15
Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute [email protected]

Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute [email protected]

Embed Size (px)

Citation preview

Page 1: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Integrity Through Mediated Interfaces

Bob Balzer

Information Sciences Institute

[email protected]

Page 2: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Technical Objectives

• Wrap Data with Integrity Marks– Insure its Integrity– Record its processing history– Reconstruct it from this history if it is corrupted

• by program bugs

• by malicious attacks

• Demo these capabilities on major COTS product– Microsoft Office Suite

Page 3: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

This Slide Intentionally Blank

Existing Practice

• Integrity Stove-Piped on Tool-by-Tool Basis

• End-to-End Integrity Not Supported

• Persistent Data only Safeguarded by OS

• Corruption Detection is Ad-Hoc

• Corruption Repair– Based on Backups– Not Integrated with Detection

Page 4: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

• Wrap Program– Detect access of integrity marked data & decode it

M

M

M

M

Mediation Cocoon

Environment = Operating System External Programs

Program

ChangeMonitor

– Monitor User Interface to detect change actions• Translate GUI actions into application specific modifications

Technical Approach

– Detect update of integrity marked data • Re-encode & re-integrity mark the updated data

• Repair any subsequent Corruption from History• Build on existing research infrastructure

Page 5: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Program

M

M

M

Mediation Cocoon

M

Security Manager• Mediation Installer• Secure Mediation

NT Security & IntegrationEnhancements

Safe Execution Environments

• Safe Web Browsing• Safe Agent Execution• Safe Download/Macro Execution

File System Extensions

• Encryption Archive• Virtual File System• Copy-On-Modify

• Ppt Design Editor• EMACS in Eudora• Web Annotator

BalzerUSC INFORMATION SCIENCES INSTITUTE

• Diagram Animation• Monitoring C++ Development• Web Ad Buster

COTS Integration

Page 6: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Copy On Modify Demo

Page 7: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Safe Web Browser Demo

Page 8: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Domain SpecificDesign Editor

Demo

Page 9: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Major Risks and Planned Mitigation

• Ability to detect application-level modificationsApplication Openness Spectrum:– Event-Generators: Capture as transaction history– Scripting API: Examine state to infer action– Black-Box: Mediate GUI to infer action=> Generic Mediators + Tool Specific mapping

• Ability to protect transaction history=> Hide the location of the transaction history

• Virtual File System wrapper• System-level Randomization Techniques

• Tool-Specific Modification Trackers Expensive=> Automate common portions=> Provide rule-based scripting language

Page 10: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Task Schedule

• Dec99: Tool-Level Integrity Manager

– Monitor & Authorize Tool access & updates

• Jun00: Operation-Level Integrity Manager

– Monitor, Authorize, & Record Modifications

• Dec00: Integrity Management for MS-Office

• Jun01: Corruption Repair

• Jun02: Automated Modification Tracking

Page 11: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Expected Major Achievements

• for Integrity Marked Documents:– End-To-End Data Integrity (through multiple tools/sessions)

– Modifications Monitored, Authorized, & Recorded• Authorization Control of Users, Tools, and Operations • All Changes Attributed and Time Stamped

– Assured Detection of Corruption– Ability to Restore Corrupted Data

• Ability to operate with COTS products

• MS-Office Documents Integrity Marked

Page 12: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Measures of Success

• Widespread Deployment of Integrity Manager for MS-Office

• Extensibility of Integrity Manager to other COTS products

• Ease of creating Modification Trackers• Resistence to Malicious Attacks

– Corruption Avoidance– Corruption Detection– Corruption Repair=> Red-Team Experiment

Page 13: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Key Outstanding Issues

• None Yet

Page 14: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Transition of Technology

• Piggyback our Technology on a widely used Target Product (MS Office)– Integrity Manager automatically invoked as needed

• Make technology available for COTS products

• Work with Vendors to encouragepublication of modification events

Page 15: Integrity Through Mediated Interfaces Bob Balzer Information Sciences Institute balzer@isi.edu

Needed PM Assitance

• None Yet