DocumentCode :
3467879
Title :
Security relevancy analysis on the registry of Windows NT 4.0
Author :
Du, Wenliang ; Garg, Praerit ; Mathur, Aditya P.
Author_Institution :
Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
fYear :
1999
fDate :
1999
Firstpage :
331
Lastpage :
338
Abstract :
Many security breaches are caused by inappropriate inputs, crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inputs are filtered out by the program, or to ensure that only trusted people can access those inputs. In the second approach, we certainly do not want to put such a constraint on every input; instead, we only want to restrict the access to the security-relevant inputs. This paper investigates how to identify which inputs are relevant to system security. We formulate the problem as a security relevancy problem and deploy static analysis technique to identify security-relevant inputs. Our approach is based on the dependency analysis technique; it identifies whether the behavior of any security-critical action depends on a certain input. If such a dependency relationship exists, we say that the input is security-relevant, otherwise we say the input is security-nonrelevant. This technique is applied to a security analysis project initiated by the Microsoft Windows NT Security Group. The project is intended to identify security-relevant registry keys in the Windows NT operating system. The results from this approach proved useful to enhancing Windows NT security. Our experiences and results from this project are presented in this paper
Keywords :
operating systems (computers); security of data; system monitoring; Microsoft Windows NT 4.0; inappropriate inputs; malicious intent; operating system; registry keys; security breaches; security relevancy analysis; security-critical actions; security-relevant input identification; static analysis; system security enhancement; trusted people; Computer security; Control systems; Data security; Electrical capacitance tomography; Hip; Information security; Operating systems; Read only memory; Tellurium; Terminology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1999. (ACSAC '99) Proceedings. 15th Annual
Conference_Location :
Phoenix, AZ
ISSN :
1063-9527
Print_ISBN :
0-7695-0346-2
Type :
conf
DOI :
10.1109/CSAC.1999.816044
Filename :
816044
Link To Document :
بازگشت