Title: Information Flow Control in the Asbestos Operating System
1Information Flow Control in theAsbestos
Operating System
- Petros Efstathopoulos Maxwell Krohn Steve
VanDeBogart - Cliff Frey David Ziegler Eddie Kohler David
Mazières - Frans Kaashoek Robert Morris
- UCLA MIT Stanford
- http//asbestos.cs.ucla.edu
2Asbestos project overview
- Goal operating system support to protect private
data - Initial implementation designed for Web servers
- Joint work with Stanford and UCLA
- Released as open source
- This talk ideas for using Asbestos on cell
phones
3The problem disclosure of private data
my password Visa 4510-2297-4519-8332 Jun 5
secret Nokia meeting
4Asbestos helps keep data private
www.evil.com
my password Visa 4510-2297-4519-8332 Jun 5
secret Nokia meeting
5Data privacy risks on cell-phones
- Personal and confidential data
- Credit cards, passwords, e-mail, calendar items
- Connection to the Internet
- Third-party applications, downloaded software
- Complex and potentially buggy software
6An example problem
Cell Phone / PDA
Calendar Manager
www.???.com
Calendar file
7Existing data privacy ideas
- Dont let downloaded code read files
- Dont let downloaded code use the network
- Trust only signed applications
- Ask the user
8Asbestos information flow control
Cell Phone / PDA
Calendar Manager
www.???.com
Calendar file
New Manager
9Asbestos labels
- Message-passing kernel
- Kernel enforces rules on message flow
- A compartment indicates the owner of private
data - A label is a set of compartments
- Each process, message, and file has a label
- Application sets policy by setting initial labels
- Kernel tracks message/label flow and enforces
policy
10Label rules
Process Two
Process One
Label
11Compartment creation and privilege
Process Two
Process One
Net Server
File Server
Label
12Compartment creation and privilege
Process Two
Process One
Net Server
File Server
Label
A privileged process can give away its privilege
for a compartment
13Privilege allows declassification
Process Two
Process One
Net Server
File Server
Label
No taint
14Default Network rejects all compartments
Process Two
Process One
Net Server
File Server
X
Label
15Calendar manager example
Net Server
Calendar Mgr
File Server
Label
16Create new compartment
Net Server
File Server
Calendar Mgr
Label
17Give privilege to file server
Net Server
File Server
Calendar Mgr
Label
18Drop privilege
Net Server
File Server
Calendar Mgr
Label
19Write the calendar file
Calendar File
Net Server
File Server
Calendar Mgr
Label
20User downloads new calendar manager
Calendar File
Net Server
New Mgr
File Server
Calendar Mgr
Label
21New manager can use network, files, c
New File
Net Server
New Mgr
File Server
Calendar Mgr
Label
22New manager is tainted if it reads calendar file
Calendar File
Net Server
New Mgr
File Server
Calendar Mgr
Label
23Tainted manager cannot use network
Calendar File
Net Server
New Mgr
File Server
Calendar Mgr
X
Label
24Can new manager exploit bugs in other apps?
Calendar File
Net Server
New Mgr
Instant Messgr
File Server
Calendar Mgr
OK
Label
25Labels prevent all disclosure, even indirect
Calendar File
Net Server
New Mgr
Instant Messgr
File Server
Calendar Mgr
X
OK
Label
26Accumulation of Taint
- Problem too much taint makes a program useless
- Service programs handle different tainted
applications data - A malicious application may break a service by
tainting it - Asbestos solutions
- Receive label indicates what taint a process is
willing to receive - Event processes are per-application services
(one per taint) - An application cant send a message without a
capability
27Asbestos status
- Complete x86 implementation for web server
- Porting to ARM-based PDA (nearly complete)
- Exploring cell-phone / PDA applications
- Extending labels to network server infrastructure
- Transfering Asbestos ideas to existing operating
systems
28Conclusions
- Asbestos helps protect private data
- Asbestos policies apply to data, not applications
- Calendar data cannot leave the device
- Result the policies are more likely to be secure
- Asbestos does not unnecessarily restrict
applications - Its safe to let downloaded apps use both network
and files - Result applications have more power and
flexibility - Asbestos helps with bugs as well as malicious
software