skip to main content
article

Cost profile of a highly assured, secure operating system

Published:01 February 2001Publication History
Skip Abstract Section

Abstract

The Logical Coprocessing Kernel (LOCK) began as a research project to stretch the state of the art in secure computing by trying to meet or even exceed the “A1” requirements of the Trusted Computer System Evaluation Criteria (TCSEC). Over the span os seven years, the project was transformed into an effort to develop and deploy a product: the Standard Mail Guard (SMG). Since the project took place under a US government contract, the development team needed to maintain detailed records of the time spent on the project. The records from 1987 to 1992 have been combined with information about software code size and error detection. This information has been used to examine the practical impacts of high assurance techniques on a large-scale software development program. Tasks are associated with the A1 formal assurance requirements added approximately 58% to the development cost of security-critical software. In exchange for these costs, the formal assurance tasks (formal specifications, proofs, and specification code correspondence) uncovered 68% of the security flaws detected in LOCK's critical security mechanisms. However, a study of flaw detection during the SMG program found that only 14% of all flaws detected were of the type that could be detected using formal assurance, and that the work of the formal assusrance team only accounted for 19% of all flaws detected. While formal assurance is clearly effective at detecting flaws, its practicality hinges on the degree to which the formally modeled system properties represent all of a system's esential properties.

References

  1. AIM TECHNOLOGY. 1988. AIM Technology published price list. AIM Technology, Santa Clara, CA.Google ScholarGoogle Scholar
  2. ANDERSON, J. P. 1972. Computer security technology planning study. Tech. Rep. ESD-TR-73-51. James P. Anderson and Co., Fort Washington, PA.Google ScholarGoogle Scholar
  3. BELL,D.E.AND LA PADULA, L. 1975. Secure computer system: Unified exposition and Multics interpretation. Tech. Rep. ESD-TR-75-306; ESD/AFSC; DTIC AD-A023588.Google ScholarGoogle Scholar
  4. BOEBERT, W. E. 1988. Annotated TCSEC. Tech. Rep. Honeywell Information Systems, Waltham, MA.Google ScholarGoogle Scholar
  5. BOEBERT,W.E.AND KAIN, R. Y. 1985. A practical alternative to hierarchical integrity policies. In Proceedings of the 8th National Conference on Computer Security. 18-27.Google ScholarGoogle Scholar
  6. BOEBERT,W.E.,KAIN,R.Y.,AND YOUNG, W. D. 1985. Secure computing: The secure Ada target approach. Scientific Honeyweller (June).Google ScholarGoogle Scholar
  7. BOEHM, B. 1981. Software Engineering Economics. Prentice-Hall, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. CHESWICK,W.R.AND BELLOVIN, S. M. 1994. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Professional Computing Series. Addison-Wesley Longman Publ. Co., Inc., Reading, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. CHOKHANI, S. 1992. Trusted products evaluation. Commun. ACM 35, 7 (July), 64-76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. CLARK,D.AND WILSON, D. 1987. A comparison of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 184-194.Google ScholarGoogle ScholarCross RefCross Ref
  11. DEMILLO,R.A.,LIPTON,R.J.,AND PERLIS, A. J. 1979. Social processes and proofs of theorems and programs. Commun. ACM 22, 5 (May). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. DENNING, D. E. 1976. A lattice model of secure information flow. Commun. ACM 19, 2 (May), 236-243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. DOD. 1978. Security requirements for automatic data processing (ADP) systems. DOD Directive 5200.28.Google ScholarGoogle Scholar
  14. DOD. 1985. Specification practices. MIL-STD 490A.Google ScholarGoogle Scholar
  15. DOD. 1985. Department of Defense trusted computer system evaluation criteria. Department of Defense Standard DoD 5200.28-STD.Google ScholarGoogle Scholar
  16. DOD COMPUTER SECURITY CENTER. 1985. Computer security requirements: Guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments. CSC-STD-003-85.Google ScholarGoogle Scholar
  17. DOD. 1991. Department of Defense Federal acquisition regulation supplement: 48 code of Federal regulations.Google ScholarGoogle Scholar
  18. FRAIM, L. 1986. The challenge after A1: A view of the security market. In Proceedings of the 9th National Conference on Computer Security (Sept.). 41-46.Google ScholarGoogle Scholar
  19. GOOD,D.I.,AMBLER,A.L.,BROWNE,J.C.,BURGER, W., COHEN, R., HOCH, C., AND WELLS, R. 1977. Gypsy: A language for specification and implementation of verifiable programs. In Proceedings of the ACM Conference on Language Design for Reliable Software (Mar.). ACM Press, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. GOOD,D.I.,COHEN,R.M.,HOCH,C.G.,HUNTER,L.W.,AND HARE, D. F. 1978. Report on the language Gypsy. Tech Rep. ICSCA-CMP-10. University of Texas at Austin, Austin, TX.Google ScholarGoogle Scholar
  21. HAIGH,T.J.AND YOUNG, W. D. 1987. Extending the noninterference version of MLS for SAT. IEEE Trans. Softw. Eng. 13,2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. KAIN, R. Y. 1988. Throughput benchmarks with AIM. Memorandum. LOCK program archives.Google ScholarGoogle Scholar
  23. LAMPSON, B. 1973. A note on the confinement problem. Commun. ACM 16, 10 (Oct.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. LEVIN,T.E.,PADILLA,S.J.,AND SCHELL, R. R. 1989. Engineering results from the A1 formal verification process. In Proceedings of the 12th NIST/NCSC National Conference on Computer Security (Gaithersburg, MD, Oct.). 65-74.Google ScholarGoogle Scholar
  25. LIPNER, S. 1985. Secure system development at Digital Equipment: Targeting the needs of a commercial and government customer base. In Proceedings of the 8th National Conference on Computer Security (Sept.). 47-54.Google ScholarGoogle Scholar
  26. NATIONAL COMPUTER SECURITY CENTER. 1997. Trusted network interpretation of the trusted computer system evaluation criteria. NCSC-TG-005, Version 1.Google ScholarGoogle Scholar
  27. NATIONAL COMPUTER SECURITY CENTER. 1994. Introduction to certification and accreditation. NCSC-TG-029, Version 1.Google ScholarGoogle Scholar
  28. NEUMANN,P.G.,ROBINSON, L., LEVITT,K.N.,BOYER,R.S.,AND SAXENA, A. R. 1975. Provably secure operating system. M79-225. Institute of Communication Research, Stanford University, Stanford, CA.Google ScholarGoogle Scholar
  29. O'BRIEN,R.C.AND ROGERS, C. 1991. Developing applications on LOCK. In Proceedings of the 14th NIST-NCSC National Conference on Computer Security (Washington,DC, Oct.).Google ScholarGoogle Scholar
  30. ROCHKIND, M. J. 1975. The source code control system. IEEE Trans. Softw. Eng. SE-1,4 (Dec.), 364-370.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. SANDHU, R. S. 1993. Lattice-based access control models. IEEE Computer 26, 11, 9-19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. SAYDJARI,O.S.,BECKMAN,J.K.,AND LEAMAN, J. R. 1987. LOCKing computers securely. In Proceedings of the 10th National Conference on Computer Security.Google ScholarGoogle Scholar
  33. SAYDJARI,O.S.,BECKMAN,J.K.,AND LEAMAN, J. R. 1989. LOCK trek: Navigating uncharted space. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA, May 1-3). IEEE Computer Society Press, Los Alamitos, CA.Google ScholarGoogle ScholarCross RefCross Ref
  34. SCHAFFER,M.A.AND WALSH, G. 1988. LOCK/ix: On implementing Unix on the LOCK TCB. In Proceedings of the 11th National Conference on Computer Security (NIST-NCSC, Balti-more, MD, Oct.17-20). National Institute of Standards and Technology, Gaithersburg, MD.Google ScholarGoogle Scholar
  35. SMITH, R. E. 1994. Constructing a high assurance mail guard. In Proceedings of the 17th National Conference on Computer Security (Baltimore, MD).Google ScholarGoogle Scholar
  36. SMITH, R. E. 1996. Sidewinder: Defense in depth using type enforcement. J. Syst. Manage.Google ScholarGoogle Scholar
  37. SMITH, R. E. 2000. Trends in government endorsed security product evaluations. In Proceedings of the 23rd National Conference on Information Systems Security (Baltimore, MD, Oct.).Google ScholarGoogle Scholar
  38. STONEBURNER,G.R.AND SNOW, D. A. 1989. The Boeing MLS LAN: Headed towards an INFOSEC security solution. In Proceedings of the 12th NIST/NCSC National Conference on Computer Security (Gaithersburg, MD, Oct.). 254-266.Google ScholarGoogle Scholar
  39. TAYLOR, T. 1991. FTLS-based security testing for LOCK. In Proceedings of the 14th NIST-NCSC National Conference on Computer Security (Washington,DC, Oct.).Google ScholarGoogle Scholar
  40. THOMSEN,D.AND SCHWARTAU, W. 1996. Is your network secure? BYTE (Jan.).Google ScholarGoogle Scholar
  41. WARE, W. 1970. Security controls for computer systems (U): Report of Defense Science Board Task Force on Computer Security. Rand Rep. R609-1. RAND, Santa Monica, CA.Google ScholarGoogle Scholar
  42. WEISSMAN, C. 1969. Security controls in the ADEPT-50 time-sharing system. In Proceedings of the 1969 Fall Joint Conference on Computers.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Cost profile of a highly assured, secure operating system

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Information and System Security
      ACM Transactions on Information and System Security  Volume 4, Issue 1
      Feb. 2001
      101 pages
      ISSN:1094-9224
      EISSN:1557-7406
      DOI:10.1145/383775
      Issue’s Table of Contents

      Copyright © 2001 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 February 2001
      Published in tissec Volume 4, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader