Outline for May 15, 2013
Reding
: §16.3–16.4, 17.1–17.2, 33
Due
: Homework #4, due May 24, 2013
Compiler-based flow mechanisms
Procedure calls
Exceptions and infinite loops
Semaphores
Cobegin/coend
Soundness
Execution-based flow mechanisms
Fenton’s Data Mark Machine
Variable classes
Examples
Security pipeline interface
Secure network server mail guard
Confinement problem
What it is
Covert channels
Rule of transitive confinement
Difficulty of preventing leaking
Isolation: virtual machines
What it is
Example: KVM/370
Example: VAX/VMM
Isolation: sandboxes
What it is
Adding mechanisms to libraries or kernel
Modify program or process to be executed
Example: Janus
Covert channels
Storage vs. timing
Noise vs. noiseless
Existence
Bandwidth
Covert channel detection
Noninterference
Shared Resource Matrix Model
Information ßow analysis
Covert ßow trees
You can also obtain a PDF version of this.
Version of May 14, 2013 at 6:12PM