Outline for May 17, 2013
Reading: §17.2–17.3, 33, [SMB06] (This is available in the Resources area of SmartSite; look in the folder “Handouts”)
Due: Homework #4, due May 24, 2013
- Isolation: virtual machines
- What it is
- Example: KVM/370
- Example: VAX/VMM
- Isolation: sandboxes
- What it is
- Adding mechanisms to libraries or kernel
- Modify program or process to be executed
- Example: Janus
- Covert channels
- Storage vs. timing
- Noise vs. noiseless
- Existence
- Bandwidth
- Covert channel detection
- Noninterference
- Shared Resource Matrix Model
- Information flow analysis
- Covert flow trees
- Noninterference
- Version of the Unwinding Theorem
- Specifications of SAT
- Example analysis for SAT
- Shared resource matrix methodology
- Identify shared resources, attributes
- Operations accessing those attributes
- Building the matrix
- Issues about the methodology
- Covert flow trees
- What it is
- Node types
- Construction
- Determine what attributes primitive operations reference, modify, return
- Locate covert storage channel that uses some attribute
- Construct lists: sequences of operations that modify, recognize modifications
- Analysis
- Capacity and noninterference
- When is bandwidth of covert channel 0?
- Noninterference sufficient but not necessary
- Analysis
- Measuring capacity
- Mitigating covert channels
- Preallocation and hold until process terminates
- Impose uniformity
- Randomize resource allocation
- Efficiency/performance vs. security