作者
Divya Muthukumaran, Sandra Rueda, Nirupama Talele, Hayawardh Vijayakumar, Jason Teutsch, Trent Jaeger
发表日期
2012/12/3
图书
Proceedings of the 28th Annual Computer Security Applications Conference
页码范围
269-278
简介
Modern distributed systems are composed from several off-the-shelf components, including operating systems, virtualization infrastructure, and application packages, upon which some custom application software (e.g., web application) is often deployed. While several commodity systems now include mandatory access control (MAC) enforcement to protect the individual components, the complexity of such MAC policies and the myriad of possible interactions among individual hosts in distributed systems makes it difficult to identify the attack paths available to adversaries. As a result, security practitioners react to vulnerabilities as adversaries uncover them, rather than proactively protecting the system's data integrity. In this paper, we develop a mostly-automated method to transform a set of commodity MAC policies into a system-wide policy that proactively protects system integrity, approximating the Clark-Wilson …
引用总数
201220132014201520162017201820192020202120222023112211221
学术搜索中的文章
D Muthukumaran, S Rueda, N Talele, H Vijayakumar… - Proceedings of the 28th Annual Computer Security …, 2012