software based attacks

9

Click here to load reader

Upload: karanwayne

Post on 09-Jun-2015

96 views

Category:

Engineering


6 download

DESCRIPTION

Software Based Attacks

TRANSCRIPT

Page 1: Software based attacks

Software Based Attacks

Sachin SreekumarS6-CSE-25

Page 2: Software based attacks

ContentsSalami AttacksLinearization AttacksTime BombsTrusting Software

Page 3: Software based attacks

Salami Attacks

“Slices off” an amount of money from transactions.

Difficult for victim to detect.Traditional way- Slicing off fractional

cent from user’s accounts of a bank.Famous Examples:

Tax method refunding from each employee Car-Franchise in Florida Cash Register slicing off $0.01 Overstating amount in gas station

Page 4: Software based attacks

Linearization Attacks

Cracking password based on “password verification time”.

Verification is on the basis of character by character anlysis.

Input:-Correct password -> Verification Time: Maximum.

Input:-Incorrect password -> Verification Time: Minimum.

Real World Example: Attack on TENEX

Page 5: Software based attacks

So based on the delay and quickness of authenticating user Trudy can guess the character

Example:-

Page 6: Software based attacks
Page 7: Software based attacks

Time Bombs

Story of Donald Gene Burleson..Executes the virus after a

programed time.Just seed to start the virus and does

it’s job in minutes.Working method and destruction

level similar to a “Time bomb attack over a city” but here at computer level.

Page 8: Software based attacks

Trusting Software

Can you Trust a software?No program or software can be

trustedVirus can

-be any where (various file locations)-start any time (time bomb)-come in any form (language compliers,mp3,avi..etc.)

Always Stay alert.. Stay aware..

Page 9: Software based attacks

Thank You