[精选]第13章移动代码安全7762.pptx
《[精选]第13章移动代码安全7762.pptx》由会员分享,可在线阅读,更多相关《[精选]第13章移动代码安全7762.pptx(30页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、第13章:移动代码安全 西安电子科技大学西安电子科技大学电子对抗研究所电子对抗研究所信息对抗信息对抗Mobile Code/Mobile Agent l C/S MODELC:;S:R/Cl CODE ON DEMANDC:R;S:Cl REMOTE COMPUTINGC:C;S:Rl MOBILE AGENTC:C;S:R MALICIOUS CODE1、MOBILE CODE ATTACKS THE ENVIRONMENT WHERE IT IS EXECUTED.代理对代理平台的攻击代理对代理平台的攻击 对驻留在代理平台上的信息的非法访问;对驻留在代理平台上的信息的非法访问;以预期和破坏
2、性的方式授权访问以预期和破坏性的方式授权访问。BEAR SOME SIMILARITY WITH TROJAN HORSESMALICIOUS HOST2、MALICIOUS HOST 一一个个接接收收代代理理平平台台能能很很容容易易的的分分离离、捕捕获获一一个个代代理理,并并通通过过如如下下方方式式攻攻击击它它:提提取取信信息息、毁毁坏坏或或修修改改它它的的代代码码或或状状态态、拒拒绝绝请请求求服服务务、或或简简单单的的重新初始化或终止它。重新初始化或终止它。THREATS FROM OTHER AGENTS3、代理对其它代理的威胁代理对其它代理的威胁 一一个个代代理理通通过过使使用用几几个
3、个普普通通方方法法就就可可以以攻攻击击另另一一代代理理。这这包包括括伪伪造造事事务务,窃窃听听谈谈话话,或者干涉一个代理活动。或者干涉一个代理活动。THREATS FROM OTHER ENTITIES4、其它实体对代理系统的威胁其它实体对代理系统的威胁 即即使使假假设设当当前前运运行行的的代代理理和和代代理理平平台台都都是是行行为为良良好好的的,代代理理框框架架外外部部的的和和内内部部的的其其它它实实体体也也可可能能有有扰扰乱乱,损损坏坏,或或破破坏坏代代理理系统活动的企图系统活动的企图 PROTECTIONO OF A HOST FROM A MOBILE CODElTWO DIRECTI
4、ONS:lA mobile code infrastructure that is gradually enhanced with authenticatin,data integrity and access control mechanism.lVerification of mobile code semantics.Safe Interpretersl running straight binaries presents some serious security problems.lA common approach is to forgo compiled executables
5、and instead to interpret the mobile code instead.lInterpreter has fine-grained control over the appletlCan examine each instruction or statementlThe safety of the system is reduced to the correctness of the security policy implemented by the interpreterFault IsolationlInterpreters suffer a serious p
6、erformance overhead.lThe untrusted code is loaded into its own part of the address space known as a fault domain.lThe code is instrumented to be sure that each load,store,or jump instructions is to an address in the fault domain.Fault Isolationtwo waysl1:insert a conditional check of the address and
7、 raise an exception if it is invalid,orl2:simply overwrite the upper bits of the address to correspond to those of the fault domain.lAt much lower cost than interpretersSandbox a restricted environmentCode VerificationlAlthough software fault isolation certainly provides mobile code safety with high
8、er performance than interpretation,we are still subject to the overheads of the code instrumentation,as well as the overheads of the indirected calls which access resources.lProof-carrying Code can be used to address some of these issuses.Code Verification program checkinglChecking a mobile code mea
9、ns to perform a verification on the code structure or on the code behavior as it is run and modifying in consequence the status of the code.lSandboxes:rudimentary program check,either statically,for instance to ensure that operands of an instuction are of the correct type,or dynamically,for example
10、to locate any access to a protected resource.Proof-Carrying CodelA predefined security policy is defined in terms of a logic.lHost first asks to be sent a proof that the code respects the policy before he actually agrees to run it.lThe code producer sends the program and an accompanying prooflAfter
11、receiving the code,host can check the program with the guidance of the proof.Proof-Carrying CodeProof-Carrying CodelOn key question which affects the usefulness of this approach is that of:lWhat program properties are expressible and provable in the LF logic used to publish the security policy and e
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 精选 13 移动 代码 安全 7762
限制150内