Foundations of Platform Security

1,027 views

Published on

Uses the concept of asymmetry as a foundation for analyzing the security of various systems. Asymmetry in security is the property where mounting an attack is much more difficult for the attacker than the defender's effort required to maintain security. Platform design principles, including a study of sendmail vs. qmail architectures, are recommended for those who are designing their own systems. Given to a SJSU security class on May 1, 2006.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,027
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Foundations of Platform Security

  1. 1. ! quot;# quot;$ % % ! quot;% && ' ( % )* & +
  2. 2. ), ( ! quot; -. / 0 1 ( - / $ 1 ! 2# 34! 2 2 5 02 ) $ ! !
  3. 3. ), ! quot;# quot; * &, * 6 quot; 7 . 8 2 % 8 ( # ! ! ( 2 - ) 2 / 9 )$ 95 04 : ; quot; !<
  4. 4. = 1 1 ) , ! ) > !quot; quot; (quot; , quot; quot; ( quot; quot; ) !>, quot; )1 3 > quot; ,1 6 quot; quot; quot;(! , (
  5. 5. (3 ) ( quot; > ! ! !quot; , quot; ( ! ! ! 6 quot; ( ! 1 6 ! !quot; ! $ ! :(
  6. 6. ( ! (; ! ! , ) ( - / $ quot; ,quot; (quot; ( ) ! , !, ( ! quot; , ,quot; , ! )1 3 ) ! ; 4 3 1 ! quot; quot; ( ?
  7. 7. ( quot; quot; quot; 1 6 quot; - ) / $ , 1, , ( >( - ) !/ $ , 1 1 ! 83 > (4 (! quot; 7 -1 ) 3 / 0 ( ! 3 1 ( ( 83 > quot; 4 quot; ) quot;! ?
  8. 8. ) ( 2 7 , ( : , : ,, ( quot; !quot; !1 , 6 , !1 ( :quot; ! ? ) 1 @ quot; ( 3 ? ( quot; 1 quot; , quot;
  9. 9. ( ) quot; ! , ) quot; - A quot; B/ 5 , ! ) , quot; ! quot; quot; 3 , 1 , 1 ) ( ! = quot; ,! , - A( quot; B/ quot; 1> ( , quot; 1 -%%2 / ! quot; 1 1> quot; ( C 1 > ( 1 ! D quot; quot; ! ! !
  10. 10. ) ! quot; quot; , ; ( quot; !1 A9quot; 1 3 , quot; quot; quot;1 , B A (7 !quot; ! ( 1B 1, !quot; ! ) !>, (! quot; ; quot;1 quot; )1 3 > quot; quot; ! quot;
  11. 11. = 9quot; quot; 1 3 ,! 1 ! > 1 ! quot; quot; 1 ! 7, 2 quot;> quot; quot; quot; quot; quot; quot; $ E quot; - /> 1 , 7- /> ( 1 , quot; % - C C 3 4! /%) : # )> quot; ! 1 , , ! ! D1 quot; - / 83 , ) - CC 7 C 3 4! /
  12. 12. 3 quot; F ! =quot; - ,! ! 9 % / 5E 5 G 1 1 ! % # = E 5: = 1 G 3 !3 quot; F E > 1( ! quot; 0 quot; 1! 5E quot; ( 1 1 G A , > 5 $ ! quot;1 quot; BH ! 6 H
  13. 13. :quot; ; ! ! G = 1 , * - / = quot; ! 1 = = , quot; 1 , ( 9quot; 1 3 3 2= : *3 9 5
  14. 14. # > 1 04 1 3 , -quot; 1% , / 3 quot; 2= quot; 3 3 1C ! 4 quot;quot; : quot; - 4, !/ 3 3- , quot; / 9 1 5 quot; ( ! quot; quot; : E , # ) 3 4 1 8 3 5 quot; 1 > > quot; C C % %!C
  15. 15. > quot; quot; quot; D = ! ! 1 ! ! ! ! 3 , - % / 1 ! 2 1 ! quot;quot; ; ,3 3 , 1 ! G! !quot; D quot; (/ - - / @ > G quot; ;1 1 quot; quot; 1 ! quot; D -%% ! $ 2 /
  16. 16. quot; -/ 9 ! quot; 7 C !7 quot;quot; 4 $ >( , ! 3 7 C !7 1 ! 3 ) 7 , ( 1 , 1 3 , > ( quot; ! 1 $ A< $ 3 quot; quot; quot; ! 3 quot; ,, ( I quot; , %9quot; D quot; ( !B - %) 0! D ! / = ! (> quot; =
  17. 17. >D 2 ! A9quot; ) quot; D BH G @ quot; ) H +
  18. 18. >D ! quot; $C$ 2 J2 quot; ! $ quot; - ( / , - !/ quot; (/ - - / !-/ quot; - / 3 1 @ > quot; 3 , 3 ! ! D ; quot;quot; > % %C > CC D C ! % quot;
  19. 19. D quot; - / ! 1 2 - / ! , 7 quot; ! ; quot; 1 -K /4 L / - - A M B/H N #D +4, quot; quot; !1 - +J / L 0 # 1 ! 0 quot; ! ( quot; 2 ? !
  20. 20. quot; ; ! > ! 1 , $ quot; ; 1 1 ( ) quot; 1 , , ) 41 > 1 quot; ! , 3 ! =quot; ! quot; 1 ! 1 , quot; # , > quot; ( ! ? ) > 1 !quot; quot; A) quot; $ ; quot; ! quot; (/<B - G quot; ,! quot;
  21. 21. O ; ! quot;
  22. 22. - / 0 ( ! ( , ! quot; # , ! quot; quot;1 quot; , > ) > !quot; quot; , quot; quot; ( quot; quot; ) !>, quot; )1 3 > quot; ,1 ! , quot; ; !

×