A Framework for Enforcing Information Flow Policies Bhuvan Mital Secure Systems Laboratory, Stony Brook University A Thesis Presentation in Partial Fulfillment.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Hi-Fi: Collecting High-Fidelity Whole-System Provenance Devin J.Pohly 1, Stephen McLaughlin 1, Patrick McDaniel 1, Kevin Butler 2 1 Pennsylvania State.
Secure In-VM Monitoring Using Hardware Virtualization Monirul Sharif, Wenke Lee, Weidong Cui, and Andrea Lanzi Presented by Tyler Bletsch.
Department of Computer Science and Engineering University of Washington Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, Emin Gun Sirer, Marc E. Fiuczynski,
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
Deploying GMP Applications Scott Fry, Director of Professional Services.
PlanetLab Operating System support* *a work in progress.
Using Programmer-Written Compiler Extensions to Catch Security Holes Authors: Ken Ashcraft and Dawson Engler Presented by : Hong Chen CS590F 2/7/2007.
Title of Selected Paper: Design and Implementation of Secure Embedded Systems Based on Trustzone Authors: Yan-ling Xu, Wei Pan, Xin-guo Zhang Presented.
Preventing Theft of Quality of Service on Open Platforms Kwang-Hyun Baek and Sean W. Smith Department of Computer Science Dartmouth College
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
IT Infrastructure: Software September 18, LEARNING GOALS Identify the different types of systems software. Explain the main functions of operating.
Secure Off Site Backup at CERN Katrine Aam Svendsen.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
outline Purpose Design Implementation Market Conclusion presentation Outline.
Exokernel: An Operating System Architecture for Application-Level Resource Management Dawson R. Engler, M. Frans Kaashoek, and James O’Toole Jr. M.I.T.
1 Routing as a Service Karthik Lakshminarayanan (with Ion Stoica and Scott Shenker) Sahara/i3 retreat, January 2004.
CS4315A. Berrached:CMS:UHD1 Operating System Structures Chapter 3.
Alex Crowell, Rutgers University Computer Science and Mathematics Advisor: Prof. Danfeng Yao, Computer Science Department.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3 Operating System Organization.
1 RAKSHA: A FLEXIBLE ARCHITECTURE FOR SOFTWARE SECURITY Computer Systems Laboratory Stanford University Hari Kannan, Michael Dalton, Christos Kozyrakis.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
OWASP Mobile Top 10 Why They Matter and What We Can Do
Stack Management Each process/thread has two stacks  Kernel stack  User stack Stack pointer changes when exiting/entering the kernel Q: Why is this necessary?
Remote Support System in Medical Corporation Group 1.
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Introduction Overview Static analysis Memory analysis Kernel integrity checking Implementation and evaluation Limitations and future work Conclusions.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
3/16/2004Biba Model1 Biba Integrity Model Presented by: Nathan Balon Ishraq Thabet.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Operating System Support for Virtual Machines Samuel T. King, George W. Dunlap,Peter M.Chen Presented By, Rajesh 1 References [1] Virtual Machines: Supporting.
Yongzhi Wang, Jinpeng Wei VIAF: Verification-based Integrity Assurance Framework for MapReduce.
Secure & flexible monitoring of virtual machine University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Improving Network I/O Virtualization for Cloud Computing.
M A L W A R E C S 510 Paper Title : Practical Proactive Integrity Preservation: A Basis for Malware Defense Presenter : Abdulwahab.
1 Configurable Security for Scavenged Storage Systems NetSysLab The University of British Columbia Abdullah Gharaibeh with: Samer Al-Kiswany, Matei Ripeanu.
Master Thesis Defense Jan Fiedler 04/17/98
Selective Versioning in a Secure Disk System Swaminathan Sundararaman University of Wisconsin-Madison Gopalan Sivathanu Google Inc. Erez Zadok Stony Brook.
Ether: Malware Analysis via Hardware Virtualization Extensions Author: Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee Presenter: Yi Yang Presenter:
Optimizing UDP-based Protocol Implementations Yunhong Gu and Robert L. Grossman Presenter: Michal Sabala National Center for Data Mining.
Politecnico di Torino Dipartimento di Automatica ed Informatica TORSEC Group Performance of Xen’s Secured Virtual Networks Emanuele Cesena Paolo Carlo.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3.
Chapter 7 Securing Commercial Operating Systems. Chapter Overview Retrofitting Security into a Commercial OS History of Retrofitting Commercial OS's Commercial.
11 World-Leading Research with Real-World Impact! ZeroVM Backgroud Prosunjit Biswas Institute for Cyber Security University of Texas at San Antonio April.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
0 Penn State, NSRC Industry Day, Trent Jaeger – Past Projects and Results Linux Security –Aim to Build Measurable, High Integrity Linux Systems.
Operating Systems Security
Wireless and Mobile Security
Protecting The Kernel Data through Virtualization Technology BY VENKATA SAI PUNDAMALLI id :
1 Linux Security Module: General Security Support for the Linux Kernel Presented by Chao-Sheng Lin 2005/11/1.
SEDA. How We Got Here On Tuesday we were talking about Multics and Unix. Fast forward years. How has the OS (e.g., Linux) changed? Some of Multics.
Criticality Aware Smart Spaces T. Mukherjee Impact Lab ( Department of Computer Science & Engineering Ira A. Fulton School of Engineering.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Faculty of Computer Science Institute for System Architecture, Operating Systems Group Information Flow Control for Standard OS Abstractions Dresden,
Complexity Time: 2 Hours.
Operating System Structure
Chapter 4: Threads.
Bastion secure processor architecture
Operating Systems: A Modern Perspective, Chapter 3
Motivation and Problem Statement
Why Threads Are A Bad Idea (for most purposes)
Why Threads Are A Bad Idea (for most purposes)
Why Threads Are A Bad Idea (for most purposes)
Presentation transcript:

A Framework for Enforcing Information Flow Policies Bhuvan Mital Secure Systems Laboratory, Stony Brook University A Thesis Presentation in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science ADVISOR Prof. R.C. Sekar COMMITTEE Prof. Rob JohnsonProf. Scott Stoller

Outline of the presentation  Motivation for a new framework  Framework Design  Framework Implementation  Evaluation  Related Work  Conclusion  Future Work 2/24

Need for Information-Flow Techniques  Reactive approaches are ineffective  Code Encryption / Obfuscation evade Signature-based Scanning and Behavior Monitoring  Policy-based confinement is difficult  Policies are difficult to develop  Vulnerable to multi-step attacks  Mediation of writes alone is not the solution  Trojan Attack on Windows Vista Start Menu 3/24

Need for Information-Flow Techniques  The solution lies in mediating both reads and writes  Mediating read-downs and write-ups for Integrity Preservation.  Mediating read-ups and write-downs for Confidentiality Preservation. Information Flow Techniques can provide a solution 4/24

PPI's Information-Flow Approach  Premise of the PPI (Practical Proactive Integrity Preservation) approach  System Integrity is preserved as long as integrity-critical Objects (files, pipes, sockets, etc.) are not written by low-integrity Subjects (processes)‏  PPI thwarts malware and maintains flexibility 5/24

Challenge to Information Flow: Delayed Failures Editor opens file1 for writing 6/24

Editor reads file2 and gets downgraded Delayed Failures 7/24

Downgraded editor causes loss in usability Delayed Failures Solution : Make the application trusted Is Trusting all applications, a solution? 8/24

Motivation for a new Framework  Promote early failures to enhance usability  e.g. Deny opening a file for reading when a high integrity file is open in the editor.  Limit Trust  Only a few selected applications are Trusted.  Scalable and Flexible Design  Extensible Framework for enforcing policies for preserving Integrity as well as Confidentiality  Building a working model for a modern operating system  A scalable framework that adapts to a contemporary OS design 9/24

Basics about our framework  Built using the Linux Security Module (LSM) infrastructure  Entities in our framework  Objects : Files, pipes, sockets, IPC channels  Subjects : Processes  Handles : Indirection between objects and subjects  Labels : Abstract data-types for denoting object/subject integrity or confidentiality. current label: Basis for forward information flow min label: Basis for constraint propagation  Prevents undesirable downgrading 10/24

Tuple denotes Design of our framework  Promotes Early Failures by propagating Constraints 11/24

Design of our framework (contd.)‏  Trusting Applications  Some subjects can sanitize their inputs and must be trusted. e.g. ssh server trusted for all inputs on port 22 Input Validation: Integrity Model  Our Framework makes such subjects invulnerable Limits Trust by defining input invulnerability level 12/24

13/24

PPI Object Types : Some Examples  Symbolic Links  Have a context association  Attacker may create low integrity symlinks to a high integrity file  Solution : Virtually Downgrade Process  Named Pipes  Just like named files in the filesystem  Un-named Pipes  Special handling done in the framework for PPI Handle creation on Un-named pipes 14/24

Framework Implementation  Goals  Identifying the hooks for enforcement  Fitting the framework in the LSM infrastructure 15/24

Framework Implementation  Goals  Identifying the hooks for enforcement  Fitting the framework in the LSM infrastructure 16/24

Framework Implementation  Analysis of code flow. e.g. Task Exec 17/24

Framework Implementation  Analysis of code flow. e.g. Socket Accept 18/24

Framework Implementation  Key Challenges in mapping our framework to LSM  Hook selection  Overcoming the limitations of LSM  Example: No hook for mediating all sys_close events Problem of closing handles on objects by forked processes => stale handles in the system Solution: Validate handles before using them 19/24

Framework Evaluation  Test Setup  VMWare virtual machine with 2.6 GHz processor, 512MB RAM and 10 GB of free HD space  Implementation for Sockets / IPCs not complete  Full-System testing not done  Evaluation of Correctness  More than 50 use cases developed for testing  Our framework passes all tests  Evaluation of Performance  Testing with Core-Utils 6.10 standard test-suite passes all tests  Average overhead in CPU time : 30% 20/24

Framework Evaluation  Performance Graph (Limited testing for Core-Utils 6.10) 21/24

 Biba Integrity Model [ Biba '77]  Strict Model, enforces No read downs and No write ups  LOMAC [Fraser 2000]  Integrity Preservation for Linux by enforcing Low Watermark policy  Windows Vista  Only No write up policy, subject to indirect attacks  Back to the future [ACSAC 2006]  Only No read down policy, impact system availability  SELinux [Loscocco 2001]  Primary focus on servers, not safe to use for untrusted applications. Related Work 22/24

Conclusion  Our Framework Preserves Usability  Promote Early Failures by propagation constraint  Limits Trust  Invulnerability of applications can be restricted  Scalable and Flexible Design  Extensible Framework for enforcing policies for preserving Integrity as well as Confidentiality  Implementation of Label as an abstract data type  Our framework fits well into a contemporary OS  Current implementation uses the LSM framework 23/24

 Implementation to be completed for Sockets and IPC objects  Full system evaluation and benchmarking  Reducing the CPU time overhead by optimizations  Enforcing Confidentiality policies through the framework  Mapping the framework to other operating systems Future Work 24/24

Your Questions Please !!! 25/25

Thank you!!