Software Security II - PowerPoint PPT Presentation

About This Presentation
Title:

Software Security II

Description:

The system should not place an undue burden on its users. Security criteria ... If the security system can be extended cleanly to remote method invocation, that ... – PowerPoint PPT presentation

Number of Views:13
Avg rating:3.0/5.0
Slides: 13
Provided by: CCS55
Category:

less

Transcript and Presenter's Notes

Title: Software Security II


1
Software Security II
  • Karl Lieberherr

2
What is Security
  • Enforcing a policy that describes rules for
    accessing resources.
  • Policy may be explicit or implicit. Better to use
    explicit policy.

3
Security Goals
  • Authentication
  • Who is it that is trying to do something to the
    what we want to protect.
  • URL authentication is yourFriendlyBank.com
    really a friendly bank?

4
Security Criteria
  • SALTZER, J. H., AND SCHROEDER, M. D. The
    protection of information in computer systems.
    Proceedings of the IEEE 63, 9 (Sept. 1975),
    1278-1308.

5
Security Criteria derived from Saltzer/Schroeder
  • Economy of mechanism
  • Designs which are smaller and simpler are
    easier to inspect and trust.
  • Fail-safe defaults
  • By default, access should be denied unless it
    is explicitly granted.
  • Complete mediation
  • Every access to every object should be
    checked.
  • Least privilege
  • Every program should operate with the
    minimum set of privileges necessary to do its
    job. This prevents accidental mistakes becoming
    security problems.

6
Security Criteria derived from Saltzer/Schroeder
  • Least common mechanism
  • Anything which is shared among different
    programs can be a path for communication and a
    potential security hole, so as little data as
    possible should be shared. (LoD)
  • Accountability
  • The system should be able to accurately
    record who'' is responsible for using a
    particular privilege.
  • Psychological acceptability
  • The system should not place an undue burden
    on its users.

7
Security criteria
  • Performance
  • We must consider how our designs constrain system
    performance. Security checks which must be
    performed at run-time will have performance
    costs.
  • Compatibility
  • We must consider the number and depth of changes
    necessary to integrate the security system with
    the existing Java virtual machine and standard
    libraries. Some changes may be impractical.
  • Remote calls
  • If the security system can be extended cleanly to
    remote method invocation, that would be a benefit
    for building secure, distributed systems.

8
Extra slides
9
Java Security at IBM Research(Larry Koved
manager)
  • Automating Security Analysis of Java Components
    and Programs
  • Invocation graphs

10
LoD and Security
  • Can execute software only if secret is known.
  • Secret consists of set of keys, one per class.
  • What is security policy? Each object only gets
    keys of its authenticated friends (who share the
    same concerns???).
  • What are the benefits of such a security policy?
    Compartmentalize?

11
LoD and security
12
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com