9 research outputs found

    A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems

    Full text link
    We present a taxonomy and an algebra for attack patterns on component-based operating systems. In a multilevel security scenario, where isolation of partitions containing data at different security classifications is the primary security goal and security breaches are mainly defined as undesired disclosure or modification of classified data, strict control of information flows is the ultimate goal. In order to prevent undesired information flows, we provide a classification of information flow types in a component-based operating system and, by this, possible patterns to attack the system. The systematic consideration of informations flows reveals a specific type of operating system covert channel, the covert physical channel, which connects two former isolated partitions by emitting physical signals into the computer's environment and receiving them at another interface.Comment: 9 page

    Arquitectura de seguridad por capas en sistemas críticos

    Get PDF
    El rotundo avance de la tecnología nos presenta continuamente nuevas herramientas y facilidades para el desarrollo de sistemas electrónicos e informáticos, que permiten mejorar y/o complementar los procedimientos existentes en el campo militar. Por este motivo, es esencial identificar los posibles riesgos que estas tecnologías pueden acarrear, para así poder preparar a los sistemas críticos desarrollados en dicho ámbito para posibles contingencias. La presente investigación plantea la posibilidad de adaptar técnicas de la industria, más específicamente del área de seguridad informática y ciberdefensa, a los sistemas desarrollados por el Centro de Investigación y Desarrollo de Software Operacional (en adelante CIDESO), en el ámbito de los sistemas de propósito críticoa (tanto en el área de Comando y Control, como en la de apoyo en situación de catástrofe).Eje: Seguridad Informática.Red de Universidades con Carreras en Informática (RedUNCI

    Arquitectura de seguridad por capas en sistemas críticos

    Get PDF
    El rotundo avance de la tecnología nos presenta continuamente nuevas herramientas y facilidades para el desarrollo de sistemas electrónicos e informáticos, que permiten mejorar y/o complementar los procedimientos existentes en el campo militar. Por este motivo, es esencial identificar los posibles riesgos que estas tecnologías pueden acarrear, para así poder preparar a los sistemas críticos desarrollados en dicho ámbito para posibles contingencias. La presente investigación plantea la posibilidad de adaptar técnicas de la industria, más específicamente del área de seguridad informática y ciberdefensa, a los sistemas desarrollados por el Centro de Investigación y Desarrollo de Software Operacional (en adelante CIDESO), en el ámbito de los sistemas de propósito críticoa (tanto en el área de Comando y Control, como en la de apoyo en situación de catástrofe).Eje: Seguridad Informática.Red de Universidades con Carreras en Informática (RedUNCI

    A layered approach to simplified access control in virtualized systems

    No full text
    In this work, we show how the abstraction layer created by a hypervisor, or virtual machine monitor, can be leveraged to reduce the complexity of mandatory access control policies throughout the system. Policies governing access control decisions in today’s systems are complex and monolithic. Achieving strong security guarantees often means restricting usability across the entire system, which is a primary reason why mandatory access controls are rarely deployed. Our architecture uses a hypervisor and multiple virtual machines to decompose policies into multiple layers. This simplifies the policies and their enforcement, while minimizing the overall impact of security on the system. We show that the overhead of decomposing system policies into distinct policies for each layer can be negligible. Our initial implementation confirms that such layering leads to simpler security policies and enforcement mechanisms as well as a more robust layered trusted computing base. We hope that this work serves to start a dialog regarding the use of mandatory access controls within a hypervisor for both increasing security and improving manageability

    Techniques for Application-Aware Suitability Analysis of Access Control Systems

    Get PDF
    Access control, the process of selectively restricting access to a set of resources, is so fundamental to computer security that it has been called the field's traditional center of gravity. As such, a wide variety of systems have been proposed for representing, managing, and enforcing access control policies. Prior work on evaluating access control systems has primarily relied on relative expressiveness analysis, which proves that one system has greater capabilities than another. Although expressiveness is a meaningful basis for comparing access control systems, it does not consider the application in which the system will be deployed. Furthermore, expressiveness is not necessarily a useful way to rank systems; if two systems are expressive enough for a given application, little benefit is derived from choosing the one that has greater expressiveness. On the contrary, many of the concerns that arise when choosing an access control system can be negatively impacted by additional expressiveness: a system that is too complex is often harder to specify policies in, less efficient, or harder to reason about from the perspective of security guarantees. To address these shortcomings, we propose the access control suitability analysis problem, and present a series of techniques for solving it. Suitability analysis evaluates access control systems against the specific demands of the application within which they will be used, and considers a wide range of both expressiveness and ordered cost metrics. To conduct suitability analysis, we present a two-phase framework consisting of formal reductions for proving qualitative suitability and simulation techniques for evaluating quantitative suitability. In support of this framework we present a fine-grained lattice of reduction properties, as well as Portuno, a flexible simulation engine for conducting cost analysis of access control systems. We evaluate our framework formally, by proving that it satisfies a series of technical requirements, and practically, by presenting several case studies demonstrating its use in conducting analysis in realistic scenarios

    WICC 2017 : XIX Workshop de Investigadores en Ciencias de la Computación

    Get PDF
    Actas del XIX Workshop de Investigadores en Ciencias de la Computación (WICC 2017), realizado en el Instituto Tecnológico de Buenos Aires (ITBA), el 27 y 28 de abril de 2017.Red de Universidades con Carreras en Informática (RedUNCI
    corecore