable code
• How can we test more thoroughly?• Random inputs (fuzz testing)• Mutation• Spec-driven
• How do we tell when we’ve found a problem?• Crash or other deviant behavior
• How do we tell that we’ve tested enough?• Hard: but code-coverage tools can help
7
![Page 8: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/8.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
Test For Failures...Not Just Successes• Think about how your program might fail, not just succeed• Because the bad guys are going to look there
• "Edge cases" are where your problems likely lie• Either barely erroneous or barely correct• E.g. if your function accepts strings up to length n• Be sure to test lengths 0, 1, n-1, n, n+1, 2n-1, 2n, and 2n+1
• A good guide by @eevee:• https://eev.ee/blog/2016/08/22/testing-for-people-who-hate-testing/
8
![Page 9: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/9.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
This Applies toBoth Sides...• When making your program robust, think like an attacker
would• "Hmm, what if I spew random junk?"• "Hmm, what if I go for obvious corner cases?"
• When attacking software, think like a dumb programmer?• "Hmm, what mistakes have I made in the past? Lets try those!"
9
![Page 10: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/10.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
Try to Eliminate entire classesof problems• Stack Overflows:• Turn on compiler protections
• Memory corruption attacks more generally• Use a safe language• Or barring that, turn on ALL defenses:• W^X/DEP + 64b ASLR + put a timeout on crash recovery
• SQL Injection• Only use parameterized SQL libraries
10
![Page 11: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/11.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
Working Towards Secure Systems
• Along with securing individual components, we need to keep them up to date …
• What’s hard about patching?• Can require restarting production systems• Can break crucial functionality• Vendor regression tests should prevent this but don't always!
• Management burden:• It never stops (the “patch treadmill”)
• User burden:• "Flaw in Flash, you need to manually update it..."
• But absolutely essential: 0-days are pricey, N-days are free11
![Page 12: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/12.jpg)
![Page 13: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/13.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
Working Towards Secure Systems
• Along with securing individual components, need to keep them up to date …
• What’s hard about patching?• Can require restarting production systems• Can break crucial functionality• Management burden:• It never stops (the “patch treadmill”) …• … and can be difficult to track just what’s needed where
• Other (complementary) approaches?• Vulnerability scanning: probe your systems/networks for known flaws• Penetration testing (“pen-testing”): pay someone to break into your systems …• … provided they take excellent notes about how they did it!
13
![Page 14: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/14.jpg)
![Page 15: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/15.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
Reasoning About Safety
• How can we have confidence that our code executes in a safe (and correct, ideally) fashion?
• Approach: build up confidence on a function-by-function / module-by-module basis
• Modularity provides boundaries for our reasoning:• Preconditions: what must hold for function to operate correctly• Postconditions: what holds after function completes
• These basically describe a contract for using the module• Notions also apply to individual statements (what must hold for correctness;
what holds after execution)• Stmt #1’s postcondition should logically imply Stmt #2’s precondition• Invariants: conditions that always hold at a given point in a function
15
![Page 16: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/16.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
16
int deref(int *p) { return *p; }
Precondition?
![Page 17: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/17.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
17
/* requires: p != NULL (and p a valid pointer) */ int deref(int *p) { return *p; }
Precondition: what needs to hold for function to operate correctly
![Page 18: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/18.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
18
void *mymalloc(size_t n) { void *p = malloc(n); if (!p) { perror("malloc"); exit(1); } return p; }
Postcondition?
![Page 19: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/19.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
19
/* ensures: retval != NULL (and a valid pointer) */ void *mymalloc(size_t n) { void *p = malloc(n); if (!p) { perror("malloc"); exit(1); } return p; }
Postcondition: what the function promises will hold upon its return
![Page 20: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/20.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
20
int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) total += a[i]; return total; }
Precondition?
![Page 21: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/21.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
21
int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) total += a[i]; return total; }
General correctness proof strategy for memory safety: (1) Identify each point of memory access (2) Write down precondition it requires (3) Propagate requirement up to beginning of function
![Page 22: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/22.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
22
int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) total += a[i]; return total; }
General correctness proof strategy for memory safety: (1) Identify each point of memory access? (2) Write down precondition it requires (3) Propagate requirement up to beginning of function
![Page 23: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/23.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
23
int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) total += a[i]; return total; }
General correctness proof strategy for memory safety: (1) Identify each point of memory access (2) Write down precondition it requires (3) Propagate requirement up to beginning of function
![Page 24: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/24.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
24
int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* ?? */ total += a[i]; return total; }
General correctness proof strategy for memory safety: (1) Identify each point of memory access (2) Write down precondition it requires? (3) Propagate requirement up to beginning of function
![Page 25: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/25.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
25
int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* requires: a != NULL && 0 <= i && i < size(a) */ total += a[i]; return total; }
General correctness proof strategy for memory safety: (1) Identify each point of memory access (2) Write down precondition it requires (3) Propagate requirement up to beginning of function
![Page 26: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/26.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
26
int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* requires: a != NULL && 0 <= i && i < size(a) */ total += a[i]; return total; }
General correctness proof strategy for memory safety: (1) Identify each point of memory access (2) Write down precondition it requires (3) Propagate requirement up to beginning of function?
![Page 27: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/27.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
27
int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* requires: a != NULL && 0 <= i && i < size(a) */ total += a[i]; return total; }
Let’s simplify, given that a never changes. (It gets much worse when we have multiple threads)
![Page 28: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/28.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
28
/* requires: a != NULL */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* requires: 0 <= i && i < size(a) */ total += a[i]; return total; }
![Page 29: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/29.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
29
/* requires: a != NULL */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* requires: 0 <= i && i < size(a) */ total += a[i]; return total; }
General correctness proof strategy for memory safety: (1) Identify each point of memory access (2) Write down precondition it requires (3) Propagate requirement up to beginning of function?
![Page 30: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/30.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
30
/* requires: a != NULL */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* requires: 0 <= i && i < size(a) */ total += a[i]; return total; }
?
General correctness proof strategy for memory safety: (1) Identify each point of memory access (2) Write down precondition it requires (3) Propagate requirement up to beginning of function?
![Page 31: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/31.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
31
/* requires: a != NULL */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* requires: 0 <= i && i < size(a) */ total += a[i]; return total; }
General correctness proof strategy for memory safety: (1) Identify each point of memory access (2) Write down precondition it requires (3) Propagate requirement up to beginning of function?
![Page 32: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/32.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
32
/* requires: a != NULL */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* requires: 0 <= i && i < size(a) */ total += a[i]; return total; }
The 0 <= i part is clear, so let’s focus for now on the rest.
![Page 33: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/33.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
33
/* requires: a != NULL */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* requires: i < size(a) */ total += a[i]; return total; }
![Page 34: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/34.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
34
/* requires: a != NULL */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* requires: i < size(a) */ total += a[i]; return total; }
General correctness proof strategy for memory safety: (1) Identify each point of memory access (2) Write down precondition it requires (3) Propagate requirement up to beginning of function?
?
![Page 35: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/35.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
35
/* requires: a != NULL */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* invariant?: i < n && n <= size(a) */ /* requires: i < size(a) */ total += a[i]; return total; }General correctness proof strategy for memory safety: (1) Identify each point of memory access (2) Write down precondition it requires (3) Propagate requirement up to beginning of function?
?
![Page 36: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/36.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
36
/* requires: a != NULL */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* invariant?: i < n && n <= size(a) */ /* requires: i < size(a) */ total += a[i]; return total; }
?
How to prove our candidate invariant? n <= size(a) is straightforward because n never changes.
![Page 37: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/37.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
37
/* requires: a != NULL && n <= size(a) */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* invariant?: i < n && n <= size(a) */ /* requires: i < size(a) */ total += a[i]; return total; }
?
![Page 38: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/38.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
38
/* requires: a != NULL && n <= size(a) */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* invariant?: i < n && n <= size(a) */ /* requires: i < size(a) */ total += a[i]; return total; }
?
What about i < n ?
![Page 39: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/39.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
39
/* requires: a != NULL && n <= size(a) */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* invariant?: i < n && n <= size(a) */ /* requires: i < size(a) */ total += a[i]; return total; }
?
What about i < n ? That follows from the loop condition.
![Page 40: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/40.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
40
/* requires: a != NULL && n <= size(a) */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* invariant?: i < n && n <= size(a) */ /* requires: i < size(a) */ total += a[i]; return total; }
?
At this point we know the proposed invariant will always hold...
![Page 41: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/41.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
41
/* requires: a != NULL && n <= size(a) */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* invariant: a != NULL && 0 <= i && i < n && n <= size(a) */ total += a[i]; return total; }
… and we’re done!
![Page 42: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/42.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
42
/* requires: a != NULL && n <= size(a) */ int sum(int a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) /* invariant: a != NULL && 0 <= i && i < n && n <= size(a) */ total += a[i]; return total; }
A more complicated loop might need us to use induction: Base case: first entrance into loop. Induction: show that postcondition of last statement of
loop plus loop test condition implies invariant.
![Page 43: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/43.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
43
int sumderef(int *a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) total += *(a[i]); return total; }
![Page 44: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/44.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
44
/* requires: a != NULL && size(a) >= n && ??? */ int sumderef(int *a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) total += *(a[i]); return total; }
![Page 45: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/45.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
45
/* requires: a != NULL && size(a) >= n && for all j in 0..n-1, a[j] != NULL */ int sumderef(int *a[], size_t n) { int total = 0; for (size_t i=0; i<n; i++) total += *(a[i]); return total; }
![Page 46: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/46.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
46
char *tbl[N]; /* N > 0, has type int */
int hash(char *s) { int h = 17; while (*s) h = 257*h + (*s++) + 3; return h % N; }
bool search(char *s) { int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
![Page 47: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/47.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
47
char *tbl[N];
/* ensures: ??? */ int hash(char *s) { int h = 17; while (*s) h = 257*h + (*s++) + 3; return h % N; }
bool search(char *s) { int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
What is the correct postcondition for hash()? (a) 0 <= retval < N, (b) 0 <= retval,(c) retval < N, (d) none of the above. Discuss with a partner.
![Page 48: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/48.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
48
char *tbl[N];
/* ensures: 0 <= retval && retval < N */ int hash(char *s) { int h = 17; while (*s) h = 257*h + (*s++) + 3; return h % N; }
bool search(char *s) { int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
![Page 49: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/49.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
49
char *tbl[N];
/* ensures: 0 <= retval && retval < N */ int hash(char *s) { int h = 17; /* 0 <= h */ while (*s) h = 257*h + (*s++) + 3; return h % N; }
bool search(char *s) { int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
![Page 50: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/50.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
50
char *tbl[N];
/* ensures: 0 <= retval && retval < N */ int hash(char *s) { int h = 17; /* 0 <= h */ while (*s) /* 0 <= h */ h = 257*h + (*s++) + 3; return h % N; }
bool search(char *s) { int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
![Page 51: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/51.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
51
char *tbl[N];
/* ensures: 0 <= retval && retval < N */ int hash(char *s) { int h = 17; /* 0 <= h */ while (*s) /* 0 <= h */ h = 257*h + (*s++) + 3; /* 0 <= h */ return h % N; }
bool search(char *s) { int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
![Page 52: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/52.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
52
char *tbl[N];
/* ensures: 0 <= retval && retval < N */ int hash(char *s) { int h = 17; /* 0 <= h */ while (*s) /* 0 <= h */ h = 257*h + (*s++) + 3; /* 0 <= h */ return h % N; /* 0 <= retval < N */ }
bool search(char *s) { int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
![Page 53: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/53.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
53
char *tbl[N];
/* ensures: 0 <= retval && retval < N */ int hash(char *s) { int h = 17; /* 0 <= h */ while (*s) /* 0 <= h */ h = 257*h + (*s++) + 3; /* 0 <=? h */ return h % N; /* 0 <= retval < N */ }
bool search(char *s) { int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
![Page 54: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/54.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
54
char *tbl[N];
/* ensures: 0 <= retval && retval < N */ int hash(char *s) { int h = 17; /* 0 <= h */ while (*s) /* 0 <= h */ h = 257*h + (*s++) + 3; /* 0 <= h */ return h % N; /* 0 <= retval < N */ }
bool search(char *s) { int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
![Page 55: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/55.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
55
char *tbl[N];
/* ensures: 0 <= retval && retval < N */ int hash(char *s) { int h = 17; /* 0 <= h */ while (*s) /* 0 <= h */ h = 257*h + (*s++) + 3; /* 0 <= h */ return h % N; /* 0 <= retval < N */ }
bool search(char *s) { int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
![Page 56: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/56.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
56
char *tbl[N];
/* ensures: 0 <= retval && retval < N */ int hash(char *s) { int h = 17; /* 0 <= h */ while (*s) /* 0 <= h */ h = 257*h + (*s++) + 3; /* 0 <= h */ return h % N; /* 0 <= retval < N */ }
bool search(char *s) { int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
![Page 57: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/57.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
57
char *tbl[N];
/* ensures: 0 <= retval && retval < N */ unsigned int hash(char *s) { unsigned int h = 17; /* 0 <= h */ while (*s) /* 0 <= h */ h = 257*h + (*s++) + 3; /* 0 <= h */ return h % N; /* 0 <= retval < N */ }
bool search(char *s) { unsigned int i = hash(s); return tbl[i] && (strcmp(tbl[i], s)==0); }
![Page 58: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/58.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
58
void foo(int *a){ int i, j, sum; sum = 0; j = 0; for(i = 1; i < 10; ++i){ sum += a[j]; j = a[j]; } }
![Page 59: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/59.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
Common Coding Errors
• Memory safety vulnerabilities• In a "safe" language they cause immediate faults• May result in a "denial of service", aka crash, but not control flow hijack• In an "unsafe" language they may cause unpredictable (and likely exploitable)
errors
• Input validation vulnerabilities• "You mean you trusted me when I said my name was "robert'); drop table
students;--??!?"
• Time-of-Check to Time-of-Use (TOCTTOU) vulnerability (later)
59
![Page 60: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/60.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
Input Validation Vulnerabilities
• Program requires certain assumptions on inputs to run properly
• Programmer forgets to check inputs are valid => program gets exploited
• Example:– Bank money transfer: Check that amount to be transferred is non-
negative and no larger than payer’s current balance– SQLi: Accept string as input into an SQL command– Format String vulnerability: Accept string as the format string for printf
60
![Page 61: Secure Coding Practices Nicholas Weavercs161/fa16/slides/lec3.pdf · Computer Science 161 Fall 2016 Nicholas Weaver "Secure" Coding Practices Nicholas Weaver based on David Wagner’s](https://reader035.vdocuments.mx/reader035/viewer/2022070710/5ec6483e38fdfc0f933d29a1/html5/thumbnails/61.jpg)
Computer Science 161 Fall 2016 Nicholas Weaver
If Time Left: Real World Security Research:Click Trajectories
61