80 likes | 205 Views
This presentation, led by Yu-Chang Shen, examines the Safe-Tcl security model, a mechanism designed to execute untrusted Tcl scripts safely while granting mediated access to potentially dangerous functionalities. It highlights security issues like integrity, privacy, and denial of service attacks, exploring preventive measures such as denying operations that modify host states and establishing security policies based on varying levels of trust. The Padded Cell model's application to Safe-Tcl is discussed, alongside critical insights into designing a secure Safe-Tcl environment.
E N D
The Safe-Tcl Security Model Present by Yu-Chang SHEN 4 May 2001 John K. Ousterout Jacob Y. Levy Brent B. Welch
Outline • Introduction on Safe-Tcl • Security issues • Summary
Safe-Tcl • Safe-TCL is a mechanism for executing untrusted program written in Tcl scripts safely and for providing mediated access by such scripts to potentially dangerous functionality
Command 1 Command 1 Command 2 Command 2 Command 3 Hide Command 4 Command 4 Command 5 Command 5 Aliases Command 6 Hide Master Interpreter Safe Interpreter Padded Cell Model
Security issues • Integrity attacks • Privacy attacks • Denial of Service attacks
Prevent the attacks • Denied all operations that modify, read and transmit the state of the host environment • Setup security policies • Different level of trustiness = Different level of rights
Summary • Padded Cell model in general is similar to User/Kernel space model • Safe-Tcl using padded cell model to prevent integrity and privacy attacks • Safe-Tcl can use security policies to regulate permissions that an applet have
Questions • What is the hardest part of designing Safe-Tcl environment?