Analyzing the Security of an Existing Computer System


Citation

Paper

Bibliographic Information

Abstract

Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on “thought experiments” as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the “thought experiment” by writing a special manual for parts of the operating system, system programs, and library subroutines.

Copyright Notice

© IEEE, 1986. The definitive version was published in Proceedings of the 1986 Fall Joint Computer Conference, 1986, and is available at http://portal.acm.org/citation.cfm?id=324493.325066.