版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
November25,2008Copyright?2008byJingshaHe1IntroductiontoInformationSecurityProf.JingshaHeSchoolofSoftwareEngineeringBeijingUniversityofTechnologyNovember25,20081Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe2FactoftheLectureQuantumcomputingisatheoreticalwayofusingthepropertiesofmatteratthequantummechanical(microscopic)levelinordertobuildcomputationalsystems.Quantumcomputerswouldnotworklikeordinarycomputers,butonawholenewprinciple.Ithasbeentheorizedthatquantumcomputerscouldbreakstandardencryptioncodesinafractionofasecond.Theraceisontobuildquantumcomputers.November25,20082Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe3PracticesInformationFlowAnalysisNovember25,20083Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe4Identification&AuthenticationEncryption&DecryptionAccessControlCEOIdentification&AuthenticationEncryption&DecryptionRegularEmployeeInformationFlowAuditingNovember25,20084Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe5InformationFlowPolicyAnyconfidentialityandintegritymodelembodiesaninformationflowpolicyThereisthustheneedforassurancethatinformationflowdoesn'tviolatetheconstraintsofsuchapolicyAccesscontrolcanconstraintherightsofauser,butnottheflowofinformationbetweensubjectsorobjectsThereisthustheneedformechanismsthatcontroltheflowofinformationinadditiontoaccesscontrolExampleIntheBell-LaPadulamodel,informationcanflowfromoneobjecttoanotherifandonlyifthesecondobjectdominatesthefirstNovember25,20085Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe6DefinitionofInformationFlowComponentsObjectxObjectySequenceofcommandsSDefinitionInformationflowsfromobjectxtoobjectyif,aftertheexecutionofthesequenceofcommandsS,thevalueinobjectyallowsonetodeducethevalueinobjectxNotationy←xxiscalledthesourceoftheinformationflowyiscalledthetargetoftheinformationflowNovember25,20086Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe7SecurityConstraintsonInformationFlowTheBell-LaPadulamodely←xissecureifandonlyifthesecuritylevelofydominatesthatofxNotationsx:securitylevelofx≥:dominate≤:dominatedbyy←xrequiresthaty
≥
x(orx
≤
y)November25,20087Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe8TypesofInformationFlowStronginformationflowy←xaccordingtothedefinitionValueofxdirectly/explicitlyaffectsthevalueofyy=f(x)f()isanarithmeticexpressionWeakinformationflowy←xaccordingtothedefinitionValueofxindirectly/implicitlyaffectsthevalueofyIf(f1(x))theny=f2(a)elseB=f3(b)f1(),f2()andf3()arearithmeticexpressionsaandbareobjects.November25,20088Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe9InformationFlowinProgramsProgramstatementsAssignmentstatementCompoundstatementConditionalstatementIterativestatementGotostatementProcedurecallFunctioncallInput/outputstatementNovember25,20089Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe10AssignmentStatementStatementy=f(x1,x2,…,xn)InformationflowsStronginformationflowsy←x1y←x2 ……y←xnWeakinformationflowsNoneSecurityrequirementlub(x1,x2,…xn)≤
yNovember25,200810Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe11ExampleofAssignmentStatementStatementa=b+c-dInformationflowsStronginformationflowsa←ba←ca←dWeakinformationflowsNoneSecurityrequirementlub(b,c,d)≤
aNovember25,200811Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe12CompoundStatementStatementbegin S1; …… Sn;end;InformationflowsAlltheinformationflowsinstatementSi,1≤i≤nSecurityrequirementS1issecure……SnissecureNovember25,200812Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe13ConditionalStatementStatementIff(x1,x2,…,xn)thenS1;else S2;end;InformationflowsAlltheinformationflowsincompoundstatementsS1andS2Weakinformationflowsy←x1,y←x2,…,y←xnyisthetargetofanassignmentstatementinS1andS2SecurityrequirementS1issecureS2issecurelub(x1,x2,…,xn)≤
glb(y)yisthetargetofanassignmentstatementinS1andS2November25,200813Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe14ExampleofConditionalStatementStatementIfx+y≤zthena=b;else c=b;end;InformationflowsStronginformationflowsa←b,c←bWeakinformationflowsa←x,a←y,a←zc←x,c←y,c←zSecurityrequirementb
≤
ab
≤
club(x,y,z)≤glb(a,c)November25,200814Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe15IterativeStatementStatementwhilef(x1,x2,…,xn)doS1;S2;InformationflowsAlltheinformationflowsincompoundstatementS1Weakinformationflowsy←x1,y←x2,…,y←xnyisthetargetofanassignmentstatementinS1Note:thestatementisrequiredtoterminateWhatifnot?Hint:whatistheconsequencetoS2?SecurityrequirementS1issecurelub(x1,x2,…,xn)≤
glb(y)yisthetargetofanassignmentstatementinS1November25,200815Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe16GotoStatementStatementiff(x1,x2,…,xn)thenS1;gotolabel;S2;label:S3;InformationflowsAlltheinformationflowsincompoundstatementsS1,S2,andS3Weakinformationflowsy←x1,y←x2,…,y←xnyisthetargetofanassignmentstatementinS1,S2andS3SecurityrequirementS1issecureS2issecureS3issecurelub(x1,x2,…,xn)≤
glb(y)yisthetargetofanassignmentstatementinS1,S2andS3November25,200816Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe17ProcedureCallStatementprocpname(i1,i2,…,im:int;varo1,o2,…,on:int);beginS;end;……pname(x1,x2,…,xm;y1,y2,…,yn);InformationflowsAlltheinformationflowsincompoundstatementSNote:intheabsenceofprocedurecalldetail,ok
←ij,1≤j≤m,1≤k≤nSecurityrequirementSissecureIfij
≤
ok,thenxj
≤
yk,1≤j≤m,1≤k≤nIfoj
≤
ok,thenyj
≤
yk,1≤j≤n,1≤k≤nNovember25,200817Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe18FunctionCallStatementintf(i1,i2,…,in:int);beginS;end;……y=f(x1,x2,…,xn);InformationflowsAlltheinformationflowsincompoundstatementSNote:intheabsenceoffunctioncalldetail,f()←ik,1≤k≤nSecurityrequirementSissecureIfik
≤
f(),thenxk
≤
y,1≤k≤nNovember25,200818Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe19Input/OutputStatementStatementcanbemodeledafteranassignmentstatementForaninputstatementSourcecanbeadevicenameobjectorafilenameobjectTargetcanbeafilenameobjectoraregularprogramvariableobjectForanoutputstatementSourcecanbeafilenameobjectoraregularprogramvariableobjectTargetcanbeadevicenameobjectorafilenameobjectNovember25,200819Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe20OtherInformationFlows(1)Arrayelementsy=a[i]Stronginformationflows:y←a[i],y←ia[i]=xStronginformationflows:a[i]←xInfiniteloopsandexceptionsy=0;while(x=0)doy=1;AnalysisIfx=0,theny=1andtheexecutionentersintoaninfiniteloop(andx
≤
ycouldbeenforcedtomeetsecurityrequirement)Ifx≠0,theny=0andtheexecutionterminates(butx
≤
ywouldnotbeenforced)Result:y←xNovember25,200820Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe21OtherInformationFlows(2)Pointers&y=&xStronginformationflows:&y←&xResultinginformationflows(x=z)?(y=z)x←z?y←z(y=z)?(x=z)y←z?x←zConsequenceTheaddressassignment(&y=&xor&x=&y)nowmakesxandythesameobjectfromtheviewpointofinformationflowsbecausethesamememory/storagecellisnowrepresentedbytwodifferentvariables/symbols,i.e.,xandyResult:y?xNovember25,200821Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe22ProgramSecurityCertificationofthesecurityofaprogramThestraightforwardmethodDetermineinformationflowsforeachtypeofstatementsbasedonthesemanticsofthestatementsCertifythesecurityofeachandeveryprogramstatementinasequentialorderIssuesItisalmostimpossibletodosoinastaticmannerIftrue,thenwhat?VariablesarenotalwaysequivalenttoobjectsLocalvariablesifalocalvariableisthetargetofaninformationflow,itssecuritylevelmustbesettothe“l(fā)ub”ofthesecuritylevelsofallthesourcesregardlessofitscurrentsecuritylevelNovember25,200822Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe23ConfinementProblemProblemstatementTopreventaservicefromleakinginformationthatisregardedasbeingconfidentialbytheuseroftheserviceProblemdomainInformationflowsthatviolatethepropertiesintheBell-LaPadulamodelInformationcanonlybeallowedtoflowupwardsaccordingtothemodelTotalconfinementIsolationCannotbeobservedbyothersCannotbeallowedtocommunicatewithothersVerydifficult,ifnotimpossibleResourcesharingDirectandindirectcommunicationNovember25,200823Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe24ExamplesInageneral-purposecomputersysteminwhichCPU,memory,diskspace,I/OsareallsharedresourcesforprocessesexecutingonbehalfoftheusersAusercandeducetheexecutionstatusofanotherprocessByobservingthespeedortheexecutionstatusofaprocessinitiatedbytheuserByaccessingadataiteminthememoryoronthediskintowhichtheotherprocessissupposedtowriteInacommunicationsysteminwhichservicesareprovidedinresponsetouserrequestsAusercandeducetheexecutionstatusofanotherprocessByrequestingaservicethattheotherprocessisknowntoalsouseByrequestingaserviceoverwhichtheotherprocessisknowntohavetheabilitytoinfluenceNovember25,200824Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe25LeakingofInformationPassiveAreceiveronly(inviolationofinformationflowpolicy)ExploringsystemsecurityflawsObservingthestatusorvalueofsystemstateIndirectlyinvokingandobservingcertainsystemoperationsbysettingtrueofthenecessaryconditionsActiveorcollaborativeBothasenderandareceiver(inviolationofinformationflowpolicy)ExploringsystemsecurityflawsSettingandobservingthestatusorvalueofsystemstateDirectlyinvokingandobservingcertainsystemoperationswithorwithoutsettingtrueofthenecessaryconditionsNovember25,200825Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe26CovertChannelsDefinitionApathofcommunicationthatisNOTdesignedtobeusedforcommunicationPropertiesAnactiveorcollaborativewayofleakinginformationSecuritychecksareusuallynotimposedNecessaryconditionsAsenderAreceiverResourcesharingTypesofcovertchannelsStorage(spatial)ResourceexhaustionchannelsEventcountingchannelsTiming(temporal)November25,200826Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe27ChannelClassificationsNoiselesscovertchannelsThesharedresourcethatisusedforinformationtransmissionisavailabletothesenderandthereceiveronlyInformationtransmittedthroughthechannelscomesonlyfromthesenderNoisycovertchannelsThesharedresourcethatisusedforinformationtransmissionisalsoavailabletootherusersorsubjectsinadditiontothesenderandthereceiverInformationtransmittedthroughthechannelsismixedtogetherwithmeaningless/uselessinformation(i.e.,thenoise)introducedduetoaccesstothesharedresourcebytheotherusersorsubjectsNovember25,200827Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe28StorageChannelsNecessaryconditionsResourcesharingBoththesendingandreceivingprocessesmusthaveaccesstothesameattributeofasharedresourceInformationsendingThesendingprocessmustbeabletomodifythatattributeofthesharedresourceInformationreceivingThereceivingprocessmustbeabletoreferencethatattributeofthesharedresourceSynchronizationorcoordinationTheremustexistamechanismforinitiatingboththesendingandthereceivingprocessesandforsynchronizing/sequencingtheiraccessestothatattributeofthesharedresourcebytheprocessesNovember25,200828Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe29ResourceExhaustionChannelsMechanismThroughexhaustingasharedresourceExampleSharedresource:memorySendingprocessTransmitting“1”:takingall(exhausting)theavailablememoryTransmitting“0”:leavingsomememoryforotherprocessestouseReceivingprocessReceiving“1”:requestingmemory,resultinginfailureReceiving“0”:requestingmemory,resultinginsuccessInformationistransmittedbythesendingprocesstothereceivingprocessonebitatatimeSpecialpropertiesTakingadvantageofthefactthatresourcesarelimitedandaresharedUsingtheboundaryconditiontoencodeinformationRelyingonthefactthatresourceexhaustionisaglobalstatusthatcanbeobservedbytherequestingprocessDuetotherealitythatusuallynosecuritychecksareimposedNovember25,200829Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe30EventCountingChannelsMechanismThroughmodifyingthevalueofasharedcounterExampleSharedresource:processIDSendingprocessTransmitting“1”:requestinganewprocessID,resultinginincrementtotheprocessIDcounterTransmitting“0”:leavingtheprocessIDcounteraloneReceivingprocessReceiving“1”:requestinganewprocessIDandobservingtheincrementReceiving“0”:requestinganewprocessIDandobservingacontinuousvalueInformationistransmittedbythesendingprocesstothereceivingprocessonebitatatimeSpecialpropertiesTakingadvantageofthefactthatcountervaluesareincrementallyassignedUsingtheincrementtoencodeinformationRelyingonthefactthatthevalueofasharedcounterisaglobalvalueDuetotherealitythatusuallynosecuritychecksareimposedNovember25,200830Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe31TimingChannelsNecessaryconditionsResourcesharingBoththesendingandreceivingprocessesmusthaveaccesstothesameattributeofasharedresourceReferenceoftimingBoththesendingandthereceivingprocessesmusthaveaccesstoacommontimereference,suchasatimer,areal-timeclock,ortheorderingofeventsInformationsendingandreceivingThesendingprocessmustbeabletocontrolthetimingofthedetectionofachangeintheattributebythereceivingprocessSynchronizationorcoordinationTheremustexistamechanismforinitiatingboththesendingandthereceivingprocessesandforsynchronizing/sequencingtheiraccessestothatattributeofthesharedresourcebytheprocessesNovember25,200831Copyright?2008byJingshaHeNovember25,2008Copyright?2008byJingshaHe32AnExampleofTimingChannelsMechanismThroughcontrollingtheexecutionofaprocessExampleSharedresource:CPUSharedtimereference:thesystemclockSendingprocessTransmitting“1”:requestingoneCPUslotforprocessexecutionTransmitting“0”:leavingtheCPUaloneReceivingprocessReceiving“1”:requestingoneCPUslotandobservingalongercompletiontimeReceiving“0”:requestingoneCPUslotandobservingashortercompletiontimeInformationistransmittedbythesendingprocesstothereceivingprocessonebitatatimeSpecialpropertiesTakingadvantageofthefactthatC
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年江蘇新高考化學(xué)試卷試題真題答案詳解(精校打印版)
- 福建師范大學(xué)《廣告文案寫作》2023-2024學(xué)年第一學(xué)期期末試卷
- 葡萄上果蠅的種類及防治措施
- 2024屆西藏日喀則區(qū)南木林高級中學(xué)高考數(shù)學(xué)試題模擬試卷(8)數(shù)學(xué)試題
- 幼兒教育課件教學(xué)課件
- 2024年永州客運(yùn)從業(yè)資格證理論考試題
- 2024年南平資格證客運(yùn)題庫
- 2024年銅仁客運(yùn)從業(yè)資格證理論考試答案
- 2024年青??瓦\(yùn)證考試模擬題及答案
- 2024年伊犁駕駛員客運(yùn)從業(yè)資格證模擬考試題
- 數(shù)字化系列研究之財(cái)務(wù)數(shù)智化篇:大型集團(tuán)企業(yè)財(cái)務(wù)管理的數(shù)智化
- 學(xué)生輟學(xué)勸返記錄表
- 學(xué)校秋季腹瀉知識講座
- 設(shè)立招投標(biāo)代理公司可行性研究報(bào)告
- 小學(xué)一年級禁毒教育
- PCBA工藝管制制程稽查表
- 小學(xué)書法大賽評價(jià)準(zhǔn)則與打分表
- 《朱蘭質(zhì)量手冊》課件
- 幼兒保育學(xué)前教育專業(yè)教師教學(xué)創(chuàng)新團(tuán)隊(duì)建設(shè)方案
- 2023年全球瘧疾報(bào)告
- 15D500-15D505 防雷與接地圖集(合訂本)
評論
0/150
提交評論