DocumentCode
3135842
Title
Multics security evaluation: vulnerability analysis
Author
Karger, Paul A. ; Schell, Roger R.
Author_Institution
HQ Electron. Syst. Div., Hanscom AFB, MA, USA
fYear
2002
fDate
2002
Firstpage
127
Lastpage
146
Abstract
A security evaluation of Multics for potential use as a two-level (Secret/Top Secret) system in the Air Force Data Services Center (AFDSC) is presented. An overview is provided of the present implementation of the Multics Security controls. The report then details the results of a penetration exercise of Multics on the HIS 645 computer. In addition, preliminary results of a penetration exercise of Multics on the new HIS 6180 computer are presented. The report concludes that Multics as implemented today is not certifiably secure and cannot be used in an open use multi-level system. However, the Multics security design principles are significantly better than other contemporary systems. Thus, Multics as implemented today, can be used in a benign Secret/Top Secret environment. In addition, Multics forms a base from which a certifiably secure open use multi-level system can be developed.
Keywords
military computing; operating systems (computers); security of data; Air Force Data Services Center; HIS 6180 computer; HIS 645 computer; Multics security evaluation; military systems; open use multi-level system; two-level system; vulnerability analysis; Application software; Computer security; Control systems; Data security; Electrostatic discharge; Hardware; Information security; Military computing; Operating systems; Time sharing computer systems;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Applications Conference, 2002. Proceedings. 18th Annual
ISSN
1063-9527
Print_ISBN
0-7695-1828-1
Type
conf
DOI
10.1109/CSAC.2002.1176286
Filename
1176286
Link To Document