Security: Tanenbaum & Bo, Modern Operating Systems:4th Ed., (C) 2013 Prentice-Hall, Inc. All Rights Reserved
Security: Tanenbaum & Bo, Modern Operating Systems:4th Ed., (C) 2013 Prentice-Hall, Inc. All Rights Reserved
Chapter 9
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
The Security Environment
Threats
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Can We Build Secure Systems?
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Trusted Computing Base
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Protection Domains (1)
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Protection Domains (2)
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Protection Domains (3)
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Access Control Lists (1)
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Access Control Lists (2)
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Capabilities (1)
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Capabilities (3)
Examples of generic rights:
1.Copy capability: create new capability for same
object.
2.Copy object: create duplicate object with new
capability.
3.Remove capability: delete entry from C-list; object
unaffected.
4.Destroy object: permanently remove object and
capability.
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Formal Models of Secure Systems
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Bell-LaPadula Model
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Covert Channels (1)
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Steganography
Figure 9-14. (a) Three zebras and a tree. (b) Three zebras, a tree,
and the complete text of five plays by William Shakespeare.
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Basics of Cryptography
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Authentication (2)
Figure 9-17. (a) A successful login. (b) Login rejected after name is
entered. (c) Login rejected after name and password are typed.
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
UNIX Password Security
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Authentication Using a
Physical Object
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Authentication Using Biometrics
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Buffer Overflow Attacks
Figure 9-21. (a) Situation when the main program is running. (b) After
the procedure A has been called.
(c) Buffer overflow shown in gray.
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Avoiding Stack Canaries
Figure 9-22. Skipping the stack canary: by modifying len first, the attack is
able to bypass the canary and modify the return address directly.
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Code Reuse Attacks
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Command Injection Attacks
Figure 9-27. (a) Correct login screen. (b) Phony login screen.
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Executable Program Viruses (1)
Figure 9-29. (a) An executable program. (b) With a virus at the front. (c)
With a virus at the end. (d) With a virus spread over free space within
the program.
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Boot Sector Viruses
Figure 9-30. (a) After the virus has captured all the interrupt
and trap vectors. (b) After the operating system has retaken
the printer interrupt vector. (c) After the virus has noticed the
loss of the printer interrupt vector and recaptured it.
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Actions Taken by Spyware (1)
1. Change the browser’s home page.
2. Modify the browser’s list of favorite
(bookmarked) pages.
3. Add new toolbars to the browser.
4. Change the user’s default media player.
5. Change the user’s default search engine.
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Actions Taken by Spyware (2)
6. Add new icons to the Windows desktop.
7. Replace banner ads on Web pages with those
the spyware picks.
8. Put ads in the standard Windows dialog
boxes
9. Generate a continuous and unstoppable
stream of pop-up ads.
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Types of Rootkits (1)
Five kinds of rootkits – issue is where
do they hide?
1.Firmware rootkit
2.Hypervisor rootkit
3.Kernel rootkit
4.Library rootkit
5.Application rootkit
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Types of Rootkits (2)
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Firewalls
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Code Signing
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Model-Based Intrusion Detection
Figure 9-37. (a) A program. (b) System call graph for (a).
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Sandboxing
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Java Security (1)
Checks on applets include:
1.Does applet attempt to forge pointers?
2.Does it violate access restrictions on private-class
members?
3.Does it try to use variable of one type as another?
4.Does it generate stack overflows or underflows?
5.Does it illegally convert variables of one type to
another?
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.
Java Security (2)
Chapter 9
Tanenbaum & Bo, Modern Operating Systems:4th ed., (c) 2013 Prentice-Hall, Inc. All rights reserved.