Security References: Difference between revisions

From miki
Jump to navigation Jump to search
Line 13: Line 13:
== Definitions ==
== Definitions ==
;Secure Boot
;Secure Boot
''Secure Boot'' (<ref name="TCHASK">Löhr, H., Sadeghi, A., Stüble, C., Weber, M., Winandy, M.: Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. In TRUST(2009) 45-62</ref>) is a security property of a bootstrap architecture ensuring that only configurations of a certain property can be loaded. If a modification is detected, the bootstrap process is interrupted.
:''Secure Boot'' (<ref name="TCHASK">Löhr, H., Sadeghi, A., Stüble, C., Weber, M., Winandy, M.: Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. In TRUST(2009) 45-62</ref>) is a security property of a bootstrap architecture ensuring that only configurations of a certain property can be loaded. If a modification is detected, the bootstrap process is interrupted.


;Authenticated Boot
;Authenticated Boot
''Authenticated Boot'' (<ref name="TCHASK"/>) is a security property of a bootstrap architecture ensuring that remote parties can verify properties of the booted configuration.
:''Authenticated Boot'' (<ref name="TCHASK"/>) is a security property of a bootstrap architecture ensuring that remote parties can verify properties of the booted configuration.


;Trusted storage
;Trusted storage
''Trusted storage'' (<ref name="TCHASK"/>) is storage where confidentiality, integrity, and freshness (i.e., protection against replay attacks) of stored data is provided, and where the integrity of the TOE accessing the data is ensured (in order to prevent other software, such as alternative or modified operating systems, from accessing the data).
:''Trusted storage'' (<ref name="TCHASK"/>) is storage where confidentiality, integrity, and freshness (i.e., protection against replay attacks) of stored data is provided, and where the integrity of the TOE accessing the data is ensured (in order to prevent other software, such as alternative or modified operating systems, from accessing the data).


;Trusted Channel
;Trusted Channel
A ''trusted channel'' (<ref name="TCHASK"/>) is a channel between two entities that provides integrity, confidentiality, and authenticity of the transmitted data, and ensures integrity and authenticity of the end points.
:A ''trusted channel'' (<ref name="TCHASK"/>) is a channel between two entities that provides integrity, confidentiality, and authenticity of the transmitted data, and ensures integrity and authenticity of the end points.


== References ==
== References ==

Revision as of 11:52, 28 June 2011

Development

  • CWE/SANS TOP 25 Most Dangerous Programming Errors
  • Reflections on Trusting Trust How does writing the C compiler in C bear on security issues? Well, it does (Ken Thompson, Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763)
    • The idea is to hide a trojan code in the C compiler so that to inject a trojan code in eg. the login command code, and another trojan code so that to automatically re-inject itself when the C code is compiled with the infected compiler.

PKI

On trust model flaw in browser CAs:

  • "it will CLEARLY not solve the browser security problem.", "the certifications made by even the best of those CAs are effectively MEANINGLESS" "the users are well trained to ignore EVERY browser warning they EVER get" "the ENTIRE question of OCSP is somewhat irrelevant." "spritzing the SKUNK with eau de cologne." "hanging garlands from the corpses ears."' (Cfr mail A mighty fortress is our PKI, Part II (ventzi nikov, 2010 Jul 29 09:06)

Authentication

Definitions

Secure Boot
Secure Boot ([1]) is a security property of a bootstrap architecture ensuring that only configurations of a certain property can be loaded. If a modification is detected, the bootstrap process is interrupted.
Authenticated Boot
Authenticated Boot ([1]) is a security property of a bootstrap architecture ensuring that remote parties can verify properties of the booted configuration.
Trusted storage
Trusted storage ([1]) is storage where confidentiality, integrity, and freshness (i.e., protection against replay attacks) of stored data is provided, and where the integrity of the TOE accessing the data is ensured (in order to prevent other software, such as alternative or modified operating systems, from accessing the data).
Trusted Channel
A trusted channel ([1]) is a channel between two entities that provides integrity, confidentiality, and authenticity of the transmitted data, and ensures integrity and authenticity of the end points.

References

  1. 1.0 1.1 1.2 1.3 Löhr, H., Sadeghi, A., Stüble, C., Weber, M., Winandy, M.: Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. In TRUST(2009) 45-62