Outline for April 25, 1997
- Greetings and Felicitations
- Remember to write up what you find
- Vulnerabilities Models
- RISOS (1975), to let managers, etc. know about integrity problems
- PA (1976-78), automated checking of programs
- NSA, contents unknown but similar to PA and RISOS
- Aslam, fault-based; for C programs
- Landwehr, classify according to attack purpose as well as type; based on
RISOS
- Bishop, still being developed
- RISOS (Research Into Secure Operating Systems); Abbott et al.
- Improper parameter validation
- Inconsistent parameter validation
- Implicit sharing of privileged data
- Asynchronous validation/incorrect serialization (eg., TOCTTOU)
- Inadequate identification/authorization/authentication
- Violable prohibition/limit
- Exploitable logic error
- PA (Protection Analysis); Bisbey et al.
- Improper protection domain; 5 subclasses
- Improper initial protection domain
- Improper isolation of implementation details
- Improper change, (TOCTTOU flaws)
- Improper naming
- Improper deletion/deallocation
- Improper validation
- Improper synchronization; 2 subclasses
- Improper divisibility
- Improper sequencing
- Improper choice of operand and operation
- Note: PA classes map into RISOS classes and vice versa
Notes by Peter Mell:
[Postscript]
[Text]
You can get this document in
Postscript,
ASCII
text,
or
Framemaker
version 5.1.
Send email to
cs253@csif.cs.ucdavis.edu.
Department of Computer Science
University of California at Davis
Davis, CA 95616-8562
Page last modified on 5/12/97