2012
DOI: 10.1007/978-3-642-35170-9_21
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing the OS against Security Threats in System Administration

Abstract: Abstract. The consequences of security breaches due to system administrator errors can be catastrophic. Software systems in general, and OSes in particular, ultimately depend on a fully trusted administrator whom is granted superuser privileges that allow him to fully control the system. Consequently, an administrator acting negligently or unethically can easily compromise user data in irreversible ways by leaking, modifying, or deleting data. In this paper we propose a new set of guiding principles for OS des… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Attackers may attempt to breach into the systems in various ways, either through an external vector, e.g., by exploiting software bugs or, configuration errors [7], or via an internal vector, e.g., through, malicious admins [8,85], or employees victim of social engineering attacks [111]. These threats are even more pronounced due to virtualization in the cloud, where a co-located tenant [107] or even a malicious cloud administrator [106] can violate the confidentiality and integrity properties.…”
Section: Introductionmentioning
confidence: 99%
“…Attackers may attempt to breach into the systems in various ways, either through an external vector, e.g., by exploiting software bugs or, configuration errors [7], or via an internal vector, e.g., through, malicious admins [8,85], or employees victim of social engineering attacks [111]. These threats are even more pronounced due to virtualization in the cloud, where a co-located tenant [107] or even a malicious cloud administrator [106] can violate the confidentiality and integrity properties.…”
Section: Introductionmentioning
confidence: 99%