ITIS 3200 Weichao Wang 1 3 papers in

  • Slides: 17
Download presentation
ITIS 3200 Weichao Wang 1

ITIS 3200 Weichao Wang 1

3 papers in CCS 2008 • Below we want to discuss 3 interesting papers

3 papers in CCS 2008 • Below we want to discuss 3 interesting papers we see in CCS 2008 • Spamalytics • Question: How many spam email do you need to send to attract one buyer of blue pill? 2

3

3

4

4

5

5

6

6

 • This translates into the following conversion rates: – 1 in 12, 500,

• This translates into the following conversion rates: – 1 in 12, 500, 000 pharmacy spams lead to a purchase. – 1 in 265, 000 greeting card spams lead to an infected machine. – 1 in 178, 000 April Fool's Day spams lead to an infected machine. – 1 in 10 people visiting an infection website downloaded the executable and ran it. 7

8

8

 • Physical key security: Teleduplication via optical decoding – Using modest imaging equipment

• Physical key security: Teleduplication via optical decoding – Using modest imaging equipment and standard computer vision algorithms – extracting a key’s complete and precise bitting code at a distance via optical decoding – cutting precise duplicates 9

 • The modern pin tumbler lock, derived from an Egyptian design, was invented

• The modern pin tumbler lock, derived from an Egyptian design, was invented by Linus Yale Jr. in 1861 and has changed little • To duplicate keys, we need physical access. But not anymore 10

11

11

12

12

13

13

The key image captured at a distance of 195 ft = 60 meter 14

The key image captured at a distance of 195 ft = 60 meter 14

15

15

 • Bootjacker: Compromising computers using forced restart – – Physical access to the

• Bootjacker: Compromising computers using forced restart – – Physical access to the victim machine is obtained. The victim is forced to immediately restart. The bootable device is connected to the victim Boot. Jacker is booted instead of the host operating system. – Boot. Jacker revives the host software environment and allows the attacker to break into the system and run arbitrary payloads. 16

17

17