Advanced Systems Security: Future

Similar documents
Doing more with Views. Creating an inline menu

DESIGN GUIDELINES. Use the following slides as a guide to make sure your presentation follows the PCS Plus brand.

UVic Senior s Program: Microsoft Word

Map Me To ZERO Waste. Putthisak Panomsarnnarin. Thammasat University.

Technical Document Authoring and

Digital Signature. Content. Ref Introduction. 2. Settings and result

KNOWLEDGE CENTER SERVICE. Customization Guide

This is an H1 Header. This is an H2 Header. This is an H3 Header

CASE EXPLORER - INSTALLATION GUIDE. Doc

Elaine Torres/Jeremy Henderson/Edward Bangs

KIDS BEDROOMS SHOP NOW -00% NEW. Item Name & Description $00 $00 -00% NEW. Item Name & Description $00 $00 NEW COLLECTIONS SHOP NOW!

Visual Identity Guideline

Advanced Systems Security: Principles

Typography & vertical rhythm. Typeface: Roboto Baseline: Aligned to 7px grid

3. Graphic Charter / 3.5 Web design

Business Applications Page Format

[ ] corporate brand guide brought to you from the minds at:

An easy way to create a website for scientific software project

BRAND Guide. EuropeActive LOGOS

brand rationale logo colour typography graphics & images GREEN BISHOP BRAND IDENTITY GUIDELINES

2 December NCFE Corporate Guidelines. Introduction

High Performance Auto Layout

ANNEX VIII.2 New dangerous substances website. Safety and health at work is everyone s concern. It s good for you. It s good for business.

Design Templates & Guides

HTML for D3. Visweek d3 workshop

Case Study: Gut Check App

Typography is the art and technique of arranging type in order to make language visible.

5.0 The dash. A unique and critical part of our visual system. Tyson Foods Brand Guidelines June 30, 2017 V

Installation Guide and User Manual

ElasticIntel. Scalable Threat Intel Aggregation in AWS

PromiseShip Style Guide

Business Partner Program Statement of Work Guidelines

01 The logo design. Our logo is the touchstone of our brand and one of the most valuable assets. We must. Designed by KING DESIGN

Username. Password. Forgot your password? Sign in. Register as new user

howtomarketing VISUAL IDENTITY In this section 30/04/ MY PR plus 1

COMCAS 2015 Author Instructions for Full Manuscript Submission

Brand Guidelines. April acplus.com

Blackfoot Brand Playbook

Advanced Systems Security: Principles

ZAYED UNIVERSITY BRAND GUIDELINES. Version 1 Oct 2018

HARBORTOUCH STYLE GUIDE

In the ancient Indian language of Sanskrit, Sewa means selfless service.

Chapter 3 CSS for Layout

Advanced Systems Security: Ordinary Operating Systems

Brand Guidelines. Brand Guidelines V1.2 May 21, 2018

Operating System Security: Building Secure Distributed Systems

CONTENT STRATEGY: What s Real, What s Relevant. Kristina Halvorson Web 2.0 Expo San Francisco

Translation features of SharePoint Will they make your site useful or hilarious? Martin Laplante, CTO IceFire Studios

LECTURE 6 Scanning Part 2

Comparing traps, attractants and other mosquito sampling methods using the Latin Square Design

CSA Website Ad Specifications

Thinking inside the box

INTRODUCTION. As GRADED brand user, you are also responsible for preserving that image. We count on your cooperation in this process.

Control-flow Statements

#BDOG2018. Taglines, Hashtags And More. Spice Up Your Messaging. Digital Sharing. Questions? Comments?

The Internet of Things. Presenter: John Balk

Welcome to Consentz. Click the Consentz App icon on your ipad to proceed. Consentz Login. Enter your username and password to continue

Introduction to MVC 1.0

Styling of Controls Framework

IDM 221. Web Design I. IDM 221: Web Authoring I 1

The CSS Box Model. Motivation. CSS Box Model. CSE 190 M (Web Programming), Spring 2008 University of Washington

I'm losing the battle to increase the number of HP servers at the site I'm on.

BOOTSTRAP GRID SYSTEM

STOCKHOLM BEAMER THEME

Multi-Party Channels in the UTXO Model

HTML. UC Berkeley Graduate School of Journalism

Brand Guidelines Clarity Coverdale Fury

Topics in Systems and Program Security

"A wireframe is a grayscale block diagram that illustrates the overall navigation and the blocks of elements such as content, functionality, etc.

GRAPHIC PROFILE. version

Manual ODIP Content Management System Version 1.0 February 2013

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed eiusmod tempor incididunt ut labore et dolore magna - ali qua. Ut enim ad minim veniam,

White Paper SIMPLE USER EXPERIENCE BEST PRACTICES THAT MAKE 10YOUR WEBSITE DESIGN 100% MORE POWERFUL

graceland-core Documentation

15. Recursion 2. Motivation: Calculator. Naive Attempt (without Parentheses) Analyzing the Problem (15 7 3) = Input * 3 = Result 15

Presentation title placeholder, can be two lines Presentation subtitle placeholder. Date placeholder

Brand Guidelines CONTENTS. About these guidelines...2. Logo usage...3. Color palette...6. Fonts...7. Additional design elements...

SUMMARY OF DESIGN CHOICES

Upgrade Your View of the Web with Browser Extensions

More CSS. <link href="filename" type="text/css" rel="stylesheet" /> CS380

Mobotix & Wavestore. Close Integration. Latest Features and Capabilities. Introduction

Ad Spec Guidelines

DESIGNPRINCIPPER FANG FORTÆLLINGEN

AMAZING ALBANY 2016 HOLIDAY PLANNER GUIDE

template guidelines. 1. Visual identity 2. How to build an

Admin Tool Wireframes

Advanced Systems Security: Principles

Advanced Systems Security: Security-Enhanced Linux

Sphinx Readability Theme Documentation

nagement ompetition enture coaching GRAPHIC STANDARDS capital investment launch opening risk assessment entrepreneur information feasibility study

Hardening Lightning. Harder, Better, Faster Stronger. Olaoluwa Co-Founder, Lightning Labs

Virtual Machine Security

MULTIPLY ENGINEERING SERVICES

WPBAKERY PAGE BUILDER

Smart buyers of Smart TVs in Russia. TV industry insights based on Google data

TITLE EXAMPLE. Sub - title

CSC 337. Cascading Style Sheets. Marty Stepp, Rick Mercer

Snooping IoT devices with a Raspberry Pi. a UWC/CSIR project

Condition of the Mobile User

Krasbit Recognition - Prepaid Code setup

Transcription:

Advanced Systems Security: Future Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Lab Penn State University 1

Privilege Separation Has been promoted for some time Software-Fault Isolation (1993) Kernel driver isolation (1990s) OpenSSH (early 2000s) Can be a time-consuming task Automate not there yet Questions What is the state of automating privilege separation? Do we still need it? 2

PtrSplit Automated privilege separation Function partitioning And IDL generation To generate RPC (marshalling/unmarshalling) code 3

DATS Combines a number of technologies that we have studied this semester into one system Single use services Launch service for particular user/request Unique web-application instance () Access control Limit that single-use service to only the user/request permissions Folder-level ACLs Privilege separation Isolate untrusted front-end from processing of key data (folders) Within web applications, but trust the backend storage (storage declassifier) 4

DATS Different view of sharing Application-Centric Users Dave Alice Bob Eve Labels / Folders Apps Messaging Scheduling Storage Data-Centric Users Dave Alice Bob Eve Labels / Folders Data Containers (Apps+Storage) Messaging Scheduling Messaging Scheduling Messaging Scheduling Figure 1. application-centric access con- 5

DATS Different view of sharing Dave Start https://dats.com Manage ACLs - Health App D,A D,A,B D,E https://origina.dats.com Manage Appointments - Appointments - Calendar https://originb.dats.com Select Appointment - - - https://origine.dats.com - Edit https://origind.dats.com information - Add attachment - Edit https://originc.dats.com information dolore magna aliqua. - Add attachment Lorem ipsum dolor sit amet, consectetur adipiscing - Edit elit, sed information do eiusmod tempor incididunt ut labore et dolore magna aliqua. - Add attachment Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. /home /view /view? Template </> { JSON } App Access Control Mgr. Health App Health App Labels / Folders+ACLs Storage Figure 2. Example web page ow from a user ( client-side ), DATS s main components, and an application s app-template-storage components (and their relation to MVC). Application code, application data, and storage services are untrusted (grayed areas and colored boxes), while DATS s trusted components (boxes with white background) enforce folder non-interference. Application components run inside OS-level s, which can very easily enforce per-folder MAC policies. Note that the client s browser is allowed to run untrusted application code (e.g., JavaScript). 6

DATS Take Aways Questions Do programmers know how to build web application instances? Is this an automated privilege separation task? Can we enforce information flow guarantees comprehensively? Currently SELinux Should we use DIFC? Can we really trust the backend? Do we really need to? Is this another privilege separation problem? 7