Map
Index
Random
Help
Topics
th

QuoteRef: chenH8_2002

topics > all references > ThesaHelp: references c-d



Topic:
security by access rights
Topic:
authentication
Topic:
state machine
Group:
operating system
Topic:
consistency testing
Topic:
model checker
Topic:
operating system kernel
Topic:
program proving is infeasible
Topic:
automated testing

Reference

Chen, H., Wagner, D., Dean, D., "Setuid demystified", Proceedings of the 11th USENIX Security Symposium, San Francisco, California, USA, August 2002, pp. 171-190. Google

Notes

page numbers from downloaded preprint 1-20

Quotations
abstract ;;Quote: setuid is poorly designed and widely misused; causes security vulnerabilities
abstract+;;Quote: develop finite state model of user ids; uncover pitfalls in setuid, define proper usage, and propose a high-level API
6 ;;Quote: model userids as a finite state automata; each process tracks its privilege level with a real, effective, and saved uid; transitions are system calls
6 ;;Quote: build a finite state model by 1) identifying states as kernel variables and 2) finding transitions by trying every system call; collapse equivalent states
7 ;;Quote: double check the finite state model by setting and getting the user ids
8 ;;Quote: build model-extraction algorithm from getstate(), setstate(), and getallstates(); for each state, determine effect of each system call
11 ;;Quote: the operating system must behave deterministically relative to its finite state model; if not, add global variables to state; each state represented by an equivalence class
12 ;;Quote: verifying a finite state model is much easier that fully understanding a system's behavior; e.g., only four operations on user IDs
13 ;;Quote: use finite state model to check proper usage of uid-setting system calls; build a finite state model of the program; check for privileged regions
18 ;;Quote: setuid API for temporary and permanent privileges; works for OpenSSH; does not handle group privileges

Related Topics up

Topic: security by access rights (38 items)
Topic: authentication (93 items)
Topic: state machine (67 items)
Group: operating system   (27 topics, 924 quotes)
Topic: consistency testing (60 items)
Topic: model checker (49 items)
Topic: operating system kernel (67 items)
Topic: program proving is infeasible (47 items)
Topic: automated testing (25 items)

Collected barberCB 1/05
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.