16
Secure Public Instant Messaging (IM): A Survey Mohammad Mannan Paul C. Van Oorschot Digital Security Group School of Computer Science Carleton University, Ottawa, Canada

Secure Public Instant Messaging (IM): A Survey

Embed Size (px)

DESCRIPTION

Secure Public Instant Messaging (IM): A Survey. Mohammad Mannan Paul C. Van Oorschot Digital Security Group School of Computer Science Carleton University, Ottawa, Canada. What’s This Talk About?. Do we need secure IM? Do the current methods provide enough security for IM?. Organization. - PowerPoint PPT Presentation

Citation preview

Page 1: Secure Public Instant Messaging (IM): A Survey

Secure Public Instant Messaging (IM): A Survey

Mohammad Mannan Paul C. Van OorschotDigital Security GroupSchool of Computer ScienceCarleton University, Ottawa, Canada

Page 2: Secure Public Instant Messaging (IM): A Survey

What’s This Talk About? Do we need secure IM? Do the current methods provide

enough security for IM?

Page 3: Secure Public Instant Messaging (IM): A Survey

Organization Scope and background What’s at stake? Reasons why IM is insecure Existing IM security mechanisms Shortcomings Concluding remarks

Page 4: Secure Public Instant Messaging (IM): A Survey

Scope PC-to-PC (one-to-one) text messaging Popular public and business IM

AOL, Yahoo!, and MSN Messenger, ICQ Yahoo! Business Messenger, Reuters

Messaging third party clients (Trillian, IMSecure)

Out of scope Short Messaging System(SMS) Internet Relay Chat (IRC) chat room/group chat

Page 5: Secure Public Instant Messaging (IM): A Survey

Background IM is mainly used for –

exchanging text messages tracking availability of a list of users

Recent statistics Pew report 2004 –

42% Internet users use IM in the U.S. growth rate of IM population: 29% (since 2000) 70% Internet users report using email more than

IM Ferris Report (business IM users)

10 million in 2002 182 million in 2007

Page 6: Secure Public Instant Messaging (IM): A Survey

IM Communications Model

Client-server: presence, contact list and availability management, message relay between users

Client-client: audio/video chat, file transfer Authentication: password-based, sometimes use

SSL (Secure Socket Layer)

IM Server

Client 1 Client 2

Page 7: Secure Public Instant Messaging (IM): A Survey

What’s at Stake? Conversations (privacy and information

leakage) Propagation vector for Internet worms,

viruses and Trojans SPIM (IM spam) – Unsolicited commercial

IMs Radicati Group projections –

1.2 billion SPIMs in 2004 (5% of total IMs) 400 million in 2003 34.8 billion spam email messages in 2004

Compromised systems

Page 8: Secure Public Instant Messaging (IM): A Survey

Reasons why IM is insecure “Insecure” connection

impersonation replay

Sharing IM features with other applications Exploitable URI (Uniform Resource Identifiers)

handlers aim, ymsgr example: aim://addbuddy?mybuddy attacks

buffer overflow scripting attacks

Deceitful hyperlinks

Page 9: Secure Public Instant Messaging (IM): A Survey

Existing IM Security Mechanisms(1)

Built-in methods launch anti-virus explicit consent for add contact, file

transfer, presence info (not cryptographically protected)

new version and critical updates notification prevents automated account creation word filtering password-protected settings etc.

Page 10: Secure Public Instant Messaging (IM): A Survey

Existing IM Security Mechanisms(2) Third-party security solutions

AIM can make use of Class 2 digital certificates

IMSecure Trillian

Why don't we use email security solutions for IM? Proprietary protocols P2P connections

Page 11: Secure Public Instant Messaging (IM): A Survey

Shortcomings of Current Solutions

Anti-virus can check only limited file types URL exploitations Cost and maintenance burden of digital

certificates SSL-based (corporate IM) solutions:

resource hungry visible messages to server limited threat model (end-points are trusted)

Page 12: Secure Public Instant Messaging (IM): A Survey

Weaknesses of IMSecure Model

IM Client IMSecureUnprotected Messages

Malicious Program

Read/M

odify

Messa

ges

Encrypted Messages

User System

IM Server/Others

Page 13: Secure Public Instant Messaging (IM): A Survey

Concluding Remarks IM security is important Current methods are insufficient Can we use existing protocols to

secure IM? User interface issues Ongoing work in IETF (see also

paper)

Page 14: Secure Public Instant Messaging (IM): A Survey

Thanks.

Paper: http://www.scs.carleton.ca/~mmannan/publications/pst04.pdf

Presentation: http://www.scs.carleton.ca/~mmannan/publications/pst04.ppt

Page 15: Secure Public Instant Messaging (IM): A Survey

Web References Symantec: IM Worms Could Spread In Seconds, June

2004, http://www.techweb.com/wire/story/TWB20040618S0007 Look out spam, here comes spim, Mar. 2004,

http://www.theregister.co.uk/2004/03/31/look_out_spam_here_comes

Microsoft warns of JPEG threat, Sep. 2004 http://www.macworld.co.uk/news/index.cfm?NewsID=9635&Page=1&pagePos=2

National Cyber Security Alliance Perception Poll Release

http://www.staysafeonline.info/news/NCSAPerceptionPollRelease.pdf

Page 16: Secure Public Instant Messaging (IM): A Survey

Related Work Much work on feature

enhancement, analysis Secure Instant Messaging Protocol

Preserving Confidentiality against Administrator, Kikuchi et al., March, 2004.

Threats to Instant Messaging, Symantec Security Response, 2003.