Design and implementation of an extended reference monitor for trusted operating systems

Hyung Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai

研究成果: Chapter in Book/Report/Conference proceedingConference contribution

3 被引用数 (Scopus)

抄録

Conventional access control schemes have supported confidentiality and integrity acknowledging the necessary organizational security policy in operating systems. However, many runtime attacks in operating systems involve behavioral semantics, indicating that attacks should be seen as a sequence of access operations. Ironically these attacks are legitimate under any access control policy. This is due to the lack of behavioral dimension in security enforcement. We propose an extended reference monitor to include this dimension. Our method is based on safety property specification on system call sequences. The reference monitor checks the trace at runtime for behavior control in Linux operating system.

本文言語英語
ホスト出版物のタイトルInformation Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings
出版社Springer Verlag
ページ235-247
ページ数13
ISBN(印刷版)3540330526, 9783540330523
DOI
出版ステータス出版済み - 2006
イベント2nd International Conference on Information Security Practice and Experience, ISPEC 2006 - Hangzhou, 中国
継続期間: 4 11 20064 14 2006

出版物シリーズ

名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
3903 LNCS
ISSN(印刷版)0302-9743
ISSN(電子版)1611-3349

その他

その他2nd International Conference on Information Security Practice and Experience, ISPEC 2006
国/地域中国
CityHangzhou
Period4/11/064/14/06

All Science Journal Classification (ASJC) codes

  • 理論的コンピュータサイエンス
  • コンピュータ サイエンス(全般)

フィンガープリント

「Design and implementation of an extended reference monitor for trusted operating systems」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル