Trojan Horse Resistant Discretionary Access Control

被引:0
|
作者
Mao, Ziqing [1 ]
Li, Ninghui [1 ]
Chen, Hong [1 ]
Jiang, Xuxian
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
Access control; Operating system; Information flow;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modem operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandatory Access Control (MAC) systems, but are vulnerable to attacks that use trojan horses or exploit buggy software. We show that it is possible to have the best of both worlds: DAC's easy-to-use discretionary policy and MAC's defense against trojan horses and buggy programs. This is made possible by a key new insight that DAC has weaknesses not because it uses the discretionary principle, but because existing DAC enforcement mechanisms assume that a single pnincipal is responsible for any request, whereas in reality a request may be influenced by multiple principals; thus these mechanisms cannot correctly identify the true origin(s) of a request and fall prey to trojan horses. We propose to solve this problem by combining DAC's policy specification with new enforcement techniques that use ideas from MAC's information flow tracking. Our model, called Information Flow Enhanced DAC (IFEDAC), significantly strengthens end host security, while preserving to a large degree DAC's ease of use. In this paper, we present the IFEDAC model, analyze its security properties, and discuss our implementation for Linux.
引用
收藏
页码:237 / 246
页数:10
相关论文
共 50 条
  • [1] How to make Discretionary Access Control secure against trojan horses
    Li, Ninghui
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 3620 - 3622
  • [2] Open access publishing - Panacea or Trojan horse?
    Graczynski, MR
    Moses, L
    [J]. MEDICAL SCIENCE MONITOR, 2004, 10 (01): : ED1 - ED3
  • [3] On safety in discretionary access control
    Li, NH
    Tripunitara, MV
    [J]. 2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, : 96 - 109
  • [4] The complexity of discretionary access control
    Dranger, Stephen
    Sloan, Robert H.
    Solworth, Jon A.
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 405 - 420
  • [5] Acinetobacter - the trojan horse of infection control?
    Teare, L.
    Martin, N.
    Elamin, W.
    Pilgrim, K.
    Tredoux, T.
    Swanson, J.
    Hoffman, P.
    [J]. JOURNAL OF HOSPITAL INFECTION, 2019, 102 (01) : 45 - 53
  • [6] Re: Open access publishing - Panacea or Trojan horse?
    Doi, S
    [J]. MEDICAL SCIENCE MONITOR, 2004, 10 (04): : LE3 - LE4
  • [7] Biofortification: Trojan horse of corporate food control?
    Elenita C Daño
    [J]. Development, 2014, 57 (2) : 201 - 209
  • [8] A type system for Discretionary Access Control
    Bugliesi, Michele
    Colazzo, Dario
    Crafa, Silvia
    Macedonio, Damiano
    [J]. MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2009, 19 (04) : 839 - 875
  • [9] Type based discretionary access control
    Bugliesi, M
    Colazzo, D
    Crafa, S
    [J]. CONCUR 2004 - CONCURRENCY THEORY, PROCEEDINGS, 2004, 3170 : 225 - 239
  • [10] Persistent carbapenem-resistant Klebsiella pneumoniae: a Trojan horse
    Yang, Zhi-Qiang
    Huang, Yong-Lu
    Zhou, Hong-Wei
    Zhang, Rong
    Zhu, Kui
    [J]. LANCET INFECTIOUS DISEASES, 2018, 18 (01): : 22 - 23