integrity through mediated interfaces pi meeting feb. 15, 2001 bob balzer, marcelo tallis...

21
Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge <balzer,mtallis>@teknowle dge.com nd: Turquoise Changes from July 99 PI meet Green Changes from Feb 00 PI meeting Red Changes from July 00 PI meeting

Upload: howard-campbell

Post on 17-Jan-2016

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Integrity Through Mediated Interfaces

PI Meeting Feb. 15, 2001

Bob Balzer, Marcelo Tallis

Teknowledge

<balzer,mtallis>@teknowledge.comLegend: Turquoise Changes from July 99 PI meeting

Green Changes from Feb 00 PI meetingRed Changes from July 00 PI meeting

Page 2: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Technical Objectives

• Wrap Data with Integrity Marks– Insure its Integrity– Record its processing history– Reconstruct it from this history if it is corrupted

• by program bugs• by malicious attacks

• Demo these capabilities on major COTS product– Microsoft Office Suite (PowerPoint & Word only)– Also demo on a mission critical military system

• PowerPoint and Word

Page 3: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

This Slide Intentionally Blank

Existing Practice

• Integrity Stove-Piped on Tool-by-Tool Basis

• End-to-End Integrity Not Supported

• Persistent Data only Safeguarded by OS

• Corruption Detection is Ad-Hoc

• Corruption Repair– Based on Backups– Not Integrated with Detection

Page 4: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

• Wrap Program– Detect access of integrity marked data & decode it

M

M

M

M

Mediation Cocoon

Environment = Operating System External Programs

Program

ChangeMonitor

– Monitor User Interface to detect change actions• Translate GUI actions into application specific modifications

Technical Approach

– Detect update of integrity marked data • Re-encode & re-integrity mark the updated data

• Repair any subsequent Corruption from History• Build on existing research infrastructure

Page 5: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Major Risks and Planned Mitigation

• Ability to detect application-level modificationsApplication Openness Spectrum:– Event-Generators: Capture as transaction history– Scripting API: Examine state to infer action– Black-Box: Mediate GUI to infer action=> Generic Mediators + Tool Specific mapping

Two Level ArchitectureM

M

M

M

Mediation Cocoon

Environment = Operating System External Programs

Program

ChangeMonitor

1. Application Independent GUI Monitor signals action types

2. Application Dependent Change Monitor• Determines Action Parameters

• Logs Modification History

Page 6: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Major Risks and Planned Mitigation

• Ability to detect application-level modificationsApplication Openness Spectrum:– Event-Generators: Capture as transaction history– Scripting API: Examine state to infer action– Black-Box: Mediate GUI to infer action=> Generic Mediators + Tool Specific mapping

• Ability to protect transaction history=> Hide the location of the transaction history

• Virtual File System wrapper• System-level Randomization Techniques

• Tool-Specific Modification Trackers Expensive=> Automate common portions=> Provide rule-based scripting language

Page 7: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Accomplishments To Date

• Corruption Detector– IDs Document Version on Save (in Document)– Records Document Cryptographic Digest on Save– Checks Document Cryptographic Digest on Load

Demo

Demo

• Change Monitor for MS Word 2000– Determines parameters for application-level action– Records transaction history (for possible Replay)

• Corruption Repairer– Rebuilds document by replaying transaction history

Demo

• Operation Coverage– Compound Operations (Undo,AutoCorrect)– Recording “Uninstrumented” Operations

Demo

Page 8: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

MS Word Data Integrity

Technical Approach To Attribution

• Time Lever shows document development– User selects range of interest– Move Forwards through Operations Log– Move Backwards through Undo Stack

Operations Log

Page 9: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Accomplishments To Date

• Corruption Detector– IDs Document Version on Save (in Document)– Records Document Cryptographic Digest on Save– Checks Document Cryptographic Digest on Load

Demo

Demo

• Change Monitor for MS Word 2000– Determines parameters for application-level action– Records transaction history (for possible Replay)

• Corruption Repairer– Rebuilds document by replaying transaction history

Demo

• Operation Coverage– Compound Operations (Undo,AutoCorrect)– Recording “Uninstrumented” Operations

Demo

• Attribution– Forward-Backward Time Control

Demo

Page 10: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

MS Word Data Integrity Major Challenges

• Complexity of Word– 1128 unique commands

– 889 Command Bar controls

– 416 classes with 2594 instance variables

– However only a small subset is commonly used

• Lack of a General Mechanism for Capturing User Operations– Each individual Word function is handled in a specific

implementation.

Page 11: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

MS Word Data Integrity

Majors Areas of Development• Capture of User Operations

– Mostly Word specific implementation– Impacted by complexity of Word

• Version Management and Recovery

• Attribution

Page 12: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

MS Word Data Integrity

Capture of User Operations

Category

Total Implemented

N % N Coverage (%)

Common 19 7 17 89

Infrequent 42 16 8 19

Hardly Ever 205 77 0 0

• Status– Instrumented most GUI Interaction Mechanisms– Implemented most of the most used operations

Survey of Word operations usage(includes only text-based operations that modify document content)

Page 13: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

MS Word Data Integrity

User Operation Capture Completion Strategy

• Detect UnInstrumented User Changes– Method: Unmediated change to Undo Stack

• Record Modification1. Localize Scope of Change

– Record Scoped Change

2. Checkpoint Document

Page 14: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

PowerPoint Data Integrity

• Reuse existing capabilities– Corruption Detection Wrapper– Recording/Replay Mechanism– Office2000 Instrumentation– (PowerPoint) Design Editor Change Monitor

• Unique Development– Instrument Remaining PowerPoint Operations

Page 15: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Data Integrity

To Do• MS Word Data Integrity

– Finish set of commonly used operations (from survey)– Default mechanism to handle non instrumented

changes– Finish Attribution

• Power Point Data Integrity– We expect significant reuse of Word instrumentation

• Demonstrate Data Integrity in Military System– Identify mission critical Word/PowerPoint use– Package system for test deployment

Page 16: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Safe Email Attachments Accomplishments To Date

• Wrapper protects email attachment execution– Automatically spawned when attachment opened– Restricts

• Files that can be read/written• Remote Sites that can be downloaded-from/uploaded-to• Portions of Registry that can be read/written• Processes that can be spawned

Demo

• Email Attachment Context Determined• Alerts Logged with Context• AIA Experiment conducted with IMSC(Musman)

Page 17: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Required for Deployment

Safe Email Attachments

• Testing Status– Functionality Testing (MitreTek): Completed– Rule Testing (MitreTek): Imminent

• Allows normal behavior (Absence of False Positives)• Blocks malicious behavior

• To Do– Packaging for Deployment

• Installation• Documentation• Test for proper installation

– Implement Switch-Rules– Each attachment opened in separate process (hard)– Protect additional Resources (devices, COM)

Page 18: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Safe Email Attachments

• Planned Deployment– Aug: Alpha at Teknowledge/MitreTek– Sept: Beta at DARPA– Nov: Pilot at military command (TBD)

AprJun

Page 19: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Task Schedule

• Dec99: Tool-Level Integrity Manager– Monitor & Authorize Tool access & updates

• Jun00: Operation-Level Integrity Manager – Monitor, Authorize, & Record Modifications

• Dec00: Integrity Management for MS-Office• Jun01: Corruption Repair• Dec01: Integrity Management for

Mission Critical Military System• Jun02: Automated Modification Tracking

Word

Jun01: PowerPoint

Page 20: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

Enforced Policies• MS Word documents (PowerPoint next)

– Attack: Document corrupted between usages– Policy: Check integrity when used. Rebuild if corrupted– Attack: Insider corrupts document using Word/PowerPoint– Policy: Log changes. Attribute changes to individuals

• Suspect Programs– Attack: Program may harm persistent resources– Policy: Copy files just before they are modified.

Rollback when requested• Email-Attachments (Web Browsers)

– Attack: Program may harm resources– Policy: Restrict access/modification of resources

• Executables– Attack: Unauthorized changes are made to executables– Policy: Integrity Check executables before loading

Prohibit unauthorized modification of executables

Page 21: Integrity Through Mediated Interfaces PI Meeting Feb. 15, 2001 Bob Balzer, Marcelo Tallis Teknowledge @teknowledge.com Legend: Turquoise Changes from July99

(To Be) Enforced Policies

• <Program> can’t leave any persistent files after it terminates

• <Program> can only create/access files in <directory> that are selected by user

• <Program> can only modify files it creates