lecture 15
play

Lecture #15 Noninterference Review notation Definition Security - PowerPoint PPT Presentation

Lecture #15 Noninterference Review notation Definition Security policy in these terms Unwinding theorem Example interpretation Dynamic policies Composition February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-1


  1. Lecture #15 • Noninterference – Review notation – Definition – Security policy in these terms – Unwinding theorem – Example interpretation – Dynamic policies – Composition February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-1 Matt Bishop, UC Davis

  2. Security Policy • Partitions systems into authorized, unauthorized states • Authorized states have no forbidden interferences • Hence a security policy is a set of noninterference assertions – See previous definition February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-2 Matt Bishop, UC Davis

  3. Alternative Development • System X is a set of protection domains D = { d 1 , …, d n } • When command c executed, it is executed in protection domain dom ( c ) • Give alternate versions of definitions shown previously February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-3 Matt Bishop, UC Davis

  4. Output-Consistency • c ∈ C , dom ( c ) ∈ D • ~ dom ( c ) equivalence relation on states of system X • ~ dom ( c ) output-consistent if σ a ~ dom ( c ) σ b ⇒ P ( c , σ a ) = P ( c , σ b ) • Intuition: states are output-consistent if for subjects in dom ( c ), projections of outputs for both states after c are the same February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-4 Matt Bishop, UC Davis

  5. Security Policy • D = { d 1 , …, d n }, d i a protection domain • r : D × D a reflexive relation • Then r defines a security policy • Intuition: defines how information can flow around a system – d i rd j means info can flow from d i to d j – d i rd i as info can flow within a domain February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-5 Matt Bishop, UC Davis

  6. Projection Function • π′ analogue of π , earlier • Commands, subjects absorbed into protection domains • d ∈ D , c ∈ C , c s ∈ C * • π′ d ( ν ) = ν • π′ d ( c s c ) = π′ d ( c s ) c if dom ( c ) rd • π′ d ( c s c ) = π′ d ( c s ) otherwise • Intuition: if executing c interferes with d , then c is visible; otherwise, as if c never executed February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-6 Matt Bishop, UC Davis

  7. Noninterference-Secure • System has set of protection domains D • System is noninterference-secure with respect to policy r if P *( c , T *( c s , σ 0 )) = P *( c , T *( π′ d ( c s ), σ 0 )) • Intuition: if executing c s causes the same transitions for subjects in domain d as does its projection with respect to domain d , then no information flows in violation of the policy February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-7 Matt Bishop, UC Davis

  8. Lemma • Let T *( c s , σ 0 ) ~ d T *( π′ d ( c s ), σ 0 ) for c ∈ C • If ~ d output-consistent, then system is noninterference-secure with respect to policy r February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-8 Matt Bishop, UC Davis

  9. Proof • d = dom ( c ) for c ∈ C • By definition of output-consistent, T *( c s , σ 0 ) ~ d T *( π′ d ( c s ), σ 0 ) implies P *( c , T *( c s , σ 0 )) = P *( c , T *( π′ d ( c s ), σ 0 )) • This is definition of noninterference-secure with respect to policy r February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-9 Matt Bishop, UC Davis

  10. Unwinding Theorem • Links security of sequences of state transition commands to security of individual state transition commands • Allows you to show a system design is ML secure by showing it matches specs from which certain lemmata derived – Says nothing about security of system, because of implementation, operation, etc . issues February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-10 Matt Bishop, UC Davis

  11. Locally Respects • r is a policy • System X locally respects r if dom ( c ) being noninterfering with d ∈ D implies σ a ~ d T ( c , σ a ) • Intuition: applying c under policy r to system X has no effect on domain d when X locally respects r February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-11 Matt Bishop, UC Davis

  12. Transition-Consistent • r policy, d ∈ D • If σ a ~ d σ b implies T ( c , σ a ) ~ d T ( c , σ b ), system X transition-consistent under r • Intuition: command c does not affect equivalence of states under policy r February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-12 Matt Bishop, UC Davis

  13. Lemma • c 1 , c 2 ∈ C , d ∈ D • For policy r , dom ( c 1 ) rd and dom ( c 2 ) rd • Then T *( c 1 c 2 , σ ) = T ( c 1 , T ( c 2 , σ )) = T ( c 2 , T ( c 1 , σ )) • Intuition: if info can flow from domains of commands into d , then order doesn’t affect result of applying commands February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-13 Matt Bishop, UC Davis

  14. Theorem • r policy, X system that is output consistent, transition consistent, locally respects r • X noninterference-secure with respect to policy r • Significance: basis for analyzing systems claiming to enforce noninterference policy – Establish conditions of theorem for particular set of commands, states with respect to some policy, set of protection domains – Noninterference security with respect to r follows February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-14 Matt Bishop, UC Davis

  15. Proof • Must show σ a ~ d σ b implies T *( c s , σ a ) ~ d T *( π′ d ( c s ), σ b ) • Induct on length of c s • Basis: c s = ν , so T*( c s , σ ) = σ ; π′ d ( ν ) = ν ; claim holds • Hypothesis: c s = c 1 … c n ; then claim holds February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-15 Matt Bishop, UC Davis

  16. Induction Step • Consider c s c n +1 . Assume σ a ~ d σ b and look at T *( π′ d ( c s c n +1 ), σ b ) • 2 cases: – dom ( c n +1 ) rd holds – dom ( c n +1 ) rd does not hold February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-16 Matt Bishop, UC Davis

  17. dom ( c n +1 ) rd Holds T *( π′ d ( c s c n +1 ), σ b ) = T *( π′ d ( c s ) c n +1 , σ b ) = T ( c n +1 , T *( π′ d ( c s ), σ b )) – by definition of T * and π′ d • T ( c n +1 , σ a ) ~ d T ( c n +1 , σ b ) – as X transition-consistent and σ a ~ d σ b • T ( c n +1 , T* ( c s , σ a ))~ d T ( c n +1 , T *( π′ d ( c s ), σ b )) – by transition-consistency and IH February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-17 Matt Bishop, UC Davis

  18. dom ( c n +1 ) rd Holds T ( c n +1 , T* ( c s , σ a ))~ d T ( c n +1 , T *( π′ d ( c s ) c n +1 , σ b )) – by substitution from earlier equality T ( c n +1 , T* ( c s , σ a ))~ d T ( c n +1 , T *( π′ d ( c s ) c n +1 , σ b )) – by definition of T * • proving hypothesis February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-18 Matt Bishop, UC Davis

  19. dom ( c n +1 ) rd Does Not Hold T *( π′ d ( c s c n +1 ), σ b ) = T *( π′ d ( c s ), σ b ) – by definition of π′ d T *( c s , σ b ) = T *( π′ d ( c s c n +1 ), σ b ) – by above and IH T ( c n +1 , T *( c s , σ a )) ~ d T *( c s , σ a ) – as X locally respects r , so σ ~ d T ( c n +1 , σ ) for any σ T ( c n +1 , T* ( c s , σ a ))~ d T ( c n +1 , T *( π′ d ( c s ) c n +1 , σ b )) – substituting back • proving hypothesis February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-19 Matt Bishop, UC Davis

  20. Finishing Proof • Take σ a = σ b = σ 0 , so from claim proved by induction, T *( c s , σ 0 ) ~ d T *( π′ d ( c s ), σ 0 ) • By previous lemma, as X (and so ~ d ) output consistent, then X is noninterference-secure with respect to policy r February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-20 Matt Bishop, UC Davis

  21. Access Control Matrix • Example of interpretation • Given: access control information • Question: are given conditions enough to provide noninterference security? • Assume: system in a particular state – Encapsulates values in ACM February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-21 Matt Bishop, UC Davis

  22. ACM Model • Objects L = { l 1 , …, l m } – Locations in memory • Values V = { v 1 , …, v n } – Values that L can assume • Set of states Σ = { σ 1 , …, σ k } • Set of protection domains D = { d 1 , …, d j } February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-22 Matt Bishop, UC Davis

  23. Functions • value : L ×Σ→ V – returns value v stored in location l when system in state σ • read : D → 2 V – returns set of objects observable from domain d • write : D → 2 V – returns set of objects observable from domain d February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-23 Matt Bishop, UC Davis

  24. Interpretation of ACM • Functions represent ACM – Subject s in domain d , object o – r ∈ A [ s , o ] if o ∈ read ( d ) – w ∈ A [ s , o ] if o ∈ write ( d ) • Equivalence relation: [ σ a ~ dom ( c ) σ b ] ⇔ [ ∀ l i ∈ read ( d ) [ value ( l i , σ a ) = value ( l i , σ b ) ] ] – You can read the exactly the same locations in both states February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-24 Matt Bishop, UC Davis

  25. Enforcing Policy r • 5 requirements – 3 general ones describing dependence of commands on rights over input and output • Hold for all ACMs and policies – 2 that are specific to some security policies • Hold for most policies February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-25 Matt Bishop, UC Davis

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend