Integrity Protection and Access Control - Who Do You Trust? by Glenn Wurster, BlackBerry
Integrity Protection and Access Control - Who Do You Trust? - Glenn Wurster, BlackBerry
Without file-system and boot integrity for all storage, on-line access control against a physical attacker is a masquerade. Using an off-line attack, an attacker can change the permissions, contents, and even the SELinux label of a file not integrity protected. What does SELinux do if it can’t trust its labels? One solution is to encrypt all file-systems using hardware backed keys. In this talk I will start by talking about a LSM created for the BlackBerry Priv that ties running with elevated privileges (including SEAndroid domains) to integrity protection. The approach is designed to limit the risk of a system service executing a binary on the user data partition with elevated privileges. After talking about the specific LSM developed, I will expand the focus to the general intersection between integrity protection and access control.
About Glenn Wurster
Glenn Wurster is currently a Principal Security Researcher with B
1 view
126
41
2 months ago 08:37:35 1
Elon Musk: Neuralink and the Future of Humanity | Lex Fridman Podcast #438
2 months ago 00:34:37 1
Scientific integrity
2 months ago 00:00:57 1
Sonic 3 (PHONK EPIC VIDEO) ft. Narvent 4K
2 months ago 01:00:19 1
963 Hz Opens All the Paths of Your Destiny | Abundance, Blessings, Protection of the Universe
2 months ago 00:03:25 1
Effortless Carrier Lock Unlock for All Phone Brands
2 months ago 00:10:04 1
BREAKING: Senior Meta Engineer Reveals Anti-Kamala Posts Are “Automatically Demoted”
2 months ago 01:01:52 1
La France serait-elle capable d’intégrer les BRICS ?
2 months ago 00:20:00 1
Dutch Police Refuse to Guard Jewish Sites Due to ’Moral Objections’
2 months ago 03:01:22 1
Inside the french mafia - Revealing The Untold Dark Side Of Fench Society - Full Documentary - Y2