CS4394 Tutorial 1

.pdf
School
City University of Hong Kong**We aren't endorsed by this school
Course
CS 4394
Subject
Computer Science
Date
Dec 19, 2024
Pages
38
Uploaded by btrsynov
CS4394 Tutorial 1Mr. Jinghang WENjh.wen@my.cityu.edu.hkWeekly Tutorial , City University of Hong Kong 21:30 pm - 22:20 pm, Thursday
Background image
1. Think about the way you use your computer in your personal life. Which is most important: confidentiality, integrity, availability? Justify your answer.
Background image
1. Think about the way you use your computer in your personal life. Which is most important: confidentiality, integrity, availability? Justify your answer.Confidentiality: Who can read information?Integrity: Who can write, modify or generate information?Availability: Are resources available when needed?It all depends on the contextFor example, if you're using e-banking services, integrity is crucial, as it ensures that your financial transactions are accurate and haven't been tampered with. In other situations, confidentiality might be more important, such as protecting personal data from unauthorized access. Availability becomes critical for services you rely on continuously, like accessing your files in the cloud.
Background image
2. What is the connection of integrityand authentication? Can you illustrate with examples?
Background image
2. What is the connection of integrityand authentication? Can you illustrate with examples?Integrity: Making sure that some piece of data has not been altered from some "reference version”Authentication: Making sure that a given entity (with whom you are interacting) is who you believe it to beConnection: The authentication is a way to enforce the integrity. Or the authenticity is a special case of integrity.Example: Submit your original transcript to the university when enrolling the school. The transcript is sealed in an envelope with a stamp.
Background image
3. Can you name at least one situation in which authenticationand non-repudiation are extremely important?
Background image
3. Can you name at least one situation in which authenticationand non-repudiation are extremely important?Non-repudiation: The assurance that someone cannot deny the validity of somethingDigital signature : Online contractIt is really generated by the entityThe entity cannot deny the signature
Background image
4. What is the primary purpose of military security? Are there also any other aspects we need to protect in practice?
Background image
4. What is the primary purpose of military security? Are there also any other aspects we need to protect in practice?Military securityDefined as the ability of a nation to defend itself ?The Simple Security Property, *-Property and Tranquility Property formalize a large portion of multi-level security , which is also sometimes called military securityPurposeConfidentialityIntegrityAvailability
Background image
5. Why are we not concerned with how the labels get there?
Background image
5. Why are we not concerned with how the labels get there?Label On any folder reflects the sensitivity of the information contained within that folderContains both a hierarchical component and a set of categories• (Secret: {Nuclear, Crypto})• (Top Secret: {Crypto})It is hard to model the generation of labels and it is more convenient to assume they are already there
Background image
6. Explain why the Principle of Least Privilege makes sense.
Background image
6. Explain why the Principle of Least Privilege makes sense.Need-to-know policyonly have access to the minimum resources needed to perform their tasksreduces the risk of accidental or intentional misuse of privilegesIt is widely implemented in reality, is based on this principle
Background image
7. State informally what the Simple Security property says.
Background image
7. State informally what the Simple Security property says.Simple Security propertyEach subject Sand object Ois assigned a confidentiality level (LS and LO, respectively)A subject Scan read an object Oonly if LO ≤ LS (“read down”)A subject at a given security level may not read an object at a higher security levelsecret
Background image
8. State informally what the *-Property says.
Background image
8. State informally what the *-Property says.*-Property Each subject Sand object Ois assigned a confidentiality level (LS and LO, respectively)A subjectS can write to an object Oonly if LS ≤ LO (“write up”)Users can create content only at or above their own security levelsecret
Background image
9. What must be true for a subject to have both read and write access to an object?
Background image
9. What must be true for a subject to have both read and write access to an object?Each subject Sand object Ois assigned a confidentiality level (LS and LO, respectively)Simple Security property :A subject Scan readan object Oonly if LO ≤ LS (“read down”)*-Property :A subject Scan writeto an object Oonly if LS ≤ LO (“write up”)The clearance of a subject is exactly the same as the classification of the objectsecretreadwritewrite
Background image
10. Why not just use strong tranquilityall the time?
Background image
10. Why not just use strong tranquilityall the time?The Strong Tranquility Property : Subjects and objects do not change labels during the lifetime of the systemThe Weak Tranquility Property : Subjects and objects do not change labels in a way that violates the spirit of the security policyWeak tranquility is desirable for situation that allows a low clearance level to accumulate higher clearance levels progressively. (Unclassified:{ }) (Top Secret: {Crypto})What if the labels are allowed to change? We clearly need an additional rule that governs changing labels
Background image
11. Is the following a covert channel? Why or why not? Send 0| Send 1--------------------------------------------------Write (SH, F0, 0)| Write (SH, F0, 1)Read (SL, F0)| Read (SL, F0)
Background image
11. Is the following a covert channel? Why or why not? A covert channel is a path for the illegal flow of information between subjects within a system, utilizing system resources that were not designed to be used for inter-subject communicationExample
Background image
11. Is the following a covert channel? Why or why not? No. F0 has its classification label. The lower clearance subject (SL) cannot observe any difference in both cases (send 0 and send 1)Only read and write are involved in this case The clearance level : SH > SLIFSH can write F0 :F0 >= SH > SLSL cannot read F0Send 0| Send 1--------------------------------------------------Write (SH, F0, 0)| Write (SH, F0, 1)Read (SL, F0)| Read (SL, F0)
Background image
12. Analyse whether each of the following channels is a type of covert channel.Timing channelStorage channel
Background image
12. Analyse whether each of the following channels is a type of covert channel.Timing channelStorage channelBoth sender and receiver must have access to some attribute of a shared objectBoth sender and receiver must have access to some attribute of a shared objectBoth sender and receiver have access to a time reference (real-time clock, timer, ordering of events)The sender must be able to modify the attribute.The sender must be able to control the timing of the detection of a change in the attribute of the receiverThe receiver must be able to reference (view) that attributeA mechanism for initiating both processes, and sequencing their accesses to the shared resource must existA mechanism for initiating both processes, and sequencing their accesses to the shared resource must exist
Background image
12. Analyse whether each of the following channels is a type of covert channel.AnswersYou log into a forum with encrypted traffic, but the third parties can still observe covert info, e.g., online activities, and possibly infer your time zoneEncrypted file: infer if it is text, image or video with its size
Background image
13. Why would it be infeasible to eliminate every potential covert channel?
Background image
13. Why would it be infeasible to eliminate every potential covert channel?Answers1.Covert channel uses system resources not intended for information transfer, making it hard to detect every covert channel.2.Protection is inherently costly if you need to implement countermeasures for as many unintended channels as possible
Background image
14. How to use an SRMM table to search for a potential covert channel?
Background image
14. How to use an SRMM table to search for a potential covert channel?SRMM stands for shared-resource matrix methodology. Build a table describing system commands and potential effects on shared attributes of objectsR: operation References (provides information about the attribute under some circumstances)M: operation Modifies the attributes under some circumstancesREADWRITEDESTROYCREATEFile existenceRMMFile sizeRMMMFile levelRMM
Background image
14. How to use an SRMM table to search for a potential covert channel?Suppose you have the following operationCREATE (S, O)If no object with name O exists on the system, create a new object O at level LSOtherwise, do nothingAfter this operation, you know that the file existsIf you see an R and M in the same row, that indicates a potential channelREADWRITEDESTROYCREATEFile existenceRMMFile sizeRMMMFile levelRMMWhy potential?
Background image
15. What do you think of the statement that one way to mitigate covert channels is to introduce randomness into the channel? Justify your answer.
Background image
15. What do you think of the statement that one way to mitigate covert channels is to introduce randomness into the channel? Justify your answer.Covert channel mitigationEliminate it by modifying the system implementationReduce the bandwidth by introducing noise into the channelMonitor it for patterns of usage that indicate someone is trying to exploit itAnswersRandomness increases the difficulty to get useful information from a covert channel. For example, adding dummy contents to two encrypted files so that one cannot distinguish the files from their sizes.
Background image
16. If a computer system satisfies BLP, does it necessarily satisfy non-interference (NI)? Why or why not?
Background image
16. If a computer system satisfies BLP, does it necessarily satisfy non-interference (NI)? Why or why not?Non-interference propertiesIf security demands that SH must never communicate with SL, there shouldn’t be anything that SH can do that has effects visible to SL.It is possible to turn any MLS policy into an NI policy.It is NOT true that any NI policy can be reformulated into an MLS policy.AnswersNo. Give an example of a system that satisfies BLP but not NI. The firewall case satisfies the BLP model: INTERNET < Firewall < LANIf we went to explicitly define an NI rule to refuse a channel from the INTERNET directly into the LAN.Then, NI is violated since the INTERNET will interfere with the LAN.
Background image
17. Explain why it’s difficult to prove non-interference for realistic systems.
Background image
17. Explain why it’s difficult to prove non-interference for realistic systems.AnswersThe interferences are common in real-world system. The Interferences most involve low-level system attributes.The attributes are scattered, diverse, and hard to capture.Although NI seems good by definition, it could be extremely hard for security engineers to implement.How to represent the attributes in programming language.Some interferences are benign.For example, to mark whether a file is stored in the cache speed up the data retrieval process.
Background image