Classes of Defense for Computer Systems Josephine Wolff
Total Page:16
File Type:pdf, Size:1020Kb
Classes of Defense for Computer Systems by Josephine Wolff A.B., Princeton University (2010) S.M., Massachusetts Institute of Technology (2012) Submitted to the Engineering Systems Division in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Engineering Systems: Technology, Management, and Policy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2015 ○c Massachusetts Institute of Technology 2015. All rights reserved. Author................................................................ Engineering Systems Division June 1, 2015 Certified by. David D. Clark Senior Research Scientist Thesis Supervisor Certified by. Kenneth A. Oye Associate Professor, Political Science and Engineering Systems Committee Chair Certified by. Frank R. Field, III Senior Research Associate Accepted by . Munther Dahleh William A. Coolidge Professor of Electrical Engineering and Computer Science Acting Director, Engineering Systems Division 2 Classes of Defense for Computer Systems by Josephine Wolff Submitted to the Engineering Systems Division on June 1, 2015, in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Engineering Systems: Technology, Management, and Policy Abstract Computer security incidents often involve attackers acquiring a complex sequence of escalating capabilities and executing those capabilities across a range of different intermediary actors in order to achieve their ultimate malicious goals. However, pop- ular media accounts of these incidents, as well as the ensuing litigation and policy proposals, tend to focus on a very narrow defensive landscape, primarily individ- ual centralized defenders who control some of the capabilities exploited in the ear- liest stages of these incidents. This thesis proposes two complementary frameworks for defenses against computer security breaches—one oriented around restricting the computer-based access capabilities that adversaries use to perpetrate those breaches and another focused on limiting the harm that those adversaries ultimately inflict on their victims. Drawing on case studies of actual security incidents, as well as the past decade of security incident data at MIT, it analyzes security roles and defense design patterns related to these broad classes of defense for application designers, ad- ministrators, and policy-makers. Application designers are well poised to undertake access defense by defining and distinguishing malicious and legitimate forms of activ- ity in the context of their respective applications. Policy-makers can implement some harm limitation defenses by monitoring and regulating money flows, and also play an important role in collecting the data needed to expand understanding of the se- quence of events that lead up to successful security incidents and inform which actors can and should effectively intervene as defenders. Organizations and administrators, meanwhile, occupy an in-between defensive role that spans both access and harm in addressing digital harms, or harms that are directly inflicted via computer capabil- ities, through restrictions on crucial intermediate harms and outbound information flows. The comparative case analysis ultimately points to a need to broaden defensive roles and responsibilities beyond centralized access defense and defenders, as well as the visibility challenges compounding externalities for defenders who may lack not only the incentives to intervene in such incidents but also the necessary knowledge to figure out how best to intervene. David D. Clark Senior Research Scientist Thesis Supervisor Kenneth A. Oye 3 Associate Professor, Political Science and Engineering Systems Committee Chair Frank R. Field, III Senior Research Associate 4 Acknowledgments I came to MIT five years ago knowing very little about computer networks andeven less about policy. That I believed I would be able to do research at the intersection of those two topics was frankly laughable. That anyone else believed it was nothing short of incredible. I was fortunate to be advised by David Clark, whose clear thinking and patience (especially in the face of my impatience) were essential every step of the way. In response to my first attempt at drawing out general lessons from the case studies in this thesis, he sent me an email with the subject line: “generalization” chapter. I have never received feedback defter or more discerning than those quotation marks. Ken Oye helped me understand the ways in which defensive considerations were ab- solutely, inextricably tied to institutional interests, and served as a constant source of encouragement, as well as educational and entertaining anecdotes, throughout grad- uate school. Frank Field was the rare engineer who read this thesis and encouraged me to make it more philosophical, not less. I am grateful also to Alan Davidson, Susan Landau, Fred Schneider, and Bruce Schneier for crucial conversations about security and defense, and to the National Science Foundation and Northrop Grumman for funding this work. Members of MIT’s Information Systems & Technology group were exceedingly gener- ous with both their time and their security records, and played a vital role in helping me understand the practical considerations involved in making defensive decisions. The advanced network architecture group in CSAIL has been a wonderful academic home for the past five years, and I am especially grateful to Shirley Hung, Susan Perez, and Jesse Sowell for support and guidance throughout that period. Other ANA members whom I have been lucky enough to share an office with include Albert Domingo, Alex Gamero-Garrido, Rubén Garcia, Cecilia Testart, and Steve Woodrow. Beth Milnes in the Engineering Systems Divison and Ed Ballo and Barb DeLaBarre in the Technology Policy Program were unfailingly friendly presences in E40 and cheerfully helped me navigate the administrative side of MIT. Dara Fisher made a crucial contribution to this thesis by suggesting, during an espe- cially cold and snowy month of writing, that I should start watching The Bachelor. Tommy Leung and Nathan Perkins helped me keep a sense of humor and a sense of perspective about the ups and downs of graduate school. During the 2014-15 academic year, the Berkman Center for Internet & Society pro- vided me with a remarkable community of people interested in understanding the Internet in the context of social and political issues. 5 Paul Mitchell and Kevin Sullivan hosted me at Microsoft during the summers of 2012, 2013, and 2014, providing an up-close look at the endlessly fascinating and occasion- ally agonizing process of security policy-making. Torie Bosch at Slate allowed me to test out several ideas that eventually made their way into this thesis in a series of columns about computer security and current events. Cooper Lloyd and Mary Schnoor made MIT feel just a little bit like middle school (in the best possible way). The 2013 World Champion Red Sox made the penultimate fall of graduate school feel just a little bit like the penultimate fall of high school (in the best possible way). Email correspondence with Alexis Levinson, in which we vowed on a daily basis to put our lives in order and take the world by storm just as soon as we managed to change out of pajama pants, made the purple house feel just a little bit like our college dorm rooms (in the best possible way). Sheila Solomon Klass hated computers almost as much as she loved writing, and she believed, with the wholly unwarranted and unconditional faith of a grandmother, that I had a great genius for both. I wrote the last chapters of this thesis on her computer and no one would have been prouder to see me finish, or more be- wildered by the final product. The summer before my fourth year of graduate school, after I retrieved a web browser icon she had accidentally deleted from her desktop, she sent me an email with the subject line: You have made me the hap- piest Jewish grandmother-writer-with-a-big-mouth-who-should-have-gotten-married- but-instead-roasted-peanuts-in-Planter’s-Duffy-Square-window-and-went-to-college! I was so lucky to know her. Orlando and Anatol Klass let me fill out forms, make calendars, and file paperwork for them when graduate school proved to have too few deadlines and bureaucratic demands to satisfy my need for color-coded charts and recreational organizational activities. Larry Wolff, who lived with that organizational mania for many years, understood how daunted I was by the prospect of a project that couldn’t be reduced to checklists and meticulous planning. The month after my general exams, as I struggled to figure out what came next, he sent me an email with the advice Imost needed to hear to embark on this thesis. He wrote: remember that you can NOT lay the whole thing out in advance, exactly what you’re going to read, write, and show; if you could do that then the research wouldn’t really be worth doing. Perri Klass instilled in me early on the belief that life was too short for wide-ruled paper, and supplied graph-paper notebooks and pads with appropriately small squares from all over the world for my checklists and meticulous planning. Throughout graduate school, she reminded me of the joys of non-academic writing and urged me to write about the topics in this thesis for a wider audience. Together, they supported the thesis-writing process primarily by making fun of me and encouraging me to drink more (not necessarily in that order). It would have been weird for them not to have done that. 6 These ambiguities, redundancies and deficiencies remind us of those which doctor Franz Kuhn attributes to a certain Chinese encyclopaedia entitled ‘Celestial Empire of Benevolent Knowledge.’ In its remote pages it is written that the animals are divided into: (a) belonging to the emperor, (b) embalmed, (c) tame, (d) sucking pigs, (e) sirens, (f) fabulous, (g) stray dogs, (h) included in the present classification, (i) frenzied, (j) innumerable, (k) drawn with a very fine camelhair brush, (l) et cetera, (m) having just broken the water pitcher, (n) that from a long way off look like flies.