1 Precise Enforcement of Policies After we have a policy, is there always a mechanism to enforce it? If so, can we devise a generic procedure for developing.

Slides:



Advertisements
Similar presentations
Dan Boneh Message integrity Message Auth. Codes Online Cryptography Course Dan Boneh.
Advertisements

Relational Algebra, Join and QBE Yong Choi School of Business CSUB, Bakersfield.
1 Anti Virus vs virus System i-Specific Anti-Virus Product Ali ameen al said.
Investigating Malicious Software Steve Romig The Ohio State University April 2002.
Reflections on Trusting Trust Ken Thompson. Communication of the ACM, Vol. 27, No. 8, August 1984, pp Copyright 1984, Association for Computing.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Introduction to Computability Theory Lecture15: Reductions Prof. Amos Israeli.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
1 Introduction to Computability Theory Lecture13: Mapping Reductions Prof. Amos Israeli.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
1 Lecture 24 Hiding Exploit in Compilers bootstrapping, self-generating code, tombstone diagrams Ras Bodik Mangpo and Ali Hack Your Language! CS164: Introduction.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Lesson 4 Computer Software
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
1GMS-VU : Module 2 Introduction to Information and Communication Technologies Module 2 Computer Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
1 September 14, 2006 Lecture 3 IS 2150 / TEL 2810 Introduction to Security.
1 - Chapter 4 of Bishop- 4. Security Policies. 2 Security Policy A a statement that partitions all possible system states into: Authorized (secure) states.
Security Policy What is a security policy? –Defines what it means for a system to be secure Formally: Partition system into –Secure (authorized) states.
Containment and Integrity for Mobile Code Security policies as types Andrew Myers Fred Schneider Department of Computer Science Cornell University.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Working with MS SQL Server Textbook Chapter 14.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
ICOM 6115: COMPUTER SYSTEMS PERFORMANCE MEASUREMENT AND EVALUATION Nayda G. Santiago August 16, 2006.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Microsoft Security Response Center Presented by Fan Chiang, Chun-Wei( 范姜竣韋 ) 2015/11/14 1 NTUIM.
Security CS Introduction to Operating Systems.
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
Security & Trusting Trust Swarun Kumar Based on slides courtesy: Jorge Simosa MIT Spring 2013.
CMSC 414 Computer (and Network) Security Lecture 11 Jonathan Katz.
12/13/20151 Computer Security Security Policies...
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Open Malicious Source Symantec Security Response Kaoru Hayashi.
Introduction Program File Authorization Security Theorem Active Code Authorization Authorization Logic Implementation considerations Conclusion.
CIT 380: Securing Computer Systems Security Solutions Part 2.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
IS 2150/TEL 2810: Introduction of Computer Security1 September 27, 2003 Introduction to Computer Security Lecture 4 Security Policies, Confidentiality.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
CS426Fall 2010/Lecture 171 Computer Security CS 426 Lecture 17 Market Failure of Secure Software.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
Managing Windows Security
Three steps to prevent Malware infection
Hacking Computer crime and cyber security.
The Internet Worm Compromising the availability and reliability of systems through security failure.
Backdoor Attacks.
NET 311 Information Security
Chap 10 Malicious Software.
Information Security CS 526
Security.
Information Security CS 526
Chap 10 Malicious Software.
Information Security CS 526
Operating System Concepts
Reflections on Trusting Trust by Ken Thomson
Computer Security Security Policies
Presentation transcript:

1 Precise Enforcement of Policies After we have a policy, is there always a mechanism to enforce it? If so, can we devise a generic procedure for developing such mechanisms? secure precise set of reachable states with mechanisms set of secure states

2 The A. Jones + R. Lipton Model A program p is modeled as a function p: I 1 x I 2 x...x I n  r Assumption on Observability All information available about I 1 x I 2 x...x I n are encoded in the function p(I 1,I 2, I n ) A protection mechanism: Let p: I 1 x I 2 x...x I n  r be a function. and let m(I 1,I 2, I n ) = p(I 1,I 2, I n ) or m(I 1,I 2, I n )  E That is, m produces the same output as p or an error.

3 A Visualization of the Model Objective is to secure a program p that takes inputs I 1 I 2... I n and outputs some r A protection mechanism m takes the same inputs I 1 I 2... I n and outputs either the same r or some error E set of reachable states without mechanisms set of secure states

4 The A. Jones + R. Lipton Model Cont. Definition: A confidentiality policy for p: I 1 x I 2 x...x I n  r is a function c: I 1 x I 2 x...x I n  A where A is a subset of I 1 xI 2 x...xI n Definition: A confidentiality policy c is secure with respect to a security mechanism m iff there is a function m’: A  R U E satisfying m (i 1,i 2,i n )= m’ (c(i 1,i 2,i n )) Example: consider a password accepting function auth with respect to a database Db with output {good, bad} auth: U x P x Db  {good, bad}, where Db contains pairs of (u,pwd) that are allowed. The the confidentiality policy allow(i 1,i 2,i 3 )=(i 1,i 2 ). Then there is NO function auth’ satisfying auth’(allow(i 1,i 2,i 3 ))= auth’(i 1,i 2 )= auth(i 1,i 2,i 3 )

5 Precision Mechanisms for enforcing policies are typically too- restrictive m 1, m 2 are distinct mechanisms for program p under same policy m 1 as precise as m 2 (m 1  m 2 ) if, for all inputs i 1, …, i n, m 2 (i 1, …, i n ) = p(i 1, …, i n )  m 1 (i 1, …, i n ) = p(i 1, …, i n ) set of reachable states without mechanisms set of secure states m1m1 m2m2

6 Combining Mechanisms Let m 3 = m 1  m 2 For inputs on which m 1 and m 2 outputs same value as p, m 3 does also; otherwise, m 3 returns same value as m 1 Theorem: if m 1, m 2 are secure, then m 3 is secure Also, m 3  m 1 and m 3  m 2 set of reachable states without mechanisms set of secure states m1m1 m2m2

7 Existence Theorem For any program p and security policy c, there exists a precise, secure mechanism m* such that, for all secure mechanisms m associated with p and c, m*  m m* =  i=1,  m i set of reachable states without mechanisms set of secure states mimi

8 Lack of Effective Procedure Theorem: There is no effective procedure that determines a maximally precise, secure mechanism for any policy and program. Proof analogous to that of undecidable problem However, possible to get a maximally precise secure mechanism for specific cases.

9 Key Points Policies describe what are (not) allowed Trust underlies everything DAC and MAC (ORCON) Formal languages are required to specify policy Precise enforcement of policies is generally difficult

10 Appendix 1: Fake Windows Patch Is a Windows Killer (Source: Go backhttp:// back From: Subject: What You Need to Know About the Zotob.A Worm. What You Should Know About Zotob Published: August 14, 2005 | Updated: August 19, 2005 Severity VirusGreen Supported Software Affected Windows All Version Microsoft Security Advisory Zotob.A Zotob.B Zotob.C Zotob.D Zotob.E Bobax.O Esbot.A Rbot.MA Rbot.MB Rbot.MC The attachment is named MS EXE. It is 21,229 bytes and is compressed with the MEW program. When the attachment is executed, it first downloads a second Trojan program, Agent.AII, and executes it. This program downloads additional malware which logs keystrokes and accesses multiple web sites. It also attempts to modify the settings of security programs on the user's computer. Zotob is a worm that targets All Windows computers and takes advantage of a security issue that was addressed by Microsoft Security Bulletin MS This worm installs malicious software, and then searches for other computers to infect. If you have installed the update released with Security Bulletin MS05-039, you are protected from Zotob and its variants. If you are using any supported version of Windows, you are not at risk.

11 Appendix 2: True Story about a Back Door Ken Thompson's 1983 Turing Award lecture to the ACM admitted the existence of a back door in early Unix versions that may have qualified as the most fiendishly clever security hack of all time. In this scheme, the C compiler contained code that would recognize when the `login' command was being recompiled and insert some code recognizing a password chosen by Thompson. So the compiled Unix system has a backdoor whereas the source code is clean. More amazingly, Thompson also arranged that the compiler would recognize when it was compiling a version of itself, and insert into the recompiled compiler the hack codes required to get him the password, and also to recognize itself and do the whole thing again the next time around! Consequently, when someone suspected the compiler and attempted to recompile the compiler from a clean source, he had to use the hacked compiler to recompile the compiler – which would of course be a hacked version again! The hack perpetuated itself invisibly, leaving the back door in place and active but with no trace in the sources. (See full story at