The COPS Security Checker System
@inproceedings{Farmer1990TheCS, title={The COPS Security Checker System}, author={Dan Farmer and Eugene H. Spafford}, booktitle={USENIX Summer}, year={1990} }
In the past several years, there have been a large number of published works that have graphically described a wide variety of security problems particular to UNIX. Without fail, the same problems have been discussed over and over again, describing the problems with sum (set user ID) programs, improper file permissions, and bad passwords (to name a few). There are two common characteristics to each of these problems: first, they are usually simple to correct, if found; second, they are fairly…
191 Citations
Observing Reusable Password Choices
- Computer Science
- 1992
This paper constructed a method of sampling real passwords choices as they were made by users, to provide a mechanism that is effective for workstations with little or no disk as well as mainframes.
Observing Reusable Password Choices Purdue Technical Report CSD – TR 92 – 049
- Computer Science
- 1992
This paper constructed a method of sampling real passwords choices as they were made by users, to provide a mechanism that is effective for workstations with little or no disk as well as mainframes.
TrustedBox: a kernel-level integrity checker
- Computer ScienceProceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
- 1999
TrustedBox is designed and implemented, a kernel-level integrity checker that can be used to enforce a very restricted security policy and that allows users to use the same system to perform untrusted operations.
Specifying and Checking UNIX Security Constraints
- Computer ScienceComput. Syst.
- 1994
This article shows how to represent various UNIX security constraints-including those described in a well-known paper on IINIX security (S)-using the authors' graphical specification language, and the results obtained from running tools to check an actual UNIX file system against these constraints.
UNIX and Security: The Influences of History
- Computer ScienceInf. Secur. J. A Glob. Perspect.
- 1995
This paper describes how the history and development of UNIX can be viewed as the source of the most serious problems.
Unix and Security: the in Blockinuences of History
- Computer Science
- 1992
The history and development of Unix can be viewed as the source of many serious problems and some suggestions are made of approaches to help increase the security of the system, and of the Unix community.
Preventing Weak Password Choices
- Computer Science
- 1991
This paper describes a space-efficient method of storing a didionary of words that are not allowed as password choices, and the mechanism described has other interesting features, a few of which are described here.
The design and implementation of tripwire: a file system integrity checker
- Computer ScienceCCS '94
- 1994
The design and implementation of the Tripwire tool is described, which is tool that aids UNIX system administrators and users in monitoring a designated set of files and directories for any changes, and is highly configurable.
Cluster Security with NVisionCC: The Forseti Distributed File Integrity Checker
- Computer Science
- 2005
Forseti was designed to address the shortcomings exhibited by existing host-based intrusion detection systems when used in the cluster environment and to provide a means of detecting changes to critical system files made by root-level adversaries.
Using Attack Injection to Discover New Vulnerabilities
- Computer ScienceInternational Conference on Dependable Systems and Networks (DSN'06)
- 2006
A new tool for the discovery of security vulnerabilities on network connected servers, which uses a specification of the server's communication protocol to automatically generate a large number of attacks accordingly to some predefined test classes, and can discover several kinds of vulnerabilities, including a previously unknown vulnerability.
References
SHOWING 1-10 OF 35 REFERENCES
Rule Based Analysis of Computer Security
- Computer ScienceCOMPCON
- 1987
A tool for improving the operational security of discretionary access control systems is described, a rule based system that knows about the behavior of the computer''s software and the tricks used by attackers and deduces the set of privileges directly or indirectly accessible to each user.
The UNIX system UNIX operating system security
- Computer ScienceAT&T Bell Laboratories Technical Journal
- 1984
Some of the security hazards of the UNIX™ operating system are discussed, and ways to protect against them are suggested, in the hope that an educated community of users will lead to a level of protection that is stronger, but far more importantly, that represents a reasonable and thoughtful balance between security and ease of use of the system.
The awk programming language
- Computer Science
- 1988
The AWK Lanaguage, an Assembler and Interpreter for Drawing Graphs, and AWK as a Language, a guide to computing with AWK and its applications.
C++ Programming Language
- Computer ScienceIEEE Softw.
- 1986
Bjarne Stroustrup makes C even more accessible to those new to the language, while adding advanced information and techniques that even expert C programmers will find invaluable.
The A WI< Programming Language, Addison-Wesley
- 1988
\Reeections on Trusting Trust
- Communications of the ACM
- 1984