CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Access Control Chapter 3 Part 3 Pages 209 to 227.
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
Access Control Methodologies
Chapter 6 User Protections in OS. csci5233 computer security & integrity (Chap. 6) 2 Outline User-level protections 1.Memory protection 2.Control of access.
Capability Based Security By Zachary Walker CS265 Section 1.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Access Control Intro, DAC and MAC System Security.
 Introduction  Fundamentals  Capability Security  Challenges in Secure Capability Systems  Revoking Capabilities  Conclusion.
CS 483 – SD SECTION (8) AUTHORIZATION. INTRODUCTION The authorization (or access control) process is used to decide if person, program or device X is.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 10 Jonathan Katz.
User Domain Policies.
G Robert Grimm New York University Protection and the Control of Information Sharing in Multics.
Lecture 7 Access Control
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CS426Fall 2010/Lecture 191 Computer Security CS 426 Lecture 19 Discretionary Access Control.
Lecture 18 Page 1 CS 111 Online Access Control Security could be easy – If we didn’t want anyone to get access to anything The trick is giving access to.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 5 Network Security
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
Li Xiong CS573 Data Privacy and Security Access Control.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
Multics CysecLab Graduate School of Information Security KAIST.
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
Chapter 5 – Designing Trusted Operating Systems
COEN 350: Network Security Authorization. Fundamental Mechanisms: Access Matrix Subjects Objects (Subjects can be objects, too.) Access Rights Example:
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
Access Control: Policies and Mechanisms Vinod Ganapathy.
Discretionary Access Control Models Adith Srinivasan.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
Database Management Systems, 2 nd Edition, R. Ramakrishnan and J. Gehrke1 Security Lecture 17.
Lecture 14 Page 1 CS 111 Summer 2013 Security in Operating Systems: Basics CS 111 Operating Systems Peter Reiher.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
CSE Operating System Principles Protection.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 14: System Protection
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
Chapter 14: Protection.
Operating Systems Security
Discretionary Access Control (DAC)
Chapter 14: Protection.
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
Access Control.
Computer Security Access Control
CS703 - Advanced Operating Systems
Access Control Dr. X Parenthesis: before we dive deeper into crypto, we will explore and old but still valid security principle, access controls.
Presentation transcript:

CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz

“Capability myths…”  Equivalence myth: ACLs and capabilities are “just” two views of the AC matrix  Confinement myth: Capability systems cannot enforce confinement  Irrevocability myth: Capabilities cannot be revoked

Equivalence myth  Capabilities allow for finer-grained listing of subjects –Processes rather than user accounts  Capabilities allow greater flexibility to edit permissions –In ACLs, usually all-or-nothing –In capability-based systems, can delegate exactly those rights you have

Confinement myth  Myth: Capabilities can be delegated “at will” and therefore cannot be confined  But…can be set up so that A can delegate a capability to B only if A is authorized to pass capabilities to B –If B is untrusted, then the latter capability will not exist

Origin of confinement myth  Mistaken assumption that the ability to write/read files translates into the ability to read/write capabilities –E.g., “read-down/write-up” example which allows transfer of “write-low” capability –Capabilities should not be viewed as “just” bitstrings; they are typed by the OS

Revocation of capabilities?  Capabilities may expire with time…or can remove all access by changing random number associated with file –Does not allow fine-grained revocation by subject  If OS stores capabilities, can simply delete the capability –Could move capability to new location and reveal the location only to subjects which still have access rights Requires OS to keep track of which capabilities have been issued to whom

More generally  Use forwarding to revoke access…

Advantages of capabilities  Better at enforcing “principle of least privilege” –Provide access to minimal resources, to the minimal set of subjects –We have seen already that capabilities allow much finer-grained control over subjects (process-level instead of user-level)

Advantages…  Avoiding “confused deputy” problem –“Deputy” = program managing authorities from multiple sources –In the example we have seen, the problem was not the compiler having the wrong authority, but of exercising its authority for the wrong purpose

Confused deputy…  Capabilities give the ability to identify the authority a subject is using –Can then designate use of the authority for a specific purpose  Capabilities also tie together designation and authority –Don’t “know” about a resource if you don’t have the capability to access it! –Any request to access a resource must include the necessary authority to do so --- “deputy” can now examine the context of the request

“Trusted” Operating Systems (Chapter 5)

Overview  A trusted OS must provide (minimally) memory protection, file protection, access control, and user authentication –Authentication deferred to later…  Policies/models, design, assurance

“Trust” vs. “Security”  A “trusted” system meets the stated or expected security requirements –May or may not be “secure”…  May be degrees of trust…

Security policies/models  What model to use?  “Military security policy” –Primarily concerned with secrecy –Information ranked at sensitivity level within a hierarchy (e.g.: unclassified, secret, top secret), and also placed within (one or multiple) “compartments” –“Classification” of data = (rank; compartments) –Compartments no longer hierarchical…

Military policy  Subjects given “clearance” –Expressed as (rank; compartments)  “Need to know” basis –Subject with clearance (r, C) can access object with classification (r’, C’) only if r  r’ and C’  C  Assumes a central “security officer” controlling designations