Bacteria|Rabbit
•Computer program ,block of codes
•Replicates themselves
•Computers recourses like processor , memory
and disk space.
Ultimately result in dos
•Named for their similarity to
biological rabbits and bacteria
Defense method
• Sandboxing
• Proof carrying code
• Information flow matrices
• Reducing right
• Malicious logic alternating files
• Notion of trust
Sandboxing
• Creation of virtual environment
• Sandboxes, virtual machines also restrict
rights
– Modify program by inserting instructions to cause
traps when violation of policy
– feel safe & secure about what the executing
software can do.
Proof-Carrying Code
• originally described in 1996 by George
Necula and Peter Lee
• software mechanism for validating that allows a host
system to verify properties about an application
• Security policy to determine whether the application i
safe to execute
• Code consumer (user) specifies safety requirement
• Code producer (author) generates proof code meets this
requirement
– Proof integrated with executable code
– Changing the code invalidates proof
• code + proof delivered to consumer
• Consumer validates proof
Information flow metrics
• Propounded byHenry and Kafura
• Idea: limit distance a virus can spread
• transfer of information from a variable x to a variable
y in a given process
• Ensure confidentiality
• Metric associated with information, not objects
– You can tag files with metric, but how do you tag the information in
them?
– This prevent sharing
• To stop spread, make V = 0
– Disallows sharing
Reducing Protection Domain
• Application of principle of least privilege
• Basic idea: remove rights from process so it
can only perform its function
– Warning: if that function requires it to write, it can
write anything
– But you can make sure it writes only to those
objects you expect
Detect Alteration of Files
• developed by Silicon Graphics
• allows applications to watch certain files and be
notified when they are modified
• Compute manipulation detection code (MDC) to
generate signature block for each file, and save it
• Later, recompute MDC and compare to stored MDC
– If different, file has changed
Notion of trust
• Trust the user to take explicit actions to limit their
process’ protection domain sufficiently
• based on the authenticated identity of external
parties
• Rigid authentication mechanisms, such
as public key cryptographic and Kerberos to
protect users information.
• Types : Direct trust & Third Party Trust
Thank you!

Raabit and bacteria

  • 1.
    Bacteria|Rabbit •Computer program ,blockof codes •Replicates themselves •Computers recourses like processor , memory and disk space. Ultimately result in dos •Named for their similarity to biological rabbits and bacteria
  • 2.
    Defense method • Sandboxing •Proof carrying code • Information flow matrices • Reducing right • Malicious logic alternating files • Notion of trust
  • 3.
    Sandboxing • Creation ofvirtual environment • Sandboxes, virtual machines also restrict rights – Modify program by inserting instructions to cause traps when violation of policy – feel safe & secure about what the executing software can do.
  • 4.
    Proof-Carrying Code • originallydescribed in 1996 by George Necula and Peter Lee • software mechanism for validating that allows a host system to verify properties about an application • Security policy to determine whether the application i safe to execute • Code consumer (user) specifies safety requirement • Code producer (author) generates proof code meets this requirement – Proof integrated with executable code – Changing the code invalidates proof • code + proof delivered to consumer • Consumer validates proof
  • 5.
    Information flow metrics •Propounded byHenry and Kafura • Idea: limit distance a virus can spread • transfer of information from a variable x to a variable y in a given process • Ensure confidentiality • Metric associated with information, not objects – You can tag files with metric, but how do you tag the information in them? – This prevent sharing • To stop spread, make V = 0 – Disallows sharing
  • 6.
    Reducing Protection Domain •Application of principle of least privilege • Basic idea: remove rights from process so it can only perform its function – Warning: if that function requires it to write, it can write anything – But you can make sure it writes only to those objects you expect
  • 7.
    Detect Alteration ofFiles • developed by Silicon Graphics • allows applications to watch certain files and be notified when they are modified • Compute manipulation detection code (MDC) to generate signature block for each file, and save it • Later, recompute MDC and compare to stored MDC – If different, file has changed
  • 8.
    Notion of trust •Trust the user to take explicit actions to limit their process’ protection domain sufficiently • based on the authenticated identity of external parties • Rigid authentication mechanisms, such as public key cryptographic and Kerberos to protect users information. • Types : Direct trust & Third Party Trust
  • 9.