A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems

03/05/2014
by   Michael Hanspach, et al.
0

We present a taxonomy and an algebra for attack patterns on component-based operating systems. In a multilevel security scenario, where isolation of partitions containing data at different security classifications is the primary security goal and security breaches are mainly defined as undesired disclosure or modification of classified data, strict control of information flows is the ultimate goal. In order to prevent undesired information flows, we provide a classification of information flow types in a component-based operating system and, by this, possible patterns to attack the system. The systematic consideration of informations flows reveals a specific type of operating system covert channel, the covert physical channel, which connects two former isolated partitions by emitting physical signals into the computer's environment and receiving them at another interface.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/08/2018

Interface-Based Side Channel Attack Against Intel SGX

Intel has introduced a trusted computing technology, Intel Software Guar...
research
09/21/2020

MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking

Ensuring that information flowing through a network is secure from manip...
research
08/21/2015

A Case Study on Covert Channel Establishment via Software Caches in High-Assurance Computing Systems

Covert channels can be utilized to secretly deliver information from hig...
research
04/01/2012

Windows And Linux Operating Systems From A Security Perspective

Operating systems are vital system software that, without them, humans w...
research
07/07/2020

Composite Metrics for Network Security Analysis

Security metrics present the security level of a system or a network in ...
research
10/08/2020

Strategies for Integrating Controls Flows in Software-Defined In-Vehicle Networks and Their Impact on Network Security

Current In-Vehicle Networks (IVNs) connect Electronic Control Units (ECU...
research
11/19/2021

UEFI virtual machine firmware hardening through snapshots and attack surface reduction

The Unified Extensible Firmware Interface (UEFI) is a standardised inter...

Please sign up or login with your details

Forgot password? Click here to reset