• Corpus ID: 1655474

The COPS Security Checker System

@inproceedings{Farmer1990TheCS,
  title={The COPS Security Checker System},
  author={Dan Farmer and Eugene H. Spafford},
  booktitle={USENIX Summer},
  year={1990}
}
In the past several years, there have been a large number of published works that have graphically described a wide variety of security problems particular to UNIX. Without fail, the same problems have been discussed over and over again, describing the problems with sum (set user ID) programs, improper file permissions, and bad passwords (to name a few). There are two common characteristics to each of these problems: first, they are usually simple to correct, if found; second, they are fairly… 
Observing Reusable Password Choices
TLDR
This paper constructed a method of sampling real passwords choices as they were made by users, to provide a mechanism that is effective for workstations with little or no disk as well as mainframes.
Observing Reusable Password Choices Purdue Technical Report CSD – TR 92 – 049
TLDR
This paper constructed a method of sampling real passwords choices as they were made by users, to provide a mechanism that is effective for workstations with little or no disk as well as mainframes.
TrustedBox: a kernel-level integrity checker
  • Pietro Iglio
  • Computer Science
    Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
  • 1999
TLDR
TrustedBox is designed and implemented, a kernel-level integrity checker that can be used to enforce a very restricted security policy and that allows users to use the same system to perform untrusted operations.
Specifying and Checking UNIX Security Constraints
TLDR
This article shows how to represent various UNIX security constraints-including those described in a well-known paper on IINIX security (S)-using the authors' graphical specification language, and the results obtained from running tools to check an actual UNIX file system against these constraints.
UNIX and Security: The Influences of History
  • E. Spafford
  • Computer Science
    Inf. Secur. J. A Glob. Perspect.
  • 1995
TLDR
This paper describes how the history and development of UNIX can be viewed as the source of the most serious problems.
Unix and Security: the in Blockinuences of History
TLDR
The history and development of Unix can be viewed as the source of many serious problems and some suggestions are made of approaches to help increase the security of the system, and of the Unix community.
Preventing Weak Password Choices
TLDR
This paper describes a space-efficient method of storing a didionary of words that are not allowed as password choices, and the mechanism described has other interesting features, a few of which are described here.
The design and implementation of tripwire: a file system integrity checker
TLDR
The design and implementation of the Tripwire tool is described, which is tool that aids UNIX system administrators and users in monitoring a designated set of files and directories for any changes, and is highly configurable.
Cluster Security with NVisionCC: The Forseti Distributed File Integrity Checker
TLDR
Forseti was designed to address the shortcomings exhibited by existing host-based intrusion detection systems when used in the cluster environment and to provide a means of detecting changes to critical system files made by root-level adversaries.
Using Attack Injection to Discover New Vulnerabilities
TLDR
A new tool for the discovery of security vulnerabilities on network connected servers, which uses a specification of the server's communication protocol to automatically generate a large number of attacks accordingly to some predefined test classes, and can discover several kinds of vulnerabilities, including a previously unknown vulnerability.
...
...

References

SHOWING 1-10 OF 35 REFERENCES
Rule Based Analysis of Computer Security
TLDR
A tool for improving the operational security of discretionary access control systems is described, a rule based system that knows about the behavior of the computer''s software and the tricks used by attackers and deduces the set of privileges directly or indirectly accessible to each user.
The UNIX system UNIX operating system security
TLDR
Some of the security hazards of the UNIX™ operating system are discussed, and ways to protect against them are suggested, in the hope that an educated community of users will lead to a level of protection that is stronger, but far more importantly, that represents a reasonable and thoughtful balance between security and ease of use of the system.
The awk programming language
TLDR
The AWK Lanaguage, an Assembler and Interpreter for Drawing Graphs, and AWK as a Language, a guide to computing with AWK and its applications.
A Loss of Innocence
Computer Viruses
UNIX Operating System Security
C++ Programming Language
TLDR
Bjarne Stroustrup makes C even more accessible to those new to the language, while adding advanced information and techniques that even expert C programmers will find invaluable.
The A WI< Programming Language, Addison-Wesley
  • 1988
\Reeections on Trusting Trust
  • Communications of the ACM
  • 1984
...
...