1987 IEEE Symposium on Security and Privacy 1987
DOI: 10.1109/sp.1987.10011
|View full text |Cite
|
Sign up to set email alerts
|

Limiting the Damage Potential of Discretionary Trojan Horses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

1993
1993
2015
2015

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(37 citation statements)
references
References 4 publications
0
37
0
Order By: Relevance
“…Karger first proposed using access control for vulnerability mitigation while working on capability systems [18], and took as his threat model the trojan horse: subverted software working on behalf of the adversary. Contemporary compartmentalization for vulnerability mitigation, sometimes referred to as privilege separation, saw its foundations in work by Provos et al [35] and Kilpatrick [19], and has been applied to complex, security-relevant programs such as OpenSSH and the Chromium web browser, both of which hold substantial effective privilege and perform complex processing of untrustworthy, network-originated data.…”
Section: Conceptual Frameworkmentioning
confidence: 99%
“…Karger first proposed using access control for vulnerability mitigation while working on capability systems [18], and took as his threat model the trojan horse: subverted software working on behalf of the adversary. Contemporary compartmentalization for vulnerability mitigation, sometimes referred to as privilege separation, saw its foundations in work by Provos et al [35] and Kilpatrick [19], and has been applied to complex, security-relevant programs such as OpenSSH and the Chromium web browser, both of which hold substantial effective privilege and perform complex processing of untrustworthy, network-originated data.…”
Section: Conceptual Frameworkmentioning
confidence: 99%
“…The work in [19,51] proposes interposing, between programs and the actual file system, a protected system imposing further restrictions. In particular, Boebert and Ferguson [19] forces all files to go through a dynamic linker that compares the name of the user who invoked the program, the name of the originator of the program, and the name of the owner of any data files.…”
Section: Authorization-based Information Flow Policiesmentioning
confidence: 99%
“…If a user invokes a program owned by someone else and the program attempts to write the user's files, the dynamic linker will recognize the name mismatch and raise an alarm. Karger [51] proposes instead the specification of name restrictions on the files that programs can access, and the refusal by the system of all access requests not satisfying the given patterns (e.g., a FORTRAN compiler may be restricted to read only files with suffix ".for" and to create only files with suffix ".obj" and ".lis").…”
Section: Authorization-based Information Flow Policiesmentioning
confidence: 99%
“…With a model-based reasoning, specific models of defending prescribed attacks can be developed [11]. Other approaches are either defining acceptable, as opposed to intrusive, behavior [15], or -on earlier stages of technology -are based on the introduction of trap doors for intruders (i.e. "bogus" user accounts with "magic" passwords, etc.)…”
Section: Related Workmentioning
confidence: 99%