lecture 15
play

Lecture #15 Noninterference Review notation Definition Security - PowerPoint PPT Presentation

Lecture #15 Noninterference Review notation Definition Security policy in these terms Unwinding theorem Example interpretation Dynamic policies Composition February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-1


  1. Lecture #15 • Noninterference – Review notation – Definition – Security policy in these terms – Unwinding theorem – Example interpretation – Dynamic policies – Composition February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-1 Matt Bishop, UC Davis

  2. Security Policy • Partitions systems into authorized, unauthorized states • Authorized states have no forbidden interferences • Hence a security policy is a set of noninterference assertions – See previous definition February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-2 Matt Bishop, UC Davis

  3. Alternative Development • System X is a set of protection domains D = { d 1 , …, d n } • When command c executed, it is executed in protection domain dom ( c ) • Give alternate versions of definitions shown previously February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-3 Matt Bishop, UC Davis

  4. Output-Consistency • c ∈ C , dom ( c ) ∈ D • ~ dom ( c ) equivalence relation on states of system X • ~ dom ( c ) output-consistent if σ a ~ dom ( c ) σ b ⇒ P ( c , σ a ) = P ( c , σ b ) • Intuition: states are output-consistent if for subjects in dom ( c ), projections of outputs for both states after c are the same February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-4 Matt Bishop, UC Davis

  5. Security Policy • D = { d 1 , …, d n }, d i a protection domain • r : D × D a reflexive relation • Then r defines a security policy • Intuition: defines how information can flow around a system – d i rd j means info can flow from d i to d j – d i rd i as info can flow within a domain February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-5 Matt Bishop, UC Davis

  6. Projection Function • π′ analogue of π , earlier • Commands, subjects absorbed into protection domains • d ∈ D , c ∈ C , c s ∈ C * • π′ d ( ν ) = ν • π′ d ( c s c ) = π′ d ( c s ) c if dom ( c ) rd • π′ d ( c s c ) = π′ d ( c s ) otherwise • Intuition: if executing c interferes with d , then c is visible; otherwise, as if c never executed February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-6 Matt Bishop, UC Davis

  7. Noninterference-Secure • System has set of protection domains D • System is noninterference-secure with respect to policy r if P *( c , T *( c s , σ 0 )) = P *( c , T *( π′ d ( c s ), σ 0 )) • Intuition: if executing c s causes the same transitions for subjects in domain d as does its projection with respect to domain d , then no information flows in violation of the policy February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-7 Matt Bishop, UC Davis

  8. Lemma • Let T *( c s , σ 0 ) ~ d T *( π′ d ( c s ), σ 0 ) for c ∈ C • If ~ d output-consistent, then system is noninterference-secure with respect to policy r February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-8 Matt Bishop, UC Davis

  9. Proof • d = dom ( c ) for c ∈ C • By definition of output-consistent, T *( c s , σ 0 ) ~ d T *( π′ d ( c s ), σ 0 ) implies P *( c , T *( c s , σ 0 )) = P *( c , T *( π′ d ( c s ), σ 0 )) • This is definition of noninterference-secure with respect to policy r February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-9 Matt Bishop, UC Davis

  10. Unwinding Theorem • Links security of sequences of state transition commands to security of individual state transition commands • Allows you to show a system design is ML secure by showing it matches specs from which certain lemmata derived – Says nothing about security of system, because of implementation, operation, etc . issues February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-10 Matt Bishop, UC Davis

  11. Locally Respects • r is a policy • System X locally respects r if dom ( c ) being noninterfering with d ∈ D implies σ a ~ d T ( c , σ a ) • Intuition: applying c under policy r to system X has no effect on domain d when X locally respects r February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-11 Matt Bishop, UC Davis

  12. Transition-Consistent • r policy, d ∈ D • If σ a ~ d σ b implies T ( c , σ a ) ~ d T ( c , σ b ), system X transition-consistent under r • Intuition: command c does not affect equivalence of states under policy r February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-12 Matt Bishop, UC Davis

  13. Lemma • c 1 , c 2 ∈ C , d ∈ D • For policy r , dom ( c 1 ) rd and dom ( c 2 ) rd • Then T *( c 1 c 2 , σ ) = T ( c 1 , T ( c 2 , σ )) = T ( c 2 , T ( c 1 , σ )) • Intuition: if info can flow from domains of commands into d , then order doesn’t affect result of applying commands February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-13 Matt Bishop, UC Davis

  14. Theorem • r policy, X system that is output consistent, transition consistent, locally respects r • X noninterference-secure with respect to policy r • Significance: basis for analyzing systems claiming to enforce noninterference policy – Establish conditions of theorem for particular set of commands, states with respect to some policy, set of protection domains – Noninterference security with respect to r follows February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-14 Matt Bishop, UC Davis

  15. Proof • Must show σ a ~ d σ b implies T *( c s , σ a ) ~ d T *( π′ d ( c s ), σ b ) • Induct on length of c s • Basis: c s = ν , so T*( c s , σ ) = σ ; π′ d ( ν ) = ν ; claim holds • Hypothesis: c s = c 1 … c n ; then claim holds February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-15 Matt Bishop, UC Davis

  16. Induction Step • Consider c s c n +1 . Assume σ a ~ d σ b and look at T *( π′ d ( c s c n +1 ), σ b ) • 2 cases: – dom ( c n +1 ) rd holds – dom ( c n +1 ) rd does not hold February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-16 Matt Bishop, UC Davis

  17. dom ( c n +1 ) rd Holds T *( π′ d ( c s c n +1 ), σ b ) = T *( π′ d ( c s ) c n +1 , σ b ) = T ( c n +1 , T *( π′ d ( c s ), σ b )) – by definition of T * and π′ d • T ( c n +1 , σ a ) ~ d T ( c n +1 , σ b ) – as X transition-consistent and σ a ~ d σ b • T ( c n +1 , T* ( c s , σ a ))~ d T ( c n +1 , T *( π′ d ( c s ), σ b )) – by transition-consistency and IH February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-17 Matt Bishop, UC Davis

  18. dom ( c n +1 ) rd Holds T ( c n +1 , T* ( c s , σ a ))~ d T ( c n +1 , T *( π′ d ( c s ) c n +1 , σ b )) – by substitution from earlier equality T ( c n +1 , T* ( c s , σ a ))~ d T ( c n +1 , T *( π′ d ( c s ) c n +1 , σ b )) – by definition of T * • proving hypothesis February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-18 Matt Bishop, UC Davis

  19. dom ( c n +1 ) rd Does Not Hold T *( π′ d ( c s c n +1 ), σ b ) = T *( π′ d ( c s ), σ b ) – by definition of π′ d T *( c s , σ b ) = T *( π′ d ( c s c n +1 ), σ b ) – by above and IH T ( c n +1 , T *( c s , σ a )) ~ d T *( c s , σ a ) – as X locally respects r , so σ ~ d T ( c n +1 , σ ) for any σ T ( c n +1 , T* ( c s , σ a ))~ d T ( c n +1 , T *( π′ d ( c s ) c n +1 , σ b )) – substituting back • proving hypothesis February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-19 Matt Bishop, UC Davis

  20. Finishing Proof • Take σ a = σ b = σ 0 , so from claim proved by induction, T *( c s , σ 0 ) ~ d T *( π′ d ( c s ), σ 0 ) • By previous lemma, as X (and so ~ d ) output consistent, then X is noninterference-secure with respect to policy r February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-20 Matt Bishop, UC Davis

  21. Access Control Matrix • Example of interpretation • Given: access control information • Question: are given conditions enough to provide noninterference security? • Assume: system in a particular state – Encapsulates values in ACM February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-21 Matt Bishop, UC Davis

  22. ACM Model • Objects L = { l 1 , …, l m } – Locations in memory • Values V = { v 1 , …, v n } – Values that L can assume • Set of states Σ = { σ 1 , …, σ k } • Set of protection domains D = { d 1 , …, d j } February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-22 Matt Bishop, UC Davis

  23. Functions • value : L ×Σ→ V – returns value v stored in location l when system in state σ • read : D → 2 V – returns set of objects observable from domain d • write : D → 2 V – returns set of objects observable from domain d February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-23 Matt Bishop, UC Davis

  24. Interpretation of ACM • Functions represent ACM – Subject s in domain d , object o – r ∈ A [ s , o ] if o ∈ read ( d ) – w ∈ A [ s , o ] if o ∈ write ( d ) • Equivalence relation: [ σ a ~ dom ( c ) σ b ] ⇔ [ ∀ l i ∈ read ( d ) [ value ( l i , σ a ) = value ( l i , σ b ) ] ] – You can read the exactly the same locations in both states February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-24 Matt Bishop, UC Davis

  25. Enforcing Policy r • 5 requirements – 3 general ones describing dependence of commands on rights over input and output • Hold for all ACMs and policies – 2 that are specific to some security policies • Hold for most policies February 23, 2009 ECS 235B, Winter Quarter 2009 Slide #15-25 Matt Bishop, UC Davis

Recommend


More recommend