Analyzing the Security of an Existing Computer System
Citation
- M. Bishop, “Analyzing the Security of an Existing Computer System,”
Proceedings of the 1986 Fall Joint Computer Conference
pp. 1115–1119 (Nov. 1986).
Paper
Bibliographic Information
Abstract
Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on “thought experiments” as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the “thought experiment” by writing a special manual for parts of the operating system, system programs, and library subroutines.
Copyright Notice
©1986 by IEEE.
The definitive version was published in
Proceedings of the 1986 Fall Joint Computer Conference,1986 and id available at
http://dl.acm.org/citation.cfm?id=324493.325066.