Security & Privacy Research at Illinois (SPRAI)
Professor Adam Bates Fall 2018
Foundations II Professor Adam Bates Fall 2018 Security & - - PowerPoint PPT Presentation
CS 563 - Advanced Computer Security: Foundations II Professor Adam Bates Fall 2018 Security & Privacy Research at Illinois (SPRAI) Administrative Learning Objectives : Explore how the security of Multics failed in practice
Security & Privacy Research at Illinois (SPRAI)
Professor Adam Bates Fall 2018
CS423: Operating Systems Design
2
Learning Objectives:
Announcements:
Reminder: Please put away (backlit) devices at the start of class
2
Security & Privacy Research at Illinois (SPRAI)
3
Security & Privacy Research at Illinois (SPRAI) 4
MIT, General Electric, Bell Labs
Computer Conference (we read one of them).
paying customers; hundreds of accounts created.
at the Rome Air Development Center (RADC).
report in 1974.
Security & Privacy Research at Illinois (SPRAI)
5
Orange Book
machine monitors
Security & Privacy Research at Illinois (SPRAI)
6
systematic
Security & Privacy Research at Illinois (SPRAI)
7
against the MIT deployment.
Security & Privacy Research at Illinois (SPRAI)
8
security model, could violate reference monitor concept.
component failures.
reference to a second address (i.e., payload) bypasses access check on second address
Security & Privacy Research at Illinois (SPRAI)
9
How to attack?
permission
Result: access checks for third segment are ignored Root Cause: How was the error introduced? Motivate need for correctness to be verified Field modification by MIT personnel… why?
Security & Privacy Research at Illinois (SPRAI)
Origin of Vulnerability
protection rings; simulated in SW instead. “Solutions??”
“gatekeeper” that validates user-supplied arguments
certain argument type?
10
[Insufficient Argument Validation]
Result: No validation for second referent of argument pointers that containing an IDC* modifier. How to attack? Point second reference to an address only writable by ring 0! The fix was ad hoc, patching IDC’s but not the broader issue of input validation.
* “Increment Address, Decrement Tally, and Continue”
Security & Privacy Research at Illinois (SPRAI)
11
Origin of Vulnerability
“Solution??”
[Master Mode Transfer]
Be careful regarding the security impact of performance improvements
Security & Privacy Research at Illinois (SPRAI)
12
What did developers do wrong?
How to attack?
[Master Mode Transfer]
mode
signaler, but register can be modified by user (still in user’s ring) Be careful regarding the security impact of performance improvements
Security & Privacy Research at Illinois (SPRAI)
Origin of Vulnerability
responsible for pointing to the base of the current stack (sb); i.e., only Master Mode code could modify sb.
memory range for fault and interrupt handlers.
interpretive languages like Java?) “Solutions??”: Unlock stack base, then audit Ring 0 code to remove any old assumptions about a locked sb Hypothesis: The auditors missed a spot! How to attack? The mxerror routine contained an unaudited assumption of a locked sb… ultimately leads to arbitrary code execution in Ring 0.
13
[Unlocked Stack Base]
Security & Privacy Research at Illinois (SPRAI)
14
validation mechanism and its dependencies
Security & Privacy Research at Illinois (SPRAI)
15
programmers
Security & Privacy Research at Illinois (SPRAI)
16
be directly executed
data?
Security & Privacy Research at Illinois (SPRAI)
17
system as a whole
model’s design
(can find in IEEE Xplore)
Security & Privacy Research at Illinois (SPRAI)
18
Honeywell’s Secure Communications Processor (SCOMP)
Security & Privacy Research at Illinois (SPRAI)
19
Like Multics…
Security & Privacy Research at Illinois (SPRAI)
20
Unlike Multics…
hardware
procedural specification
Security & Privacy Research at Illinois (SPRAI)
21
Security & Privacy Research at Illinois (SPRAI)
22
Security & Privacy Research at Illinois (SPRAI)
23
SCOMP: Linux Security Modules:
LSM mediation occurs in software, not hardware. Affect on completeness?
Security & Privacy Research at Illinois (SPRAI)
24
process scheduling, interrupt management, auditing, and reference monitoring functions”
No! The kernel doesn’t even need to validate user arguments!
Security & Privacy Research at Illinois (SPRAI)
25
Security & Privacy Research at Illinois (SPRAI)
26
and I/O)
Security & Privacy Research at Illinois (SPRAI)
27
Verified?
Security & Privacy Research at Illinois (SPRAI)
28
methods
Security & Privacy Research at Illinois (SPRAI) 29
Why don’t we all use SCOMP-based systems now?
Security & Privacy Research at Illinois (SPRAI)
30
SCOMP??”
, Capsicum,
Virtual Machine Monitors like VAX VMM
Security & Privacy Research at Illinois (SPRAI)
31
Understanding classical security concepts will make your research better. Without foundational knowledge, you’ll spend your career just following shallow trends.