Download presentation
Presentation is loading. Please wait.
Published byJunior Horace Phillips Modified over 9 years ago
1
The SkyNet Virus Why It Is Unstoppable; How To Stop It By Marc Stiegler marcs@skyhunter.com
2
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Principle of Least Authority/Privilege POLA Thousands of years old
3
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 The Last POLA Violation Humanity Makes Congressman: If you activate SkyNet, it can destroy this supervirus, right? General Brewster: Yes…but while it is activated, it will control all our nuclear missiles. Congressman: But you will control SkyNet, right? General Brewster: [long, long pause]…Yes.
4
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Lip Service Firewalls Access Control Lists Certificates
5
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Every Application is Launched with Grossly Excessive Authority Universal Security Problem: Ambient Authority
6
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Ubiquitous Excess Authority Guarantees Abuse John Connor: General Brewster, SkyNet is the virus Yahoo Instant Messenger
7
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Solution: No Default Authority Only get granted authority by creators, invokers User Interface Disaster? Java Web Start, Proof By Disaster
8
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Solution’s Solution: Bundle Designation with Authority File Dialog Drag/Drop Etc.
9
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 The Golden Triangle Java Applets (impotent) Java Web Start Multi- level Security Virus Checkers Java Apps (insecure) You can have it all! (unusable)
10
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 POLA Inside the Application
11
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Object-Level Authority Bundling Granovetter Diagram Absolute Encapsulation Only source of authority Alice says: bob.foo(carol)
12
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Object POLA Boundaries: Almost Free Taken from “Capability Based Financial Instruments” Proceedings of Financial Cryptography ’00 Security Is Easy At Finest Grain, Hard Anywhere Else Digital Money with a Capability Secure Language in 1 page
13
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Trustworthy Programmers Do Not Mean Trustworthy Software
14
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Ubiquitous POLA Means Trustworthy Software
15
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Economic Proof Of Unstoppability Ross Anderson Fix 95/100 security bugs, cracker who finds only 10 bugs still gets one you missed Correct for conventional security regimes (perimeter security model) False! For Ubiquitous POLA Defense In Depth
16
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Sara Connor: No Fate Except What We Make “It is unthinkable that another thirty years will go by without one of two occurrences: either there will be horrific cyber disasters…or the available technology will be delivered…in products that provide effective security.” --Karger&Schell References: http://www.erights.org http://www.skyhunter.com/marc.html http://www.combex.com
17
Marc Stiegler – http://www.combex.com -- marcs@combex.com – (928) 279-6869 Demo
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.