security assurance for web device apis
play

Security Assurance for Web Device APIs Maritza Johnson and Steven M. - PowerPoint PPT Presentation

Security Assurance for Web Device APIs Maritza Johnson and Steven M. Bellovin http://www.cs.columbia.edu/~ { maritzaj,smb } Columbia University December 9, 2008 1 / 7 The Problem Web servers want access to very sensitive The Problem


  1. Security Assurance for Web Device APIs Maritza Johnson and Steven M. Bellovin http://www.cs.columbia.edu/~ { maritzaj,smb } Columbia University December 9, 2008 1 / 7

  2. The Problem Web servers want access to very sensitive The Problem ■ Usability Principles devices Isolation Principles Device Categories High-Assurance There is a history of trouble in this space ■ Implementation Failures. . . We need a high-assurance guarantee that the ■ implementation is correct We need a high-assurance guarantee that the ■ user understands what is happening What are the design principles for any API ■ spec, given that we cannot rely on bug-free code or bug-free users? 2 / 7

  3. Usability Principles 1. The Problem The user must explicitly authorize any and all Usability Principles Isolation Principles accesses to devices Device Categories High-Assurance Implementation Failures. . . 3 / 7

  4. Usability Principles 1. The Problem The user must explicitly authorize any and all Usability Principles Isolation Principles accesses to devices Device Categories High-Assurance Permission request cannot be generated Implementation Failures. . . implicitly; users ignore warnings and click through pop-up boxes 3 / 7

  5. Usability Principles 1. The Problem The user must explicitly authorize any and all Usability Principles Isolation Principles accesses to devices Device Categories High-Assurance Permission request cannot be generated Implementation Failures. . . implicitly; users ignore warnings and click through pop-up boxes 2. The user must understand the consequences of any change 3 / 7

  6. Usability Principles 1. The Problem The user must explicitly authorize any and all Usability Principles Isolation Principles accesses to devices Device Categories High-Assurance Permission request cannot be generated Implementation Failures. . . implicitly; users ignore warnings and click through pop-up boxes 2. The user must understand the consequences of any change Stream receive must be at same host as permission request; requests cannot come from IFRAMEs unless the URLs match 3 / 7

  7. Usability Principles 1. The Problem The user must explicitly authorize any and all Usability Principles Isolation Principles accesses to devices Device Categories High-Assurance Permission request cannot be generated Implementation Failures. . . implicitly; users ignore warnings and click through pop-up boxes 2. The user must understand the consequences of any change Stream receive must be at same host as permission request; requests cannot come from IFRAMEs unless the URLs match 3. The state of the system must be visible at all times 3 / 7

  8. Usability Principles 1. The Problem The user must explicitly authorize any and all Usability Principles Isolation Principles accesses to devices Device Categories High-Assurance Permission request cannot be generated Implementation Failures. . . implicitly; users ignore warnings and click through pop-up boxes 2. The user must understand the consequences of any change Stream receive must be at same host as permission request; requests cannot come from IFRAMEs unless the URLs match 3. The state of the system must be visible at all times User must see what access is authorized 3 / 7

  9. Isolation Principles The Problem Must give implementors (and users) confidence ■ Usability Principles Isolation Principles that the system will behave properly Device Categories High-Assurance Secure across software upgrades ■ Implementation Failures. . . Secure against new, unforeseen devices ■ System must “fail secure” ■ 4 / 7

  10. Device Categories Devise categories: physical world , The Problem ■ Usability Principles privacy , etc. Isolation Principles Device Categories High-Assurance Assign each device to a category ■ Implementation Failures. . . New devices must be in a category to be used; ■ forces a decision Grant or withhold permission based on at least ■ category; simplifies user decision process 5 / 7

  11. High-Assurance Implementation The Problem (Unix-style solution; Windows is similar) ■ Usability Principles Isolation Principles Create a group for each category; assign ■ Device Categories High-Assurance devices to the proper group with permission Implementation Failures. . . 060 (group read/write; no others) To enable a � category,device � , create a setgid ■ program executable by only that user but setgid to the category’s group No page interpretation failure can access an ■ unauthorized device (though erroneous web pages can) 6 / 7

  12. Failures. . . The Problem Usability Principles Isolation Principles Device Categories High-Assurance Implementation Failures. . . 7 / 7

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend