1 / 8

The Safe-Tcl Security Model

The Safe-Tcl Security Model. Present by Yu-Chang SHEN 4 May 2001. John K. Ousterout Jacob Y. Levy Brent B. Welch. Outline. Introduction on Safe-Tcl Security issues Summary. Safe-Tcl.

tadhg
Download Presentation

The Safe-Tcl Security Model

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Safe-Tcl Security Model Present by Yu-Chang SHEN 4 May 2001 John K. Ousterout Jacob Y. Levy Brent B. Welch

  2. Outline • Introduction on Safe-Tcl • Security issues • Summary

  3. Safe-Tcl • Safe-TCL is a mechanism for executing untrusted program written in Tcl scripts safely and for providing mediated access by such scripts to potentially dangerous functionality

  4. Command 1 Command 1 Command 2 Command 2 Command 3 Hide Command 4 Command 4 Command 5 Command 5 Aliases Command 6 Hide Master Interpreter Safe Interpreter Padded Cell Model

  5. Security issues • Integrity attacks • Privacy attacks • Denial of Service attacks

  6. Prevent the attacks • Denied all operations that modify, read and transmit the state of the host environment • Setup security policies • Different level of trustiness = Different level of rights

  7. Summary • Padded Cell model in general is similar to User/Kernel space model • Safe-Tcl using padded cell model to prevent integrity and privacy attacks • Safe-Tcl can use security policies to regulate permissions that an applet have

  8. Questions • What is the hardest part of designing Safe-Tcl environment?

More Related