ECS 289L: Homework 1

FQ '99
Due: Thurs: 21 Oct. 1999

  1. Consider two users A and B with the following privileges: A can read and write a file F and read, write and execute a service program P; B can only read F and execute P. An intruder has managed to:
  2. For each of these cases, describe a simple scenario (if one exists) that would lead to each of the following problems:

  3. Consider five objects A, B, D1, D2, and D3 as in the Hydra operating system. Show the graphical representation of the objects' capabilities such that the following operations may be performed:
  4. Each object should have only the minimal set of capabilities and rights necessary to accomplish the preceding operations. Assume that the capability for a procedure must contain the right c (for call) in order to be called.

  5. Consider the diagram you constructed for problem 2.
  6. Consider two processes in the Hydra operating system. Process p1 is currently executing in procedure P1 and process p2 is executing in procedure P2? Another procedure X and three data objects D1, D2, and D3 exist in the system. The capability lists are as follows:

  7.  
    Capability for Object Rights
    P1 X
    D2
    cms
    emrw
    P2 D1
    D3
    l
    l
    X D1
    D2
    ews
    mrws

  8. Assume that the generic set of rights in the access matrix model contains also contains the rights t (take) and g (grant), similar to the take-grant model.
  9. Construct a take-grant graph G in which a given subject s1 can never gain direct access to an object o1, that is the predicate can_share(r,s1,o1,G) is false for an r, yet it is still possible for information contained in o1 to reach s1 (i.e., to flow from o1 to s1).
  10. For each of the following take-grant graphs G, prove that the predicate can_share(r,x1,x3,G) holds:
  11.   T    TR
    .---
    _.---_.
    x1    x2    x3

      T    GR
    .<---.<---.
    x1    x2    x3

      G    TR
    .---_.---_.
    x1    x2    x3

      G    TR
    .<---.<---.
    x1    x2    x3

      G    GR
    .---_.---_.
    x1    x2    x3

      T    TR
    .<---.<---.
    x1    x2    x3

    Show the corresponding sequences of transformations from G to Gn, where Gn is the first state containing the edge x1 -> x3.

  12. Consider a system consisting of two subjects s1 and s2 and four objects o1 through o4.
  13. Consider the set of security classes C={00,01,10,11} in the lattice model of information flow. Define the flow relation -> and the class-combining operator + such that (C, ->, +) forms a lattice with the following:
  14. Repeat exercise 9 for the set of security classes C={(XYZ) | X,Y,Z e {0,1}} and the bounds 000 and 111.

ECS 289L | CS Department | UC Davis