Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Similar presentations


Presentation on theme: "Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing."— Presentation transcript:

1 Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing

2 Authentication

3 Passwords and Passphrases “What you are” Passphrases can be turned into passwords: – “We go to Maine every summer for hiking” can be turned into the password “wg2m#Sfh” Dictionary attacks

4 Biometrics “What you are” Fingerprinting, face recognition, voice recognition, hand recognition and iris scans False Accept Rate (FAR) versus the False Reject Rate (FRR) Iris scans are most accurate, but not common Newer biometrics such as typing style

5 PRIVATE KEYS AND SECURITY TOKENS “What you have” Public-key and private key pairs Secure-ID hardware – Pseudo-random clock

6 False Positives and Negatives Excessive false positives lead to user circumventing the system False negatives compromise security Most systems are a tradeoff between the two

7 Types of Access Control

8 Access Control Matrix Columns are an Access Control List Rows are Capabilities

9 Reading Ch 4 Crytography Virtual Pipelines paper

10 Capability-Based Systems Replaces memory addresses with capabilities Uses hardware tags to implement – Tagged architectures are gaining new interest – Speculation and transactions use tags also


Download ppt "Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing."

Similar presentations


Ads by Google