ECS 235B, Lecture 22
March 4, 2019
March 4, 2019 1 ECS 235B, Foundations of Computer and Information Security
ECS 235B, Lecture 22 March 4, 2019 March 4, 2019 ECS 235B, - - PowerPoint PPT Presentation
ECS 235B, Lecture 22 March 4, 2019 March 4, 2019 ECS 235B, Foundations of Computer and Information Security 1 Virtual Machine Program that simulates hardware of a machine Machine may be an existing, physical one or an abstract one
March 4, 2019
March 4, 2019 1 ECS 235B, Foundations of Computer and Information Security
hypervisor, to provide environment simulating target machine
March 4, 2019 2 ECS 235B, Foundations of Computer and Information Security
March 4, 2019 3 ECS 235B, Foundations of Computer and Information Security
disks
accordance with security policy
March 4, 2019 4 ECS 235B, Foundations of Computer and Information Security
March 4, 2019 5 ECS 235B, Foundations of Computer and Information Security
March 4, 2019 6 ECS 235B, Foundations of Computer and Information Security
unmodified guest operating systems and run in non-root operation mode
March 4, 2019 7 ECS 235B, Foundations of Computer and Information Security
March 4, 2019 8 ECS 235B, Foundations of Computer and Information Security
March 4, 2019 9 ECS 235B, Foundations of Computer and Information Security
instructions natively (no emulation)
program(s) contained in it
March 4, 2019 10 ECS 235B, Foundations of Computer and Information Security
software
levels of isolation using Linux kernel features
each assigned its own IP address
March 4, 2019 11 ECS 235B, Foundations of Computer and Information Security
than the VM
memory, or overwriting it
March 4, 2019 12 ECS 235B, Foundations of Computer and Information Security
functionality at the user level
as much flexibility as possible
co-ordination (like scheduling) -- runs in privileged mode
fault it loads new page mapping descriptor into Cache Kernel – runs in user mode
March 4, 2019 13 ECS 235B, Foundations of Computer and Information Security
like DirectX
virtualizing system resources
go through that interface
engines
March 4, 2019 14 ECS 235B, Foundations of Computer and Information Security
level of library OS
input, output between desktop and security monitor
protected mode (so writing to disk was unconstrainted, for example)
March 4, 2019 15 ECS 235B, Foundations of Computer and Information Security
security policy
March 4, 2019 16 ECS 235B, Foundations of Computer and Information Security
March 4, 2019 17 ECS 235B, Foundations of Computer and Information Security
March 4, 2019 18 ECS 235B, Foundations of Computer and Information Security
March 4, 2019 19 ECS 235B, Foundations of Computer and Information Security
# basic module basic # define subprocess environment variables putenv IFS=”\t\n “ PATH=/sbin:/bin:/usr/bin TZ=PST8PDT # deny access to everything except files under /usr path deny read,write * path allow read,write /usr/* # allow subprocess to read files in library directories # needed for dynamic loading path allow read /lib/* /usr/lib/* /usr/local/lib/* # needed so child can execute programs path allow read,exec /sbin/* /bin/* /usr/bin/*
March 4, 2019 20 ECS 235B, Foundations of Computer and Information Security
March 4, 2019 21 ECS 235B, Foundations of Computer and Information Security
Postscript engine
March 4, 2019 22 ECS 235B, Foundations of Computer and Information Security
underlying file
subset of rights in that capability
delegate rights to it
March 4, 2019 23 ECS 235B, Foundations of Computer and Information Security
those names are in global namespace)
March 4, 2019 24 ECS 235B, Foundations of Computer and Information Security
security policy
March 4, 2019 25 ECS 235B, Foundations of Computer and Information Security
constraints
functions, system calls to validate interactions
March 4, 2019 26 ECS 235B, Foundations of Computer and Information Security
segments
March 4, 2019 27 ECS 235B, Foundations of Computer and Information Security
virtual address
be in module’s segment
and wrap them so they are checked at run time
March 4, 2019 28 ECS 235B, Foundations of Computer and Information Security
modules rely on
them into system calls
code (ie, using RPC to that module)
March 4, 2019 29 ECS 235B, Foundations of Computer and Information Security
conform to security policy
March 4, 2019 30 ECS 235B, Foundations of Computer and Information Security
provides desired isolation
consistent
security properties
March 4, 2019 31 ECS 235B, Foundations of Computer and Information Security
constructs that can produce undefined results
pointer)
that it is a pointer of type t, points to object of type t in that memory area
arbitrary type (this is tagged with type of values currently in that area)
type rules
March 4, 2019 32 ECS 235B, Foundations of Computer and Information Security
(postconditions)
preconditions, predicate built from assembly language, and a check on postconditions
March 4, 2019 33 ECS 235B, Foundations of Computer and Information Security