SlideShare una empresa de Scribd logo
1 de 33
1
Information Flow Control
Nick Feamster
CS 6262
Spring 2009
2
• Denning's axioms
• Bell-LaPadula model (BLP)
• Biba model
Lattice-Based Models
3
Denning’s Lattice Model
< SC, ,  >
SC set of security classes
SC X SC flow relation (i.e., can-
flow)
 SC X SC -> SC class-combining
operator
4
Denning’s Axioms
< SC, ,  >
1 SC is finite
2  is a partial order on SC
3 SC has a lower bound L such that L  A for all A
 SC
4  is a least upper bound (lub) operator on SC
5
Implications
• SC is a universally bounded lattice
• there exists a Greatest Lower
Bound (glb) operator  (also
called meet)
• there exists a highest security
class H
6
Lattice Structures
Unclassified
Confidential
Secret
Top Secret
Hierarchical
Classes
can-flow
reflexive and
transitive
edges are
implied but not
shown
7
Lattice Structures
Unclassified
Confidential
Secret
Top Secret
can-flow
dominance

8
Lattice Structures
{ARMY, CRYPTO}
Compartments
and Categories
{ARMY } {CRYPTO}
{}
9
Lattices Structures
{ARMY, NUCLEAR, CRYPTO}
Compartments
and Categories
{ARMY, NUCLEAR} {ARMY, CRYPTO} {NUCLEAR, CRYPTO}
{ARMY} {NUCLEAR} {CRYPTO}
{}
10
Lattice Structures
Hierarchical
Classes with
Compartments
TS
S
{A,B}
{}
{A} {B}
product of 2 lattices is a lattice
11
Challenges
• Implicit information flow
– Conditional statements can implicitly leak information
• Implementing a system that explicitly controls
the flow of information
12
Static Binding: Run-Time
• Objects are statically bound to classes
• Can operate either at runtime, or at compile-time
• Run-time mechanisms
– Each process has a mechanism that specifies the
highest class p can write from and the lowest class p
can write to
13
Static Binding: Compile-Time
• Certify program at compile-time
• Advantages
– Security guarantees before execution
– Does not affect the execution speed
• Disadvantages
– Flows not specified by the program cannot be verified
– Hardware could malfunction
14
Static Binding, Run-Time
15
Dynamic Binding
• Objects can dynamically change their
classification
• One approach: Update the class of an object
whenever data flows into it
– Nondecreasing class mechanisms
– Main problem: requires explicit flow to update the
class of an object
16
Possible Applications
• Confinement
– No leaking information about confidential processes
• Databases
– Control information flow for different classes of
information in the database
• Decoupling right of access from right of control
17
Taint Tracking
18
Motivation
• Malicious software sneaks onto computers
– Collects users’ private information
– Causes havoc on Internet
• Slows performance
• Costs to remove
– Reputable vendors violate users’ privacy
• Google Desktop
• Sony Media Player
19
Traditional Malware detection
• Signature-based
– Cannot detect new malware or variants
• Heuristics
– High false positives
– High false negatives
20
Panorama Approach
• Input
– Suspicious behavior
• Inappropriate data access, stealthfully
• Process
– Whole-system, fine-grained taint tracking
• Marking data
– Operating-system-aware taint analysis
• What touches the tainted data and how
• Output
– Taint Graphs
• Tracked tainted data
21
Taint Graph
• Information flow that shows the process that
accessed the tainted data
• Make policies based on Taint Graph
• Compare unknown samples against Taint Graph
– Automatic
– Numerous categories
22
Taint Graph generation
• Similar to a mapped out logic/process tree
– Conceptually, horizontal branching
• 9 different types of Root taint sources
– Text, password, http, https, icmp, ftp, document, and directory
• Non-root entries can be
– OS objects (processes, modules)
– OS resource (such as a file)
23
Conceptual Structure
• Works with closed code
– Windows OS
– FireFox
• Monitors the whole system in a processor emulator
• Shadow memory stores taint status of
– Each byte of physical memory
– CPU’s general purpose registers
– Hard disk and network interface buffer
24
Taint Sources
• Test information is inputted and marked as taint
source
• Inputted from hardware such as
– Keyboard
– Network interface
– Hard disk
• Tainting at hardware level
– Malware could hook before input reaches the
software
25
Taint Propagation
• Monitors CPU instructions and DMA operations
dealing with tainted data
• OS-Aware taint tracking
– Developed a kernel module
• Authenticated communications to taint engine
26
OS-Aware Taint Tracking
• Resolving process and module information
– Which process does an operation come from?
– Module notifier
– Tampering?
• Mapping file and network information to taints
– File system forensics
– Mapping connections back to processes
27
Code Identification
• Identifying the code under analysis and its
actions
– Entire code segment is labeled
• Dynamic or Encrypted code is labeled too
• A similar method labels trusted code
• What does the analysis do about various
derivatives of the code
– Dynamic generation
– Calling trusted code
28
Three Categorized Behaviors
• Anomalous information access
– MS Paint accessing passwords
• Anomalous information leakage
– BHO reporting home about surfed websites
• Excessive information access
– Repeatedly accessed directory to hide rootkit
29
Malware detections
• 42 real-world malware samples
• 56 benign applications were tested
• Only 3 false positives, no false negatives
– 2 from a personal firewall
– 1 from a browser accelerator
30
Summary
• A new system to detect malware
– System-Wide Information Flow
• Taint tracking
– Data access and process tracking
– Taint graphs
• Policies
31
Contributions
• Unified approach to detect and analyze diverse
malware
• Designed and developed a functional prototype
• Detected all malware samples
– Keystroke loggers, password sniffers, packet sniffers,
stealth backdoors, rootkits, and spyware
32
Weaknesses
• Performance Overhead
– Using Cygwin utilities
– Prototype is not optimized
– Slowdown average is 20 times
– Intended as a offline tool
• Evasive malware
– Time bombs
– Selective keystroke loggers
– Virtual environment detection
33
How to Improve
• Optimize the code
• Automate taint graph analysis and policy implementation
• Virtual environment shielding
– Or switch out of emulated environment
• Implement mentioned improvements
– Unicode conversion- switch case issue

Más contenido relacionado

Similar a 13517398.ppt

Chapter 1- Fundamentals of Cryptography.pdf
Chapter 1- Fundamentals of Cryptography.pdfChapter 1- Fundamentals of Cryptography.pdf
Chapter 1- Fundamentals of Cryptography.pdfkiyya3
 
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...Positive Hack Days
 
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their assCONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their assPROIDEA
 
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...
Non-Invasive Elimination of  Logical Access Control  Vulnerabilities in Web A...Non-Invasive Elimination of  Logical Access Control  Vulnerabilities in Web A...
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...Denis Kolegov
 
Open Anti-Cheat System (OACS)
Open Anti-Cheat System (OACS)Open Anti-Cheat System (OACS)
Open Anti-Cheat System (OACS)Stephen Larroque
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdftalkaton
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxtalkaton
 
Network Intrusion Detection Systems #2
Network Intrusion Detection Systems #2Network Intrusion Detection Systems #2
Network Intrusion Detection Systems #2Peter Dulačka
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheapAnjum Ahuja
 
Hunting on the Cheap
Hunting on the CheapHunting on the Cheap
Hunting on the CheapEndgameInc
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)Olesya Shelestova
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookSam Bowne
 
Kaseya Connect 2012 - THE ABC'S OF MONITORING
Kaseya Connect 2012 - THE ABC'S OF MONITORINGKaseya Connect 2012 - THE ABC'S OF MONITORING
Kaseya Connect 2012 - THE ABC'S OF MONITORINGKaseya
 
Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Asad Ali
 
HSB15 - Pavel Minarik - INVEATECH
HSB15 - Pavel Minarik - INVEATECHHSB15 - Pavel Minarik - INVEATECH
HSB15 - Pavel Minarik - INVEATECHSplend
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob HolcombPriyanka Aash
 

Similar a 13517398.ppt (20)

Chapter 1- Fundamentals of Cryptography.pdf
Chapter 1- Fundamentals of Cryptography.pdfChapter 1- Fundamentals of Cryptography.pdf
Chapter 1- Fundamentals of Cryptography.pdf
 
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
 
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their assCONFidence 2014: Yaniv Miron: ATMs – We kick their ass
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
 
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...
Non-Invasive Elimination of  Logical Access Control  Vulnerabilities in Web A...Non-Invasive Elimination of  Logical Access Control  Vulnerabilities in Web A...
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...
 
Open Anti-Cheat System (OACS)
Open Anti-Cheat System (OACS)Open Anti-Cheat System (OACS)
Open Anti-Cheat System (OACS)
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 
Network Intrusion Detection Systems #2
Network Intrusion Detection Systems #2Network Intrusion Detection Systems #2
Network Intrusion Detection Systems #2
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Outsourced database
Outsourced databaseOutsourced database
Outsourced database
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheap
 
Hunting on the Cheap
Hunting on the CheapHunting on the Cheap
Hunting on the Cheap
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
RuSIEM overview (english version)
RuSIEM overview (english version)RuSIEM overview (english version)
RuSIEM overview (english version)
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
 
Kaseya Connect 2012 - THE ABC'S OF MONITORING
Kaseya Connect 2012 - THE ABC'S OF MONITORINGKaseya Connect 2012 - THE ABC'S OF MONITORING
Kaseya Connect 2012 - THE ABC'S OF MONITORING
 
Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!
 
HSB15 - Pavel Minarik - INVEATECH
HSB15 - Pavel Minarik - INVEATECHHSB15 - Pavel Minarik - INVEATECH
HSB15 - Pavel Minarik - INVEATECH
 
Network management
Network managementNetwork management
Network management
 
RIoT (Raiding Internet of Things) by Jacob Holcomb
RIoT  (Raiding Internet of Things)  by Jacob HolcombRIoT  (Raiding Internet of Things)  by Jacob Holcomb
RIoT (Raiding Internet of Things) by Jacob Holcomb
 

Último

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 

Último (20)

Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 

13517398.ppt

  • 1. 1 Information Flow Control Nick Feamster CS 6262 Spring 2009
  • 2. 2 • Denning's axioms • Bell-LaPadula model (BLP) • Biba model Lattice-Based Models
  • 3. 3 Denning’s Lattice Model < SC, ,  > SC set of security classes SC X SC flow relation (i.e., can- flow)  SC X SC -> SC class-combining operator
  • 4. 4 Denning’s Axioms < SC, ,  > 1 SC is finite 2  is a partial order on SC 3 SC has a lower bound L such that L  A for all A  SC 4  is a least upper bound (lub) operator on SC
  • 5. 5 Implications • SC is a universally bounded lattice • there exists a Greatest Lower Bound (glb) operator  (also called meet) • there exists a highest security class H
  • 9. 9 Lattices Structures {ARMY, NUCLEAR, CRYPTO} Compartments and Categories {ARMY, NUCLEAR} {ARMY, CRYPTO} {NUCLEAR, CRYPTO} {ARMY} {NUCLEAR} {CRYPTO} {}
  • 11. 11 Challenges • Implicit information flow – Conditional statements can implicitly leak information • Implementing a system that explicitly controls the flow of information
  • 12. 12 Static Binding: Run-Time • Objects are statically bound to classes • Can operate either at runtime, or at compile-time • Run-time mechanisms – Each process has a mechanism that specifies the highest class p can write from and the lowest class p can write to
  • 13. 13 Static Binding: Compile-Time • Certify program at compile-time • Advantages – Security guarantees before execution – Does not affect the execution speed • Disadvantages – Flows not specified by the program cannot be verified – Hardware could malfunction
  • 15. 15 Dynamic Binding • Objects can dynamically change their classification • One approach: Update the class of an object whenever data flows into it – Nondecreasing class mechanisms – Main problem: requires explicit flow to update the class of an object
  • 16. 16 Possible Applications • Confinement – No leaking information about confidential processes • Databases – Control information flow for different classes of information in the database • Decoupling right of access from right of control
  • 18. 18 Motivation • Malicious software sneaks onto computers – Collects users’ private information – Causes havoc on Internet • Slows performance • Costs to remove – Reputable vendors violate users’ privacy • Google Desktop • Sony Media Player
  • 19. 19 Traditional Malware detection • Signature-based – Cannot detect new malware or variants • Heuristics – High false positives – High false negatives
  • 20. 20 Panorama Approach • Input – Suspicious behavior • Inappropriate data access, stealthfully • Process – Whole-system, fine-grained taint tracking • Marking data – Operating-system-aware taint analysis • What touches the tainted data and how • Output – Taint Graphs • Tracked tainted data
  • 21. 21 Taint Graph • Information flow that shows the process that accessed the tainted data • Make policies based on Taint Graph • Compare unknown samples against Taint Graph – Automatic – Numerous categories
  • 22. 22 Taint Graph generation • Similar to a mapped out logic/process tree – Conceptually, horizontal branching • 9 different types of Root taint sources – Text, password, http, https, icmp, ftp, document, and directory • Non-root entries can be – OS objects (processes, modules) – OS resource (such as a file)
  • 23. 23 Conceptual Structure • Works with closed code – Windows OS – FireFox • Monitors the whole system in a processor emulator • Shadow memory stores taint status of – Each byte of physical memory – CPU’s general purpose registers – Hard disk and network interface buffer
  • 24. 24 Taint Sources • Test information is inputted and marked as taint source • Inputted from hardware such as – Keyboard – Network interface – Hard disk • Tainting at hardware level – Malware could hook before input reaches the software
  • 25. 25 Taint Propagation • Monitors CPU instructions and DMA operations dealing with tainted data • OS-Aware taint tracking – Developed a kernel module • Authenticated communications to taint engine
  • 26. 26 OS-Aware Taint Tracking • Resolving process and module information – Which process does an operation come from? – Module notifier – Tampering? • Mapping file and network information to taints – File system forensics – Mapping connections back to processes
  • 27. 27 Code Identification • Identifying the code under analysis and its actions – Entire code segment is labeled • Dynamic or Encrypted code is labeled too • A similar method labels trusted code • What does the analysis do about various derivatives of the code – Dynamic generation – Calling trusted code
  • 28. 28 Three Categorized Behaviors • Anomalous information access – MS Paint accessing passwords • Anomalous information leakage – BHO reporting home about surfed websites • Excessive information access – Repeatedly accessed directory to hide rootkit
  • 29. 29 Malware detections • 42 real-world malware samples • 56 benign applications were tested • Only 3 false positives, no false negatives – 2 from a personal firewall – 1 from a browser accelerator
  • 30. 30 Summary • A new system to detect malware – System-Wide Information Flow • Taint tracking – Data access and process tracking – Taint graphs • Policies
  • 31. 31 Contributions • Unified approach to detect and analyze diverse malware • Designed and developed a functional prototype • Detected all malware samples – Keystroke loggers, password sniffers, packet sniffers, stealth backdoors, rootkits, and spyware
  • 32. 32 Weaknesses • Performance Overhead – Using Cygwin utilities – Prototype is not optimized – Slowdown average is 20 times – Intended as a offline tool • Evasive malware – Time bombs – Selective keystroke loggers – Virtual environment detection
  • 33. 33 How to Improve • Optimize the code • Automate taint graph analysis and policy implementation • Virtual environment shielding – Or switch out of emulated environment • Implement mentioned improvements – Unicode conversion- switch case issue