Computer Security Foundations

Slides:



Advertisements
Similar presentations
Recognising Languages We will tackle the problem of defining languages by considering how we could recognise them. Problem: Is there a method of recognising.
Advertisements

Variants of Turing machines
Lecture 24 MAS 714 Hartmut Klauck
CSCI 4325 / 6339 Theory of Computation Zhixiang Chen Department of Computer Science University of Texas-Pan American.
1 1 -Access Control Foundational Results. 2 2 Preliminaries Undecidability The Halting Problem The Turing Machine.
Computability and Complexity 5-1 Classifying Problems Computability and Complexity Andrei Bulatov.
1 Introduction to Computability Theory Lecture12: Decidable Languages Prof. Amos Israeli.
1 Introduction to Computability Theory Lecture15: Reductions Prof. Amos Israeli.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Fall 2004COMP 3351 Undecidable problems for Recursively enumerable languages continued…
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #3-1 Chapter 3: Foundational Results Overview Harrison-Ruzzo-Ullman result.
1 Undecidability Andreas Klappenecker [based on slides by Prof. Welch]
April 13, 2004ECS 235Slide #1 Expressive Power How do the sets of systems that models can describe compare? –If HRU equivalent to SPM, SPM provides more.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #3-1 Chapter 3: Foundational Results Overview Harrison-Ruzzo-Ullman result –Corollaries.
Fall 2004COMP 3351 Reducibility. Fall 2004COMP 3352 Problem is reduced to problem If we can solve problem then we can solve problem.
Courtesy Costas Busch - RPI1 Reducibility. Courtesy Costas Busch - RPI2 Problem is reduced to problem If we can solve problem then we can solve problem.
CMSC 414 Computer (and Network) Security Lecture 10 Jonathan Katz.
1 Introduction to Computability Theory Lecture11: The Halting Problem Prof. Amos Israeli.
1 Reducibility. 2 Problem is reduced to problem If we can solve problem then we can solve problem.
1 September 14, 2006 Lecture 3 IS 2150 / TEL 2810 Introduction to Security.
CS526: Information Security Prof. Cristina Nita-Rotaru September 9, 2003 Protection Models.
IS-2150/TEL-2810: Introduction of Computer Security1 September 7, 2005 Introduction to Computer Security Access Control Matrix Take-grant model.
CSCI 2670 Introduction to Theory of Computing November 4, 2004.
Slide #2-1 Chapter 2: Access Control Matrix Overview Access Control Matrix Model Protection State Transitions –Commands –Conditional Commands.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 6 September 27, 2011 Take Grant Model.
Slide #3-1 Chapter 3: Foundational Results Overview Harrison-Ruzzo-Ullman result –Corollaries.
Decidability or Impossibility? 02b = a bit of boring theory Nicolas T. Courtois - University College of London.
CSCI 115 Chapter 8 Topics in Graph Theory. CSCI 115 §8.1 Graphs.
THEORY OF COMPUTATION Komate AMPHAWAN 1. 2.
 2005 SDU Lecture13 Reducibility — A methodology for proving un- decidability.
Other Access Control Models
2/1/20161 Computer Security Foundational Results.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 4 September 18, 2012 Access Control Model Foundational Results.
April 8, 2004ECS 235Slide #1 Overview Safety Question HRU Model Take-Grant Protection Model SPM, ESPM –Multiparent joint creation Expressive power Typed.
INFSCI 2935: Introduction of Computer Security1 September 13, 2005 Introduction to Computer Security Lecture 3 Take Grant Model (Cont) HRU Schematic Protection.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #3-1 Chapter 3: Foundational Results Overview Harrison-Ruzzo-Ullman result.
© 2004 Ravi Sandhu The Extended Schematic Protection Model (ESPM) Ravi Sandhu Laboratory for Information Security Technology George Mason.
Recursively Enumerable and Recursive Languages. Definition: A language is recursively enumerable if some Turing machine accepts it.
1/29/02CSE460 - MSU1 Nondeterminism-NFA Section 4.1 of Martin Textbook CSE460 – Computability & Formal Language Theory Comp. Science & Engineering Michigan.
Chapters 11 and 12 Decision Problems and Undecidability.
IS 2150 / TEL 2810 Introduction to Security
Recursively Enumerable and Recursive Languages
Institute for Cyber Security
PROPERTIES OF REGULAR LANGUAGES
Busch Complexity Lectures: Reductions
IS 2150 / TEL 2810 Introduction to Security
LIMITS OF ALGORITHMIC COMPUTATION
Introduction to Computer Security Lecture 2
September 16, 2004 Introduction to Computer Security Lecture 3
IS 2150 / TEL 2810 Information Security & Privacy
IS 2150 / TEL 2810 Introduction to Security
Decidable Languages Costas Busch - LSU.
Lectures on Graph Algorithms: searching, testing and sorting
Expressive Power How do the sets of systems that models can describe compare? If HRU equivalent to SPM, SPM provides more specific answer to safety question.
Undecidable problems:
Overview Safety Question HRU Model Take-Grant Protection Model
Proposed in Turing’s 1936 paper
Outline Motivation Access Control Matrix Model
Lecture 5 Theory of AUTOMATA
Advanced System Security
IS 2150 / TEL 2810 Information Security & Privacy
Chapter 3: Foundational Results
Subject Name: FORMAL LANGUAGES AND AUTOMATA THEORY
Discrete Mathematics for Computer Science
Decidability continued….
Variants of Turing machines
IS 2150 / TEL 2810 Introduction to Security
Computer Security Security Policies
IS 2150 / TEL 2810 Introduction to Security
IS 2150 / TEL 2810 Introduction to Security
Presentation transcript:

Computer Security Foundations 2/23/2019

Security How can one determine when a computer system is secure? What does secure mean? 2/23/2019

Reminder In our model a computer system is represented by a family of states: the set of all protection states P must be a subset of the set of authorized states Q if the system is to be secure. In the previous section we used a primitive, the ACM, to manage a protection system. Protection was in terms or rights and the ACM was the used to relate subjects to objects (also basic primitives). We also discussed protection state transitions and commands, which correspond to (cause) a sequence of state transitions. 2/23/2019

Security - definitions Let R be the set of (primitive) rights of the system, r e R and A be the ACM. If r e R is added to an element of A not already containing r, then r is said to be leaked. Let s0 be the initial protection state. If a system can never leak r e R then the system is safe wrt r. 2/23/2019

Security – safe vs secure We use the term safe to refer to the (abstract) model. Secure will be used when referring to implementations. So a secure implementations must be modeled on a safe system. Example: safe vs secure --see textbook 2/23/2019

Foundation theorems The model used is based on protection sates, the ACM and a set of commands –essentially the HRU model (discussed in the previous section). 2/23/2019

Theorem 1 There exists an algorithm that will determine whether a given mono-operational protection system with initial protection state s0 is safe wrt a generic right. Proof: see textbook. This whole section is a project topic for anybody who is interested in the foundations aspect of Computer Sercurity. 2/23/2019

Theorem 2 It is undecidable whether a given state of a given protection system is safe wrt a generic right. Proof --reduction to the halting problem. The proof is by contradiction. It is shown that an arbitrary Touring Machine can be reduced to the safety problem with the final state corresponding to the leaking of a right. For details see textbook. 2/23/2019

Theorem 3 The set of unsafe systems is recursively enumerable. (accepted by a TM). So we can generate a list of all unsafe protection systems. 2/23/2019

The Take-Grant protection model Can the safety of a protection system with specific rules be established? Answer: the Take-Grant protection model. This model is represented by a directed graph. Vertices are subjects “●” or objects “○”, or both “◙”. Edges are labeled by a set of rights, that the source has over the destination. R contains two distinguished rights: t (take) g (grant). 2/23/2019

Transitions: rewriting rules Take rule Grant rule Create rule Remove rule Details –slides 2/23/2019

Theorem 1 Let G0 be a protection graph containing just one subject vertex and no edge and let R be a set of rights. Then G0├ G iff G is a finite directed acyclic graph with subjects and objects only, with edges labeled for non-empty subsets of R and at least one subject (a trusted entity) having no incoming edge. Proof in textbook. Discussion in class. 2/23/2019

Closing the Gap We can answer the safety question in specific systems, but not for generic systems (eg. the HRU system). What characteristics distinguishes a model for which the safety problem is decidable from one in which it is undecidable? 2/23/2019

Closing the Gap The Schematic Protection Model (SPM) The Extended Schematic Protection Model (ESPM) Typed Access Matrix Models (TAMS) 2/23/2019

The Schematic Protection Model (SPM) This model is based on the notion of a protection type. This is a label that determines how control rights affect an entity. Rights are partitioned into sets of Inert rights (RI) and Control rights (RC) Inert rights do not alter the protection state of a system. For example reading a file does not modify which entities have access to the document: so is an RI. However in the Take-Grant model the take rule does, so is in RC. 2/23/2019

The Extended Schematic Protection Model (ESPM) Implicit in the SPM is the assumption of a single parent. ESPM allows for more parents. This problem arises in distributed systems. Example Anne and Bill must cooperate to perform a certain task, but do not trust each other. Such tasks may be achieved by using proxies: each create a proxy, and grants the other’s proxy only those rights that are needed to perform the task. 2/23/2019

Typed Access Matrix models (TAMS) The safety properties of SPM and ESPM are implicitly based on types. The TAM model is adds the notion of type explicitly. The type of an entity is fixed when the entity is created. A protection state of a system is defined as: (S, O,t, A) where, S = set of subjects , O = set of objects, A = the Acess Control Matrix, T the set of types and t : O →T For details see textbook. 2/23/2019