• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Security mechanisms and policy for mandatory access control in computer systems (2010)

by G Wurster
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

Reducing Unauthorized Modification of Digital Objects

by Paul C. van Oorschot, Glenn Wurster
"... We consider the problem of malicious modification of digital objects. We present a protection mechanism designed to protect against unauthorized replacement or modification of digital objects while still allowing authorized updates transparently. We use digital signatures without requiring any centr ..."
Abstract - Cited by 5 (4 self) - Add to MetaCart
We consider the problem of malicious modification of digital objects. We present a protection mechanism designed to protect against unauthorized replacement or modification of digital objects while still allowing authorized updates transparently. We use digital signatures without requiring any centralized public key infrastructure. To explore the viability of our proposal, we apply the approach to file-system binaries, implementing a prototype in Linux which protects operating system and application binaries on disk. To test the prototype and related kernel modifications, we show that it protects against various rootkits currently available while incurring minimal overhead costs. The general approach can be used to restrict updates to general digital objects.

A Control Point for Reducing Root Abuse of File-System Privileges

by Glenn Wurster, Paul C. Van Oorschot
"... We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first involves recognizing and separating out the ability to configure a system from the ability to use the system to perform task ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first involves recognizing and separating out the ability to configure a system from the ability to use the system to perform tasks. The permission to modify configuration of the system is then further subdivided in order to restrict applications from modifying the file-system objects of other applications. We explore the division of root’s current ability to change arbitrary files on disk and discuss a prototype that proves out the viability of the approach for designated system-wide file-system objects. Our architecture exposes a control point available for use to enforce policies that prevent one application from modifying another’s file-system objects. In addition, we review in detail the permissions given to current installers, and alternative approaches for secure software installation.
(Show Context)

Citation Context

...t prevent applications from simply providing their own installer (or install script), bypassing the limits enforced by the package manager. This paper includes work from the first author’s PhD thesis =-=[64]-=-. Relative to the preliminary workshop paper [66], this paper expands the work by evaluating current installers, introducing the concept of restricting configuration changes at a per-application granu...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University