Proceedings of the 2005 Workshop on New Security Paradigms - NSPW '05 2005
DOI: 10.1145/1146269.1146294
|View full text |Cite
|
Sign up to set email alerts
|

Empirical privilege profiling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
10
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…These privilege associations provide very little policy abstraction other than the granularity of the privileges assigned making the policy either inexpressive or extremely large and complex (Garfinkel, 2003). Translating high level security goals into finely grained policies is difficult, making these policies difficult to both construct and verify for correctness (Marceau and Joyce, 2005).…”
Section: Application-oriented Access Control Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…These privilege associations provide very little policy abstraction other than the granularity of the privileges assigned making the policy either inexpressive or extremely large and complex (Garfinkel, 2003). Translating high level security goals into finely grained policies is difficult, making these policies difficult to both construct and verify for correctness (Marceau and Joyce, 2005).…”
Section: Application-oriented Access Control Modelsmentioning
confidence: 99%
“…For example, although a DTE domain represents a policy abstraction, domains typically apply to a single application only (Marceau and Joyce, 2005). Additionally, there is significant overlap of privileges granted to compiled domain policies and yet domains are specified separately (Jaeger et al, 2003).…”
Section: Application-oriented Access Control Modelsmentioning
confidence: 99%
“…In this project, the wrapper technology was further developed to map the locations of DLLs in memory, trace the program stack from the call to ntdll.dll up to the call from the main binary, and to note the transitions from one DLL to another. This technique made it possible to track calls between executables; the technology was also used in a successful DARPA-funded effort [Marceau05] to profile resource use by applications.…”
Section: Performance Penalty For a MIX Of Dll Functionsmentioning
confidence: 99%
“…This innovation is made possible by empirical privilege profiling, an automatic technique pioneered by the proposed principal investigator [Marceau05] that identifies how resources are used by an application. A naYve approach might be to simply list, for example, the files used by an application during execution; however, such an approach fails to abstract away from actual files to concepts such as "the log file" or "the file being edited."…”
mentioning
confidence: 99%
“…As described in [Marceau05], empirical privilege profiling depends on knowing the location where control left an application binary and (possibly through various library functions) resulted in a call to a kernel operation. Further, this technique is not applicable to programs written in interpreted languages-such as Java or languages compiled with .Net-since for such applications, the binary executable is the interpreter.…”
mentioning
confidence: 99%