 Introduction  Fundamentals  Capability Security  Challenges in Secure Capability Systems  Revoking Capabilities  Conclusion.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Access Control Patterns Fatemeh Imani Mehr Amirkabir university of technology, Department of Computer Engineering & Information Technology.
Database Management System
Access Control Intro, DAC and MAC System Security.
Protection. Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique name and can be accessed.
Bilkent University Department of Computer Engineering
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Chapter 14: Protection.
Lecture 7 Access Control
Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Security & Protection.
Present by Napasakorn Sukjay Poom Samaharn
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
Dr. Kalpakis CMSC 621, Advanced Operating Systems. Security & Protection.
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Protection.
Page 19/4/2015 CSE 30341: Operating Systems Principles Raid storage  Raid – 0: Striping  Good I/O performance if spread across disks (equivalent to n.
Operating Systems Protection & Security.
Protection.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 5 Network Security
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 AE4B33OSS Chapter 14: Protection Goals of Protection Principles of Protection Domain.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Silberschatz, Galvin, and Gagne  Applied Operating System Concepts Module 18: Protection Goals of Protection Domain of Protection Access Matrix.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 18: Protection Goals of Protection Objects and Domains Access Matrix Implementation.
Protection Nadeem Majeed Choudhary
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Modul ke: Fakultas Program Studi Proteksi SISTEM OPERASI Misbahul Fajri, ST., MTI. 14 FASILKOM Teknik Informatika.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
CIS/SUSL1 Fundamentals of DBMS S.V. Priyan Head/Department of Computing & Information Systems.
Multics CysecLab Graduate School of Information Security KAIST.
Secure Operating Systems Lesson F: Capability Based Systems.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Chapter 14: Protection Goals.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Goals of Protection Operating.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Goals of Protection Operating system consists of a collection.
Database Management Systems, 2 nd Edition, R. Ramakrishnan and J. Gehrke1 Security Lecture 17.
11.1 CSE Department MAITSandeep Tayal 11: Protection Goals of Protection Domain of Protection Access Matrix Implementation of Access Matrix Revocation.
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
CSE Operating System Principles Protection.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
18.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 18: Protection Goals of Protection Domain of Protection Access Matrix.
Chapter 17: System Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 17: Protection Goals of Protection Principles.
Saurav Karmakar. Chapter 14: Protection  Goals of Protection  Principles of Protection  Domain of Protection  Access Matrix  Implementation of Access.
Database System Implementation CSE 507
PROTECTION.
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 14: System Protection
Operating System Concepts
Chapter 14: Protection.
Chapter 14: Protection.
CE Operating Systems Lecture 21
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Operating System Concepts
Presentation transcript:

 Introduction  Fundamentals  Capability Security  Challenges in Secure Capability Systems  Revoking Capabilities  Conclusion

 A capability system is an operating system that represents its access control policy from the subject’s perspective.  “capabilities” were first introduced by Dennis and Van Horn in 1966, as a reference to an object and a set of operations that the capability entitles the holder.

 Such capability references are extended memory references in that they not only provide location or naming information, but they may also provide access rights for that reference. This form of addressing is known as capability-based addressing.  An important difference between capability and access control list systems is the process’s ability to name objects, where in an access control list system, a process can name any object in the system as the target of an operation.

 A fundamental requirement of a capability system is that processes not be able to modify or forge capabilities.  If the capabilities could be forged, then a process could build a capability for any access it desires.  To protect capabilities, the capability systems traditionally store them in memory protected from the process.

 Capability systems have conceptual security advantages over ordinary systems: 1) They can be used to define process permissions more precisely, enabling least privilege. 2) They enable permissions to be more easily transferred from one process to another, enabling the definition of protected subsystems.

 A computer program that is fooled by some other party into misusing its authority, is defined as confused deputy.  In an ordinary operating system, objects are assigned permissions and it is inconvenient to change which subjects can access an object at runtime.  Then, the subsystem would be assigned the rights to operate on behalf of any client. If a subsystem is confused, there is a chance of providing unauthorized access to another client’s data.

 But in the case of a capability system, this would not be possible because the subsystem would only be able to perform operations using the capabilities that the client would provide.

 Here we will discuss whether a capability system architecture is suitable for implementing a secure operating system.  Mr.Boebert and Mr.Karger noted that traditional capability systems fail to implement the –security property of the Bell-LaPadula policy.

 In the above figure there are two processes: High Secrecy Process A has access to high secrecy data and Low Secrecy Process B is not authorized to access that data.  If our goal is to implement an MLS (multilevel security) policy like Bell-LaPadula, then a high secrecy process may read data in a low secrecy process.  For instance, A uses its legal capability B1 to read segment B1 and since capabilities are data, the high secrecy process A can read the capabilities, and then A1 can write in the low secrecy process’s segment B1.

 Then high secrecy process A has a capability to write its secrets to low secrecy segment B2 which violates -security property.

 Here in Revocation in capability systems, the owner of an object has a choice whether to grant normal capabilities or grant capabilities that are associated with a special revoker capability.  Revoker capability is a level of indirection that enables the owner to revoke all the capabilities that reference the object though that revoker capability.  And simply by deleting the revoker capability, the other capabilities lose access to the object and this is because the object is only available via the revoker capability.

 This approach is explained by “Redell’s revoker capability approach” which states “When the revoker capability is revoked all the capabilities that were based on it are also revoked.

 An owner creates a revoker capability and grants a capability that points to that revoker capability to Process1.  Revoker capabilities may be used by other subjects as well. Process1can also create revoker capability and create a capability that points to it for Process2.  Thus the owner will revoke both Process 1 and Process 2 access should they delete their revoker capability.

 However the Process 1can only revoke access from Process 2 and note that the capability for Process 3 cannot be revoked because it points directly to the object.

 The biggest challenge for this capability systems, like many systems, is providing a practical execution environment that can be proven to ensure systems security goals.

 os.org/essays/capintro.html os.org/essays/capintro.html  based_security based_security  Reference from Textbook.