skip to main content
10.1145/1809842.1809848acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Towards analyzing complex operating system access control configurations

Published:11 June 2010Publication History

ABSTRACT

An operating system relies heavily on its access control mechanisms to defend against local and remote attacks. The complexities of modern access control mechanisms and the scale of possible configurations are often overwhelming to system administrators and software developers. Therefore mis-configurations are very common and the security consequences are serious. Given the popularity and uniqueness of Microsoft Windows systems, it is critical to have a tool to comprehensively examine the access control configurations. However, current studies on Windows access control mechanisms are mostly based on known attack patterns. We propose a tool, WACCA, to systematically analyze the Windows configurations. Given the attacker's initial abilities and goals, WACCA generates an attack graph based on interaction rules. The tool then automatically generates attack patterns from the attack graph. Each attack pattern represents attacks of the same nature. The attack subgraphs and instances are also generated for each pattern. Compared to existing solutions, WACCA is more comprehensive and does not rely on manually defined attack patterns. It also has a unique feature in that it models software vulnerabilities and therefore can find attacks that rely on exploiting these vulnerabilities. We study two attack cases on a Windows Vista host and discuss the analysis results.

References

  1. Handle. http://technet.microsoft.com/en-us/sysinternals/bb896655.aspx.Google ScholarGoogle Scholar
  2. Python for Windows extensions. http://python.net/crew/mhammond/win32/.Google ScholarGoogle Scholar
  3. P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 217--224, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Chaudhuri, P. Naldurg, S. K. Rajamani, G. Ramalingam, and L. Velaga. EON: Modeling and analyzing dynamic access control systems with logic programs. In Proceedings of the 15th ACM Conference on Computer and Communications Security, pages 381--390, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. Chen, N. Li, and Z. Mao. Analyzing and comparing the protection quality of security enhanced operating systems. In Proceedings of the 16th Network and Distributed System Security Symposium (NDSS), 2009.Google ScholarGoogle Scholar
  6. S. Chen, J. Dunagan, C. Verbowski, and Y.-M. Wang. A black-box tracing technique to identify causes of least privilege incompatibilities. In Proceedings of the Network and Distributed System Security Symposium, 2005.Google ScholarGoogle Scholar
  7. S. Govindavajhala and A. W. Appel. Windows access control demystified. Technical Report TR-744-06, Department of Computer Science, Princeton University, Jan. 2006.Google ScholarGoogle Scholar
  8. T. X. R. Group. The XSB programming system. http://xsb.sourceforge.net/.Google ScholarGoogle Scholar
  9. J. D. Guttman, A. L. Herzog, J. D. Ramsdell, and C. W. Skorupka. Verifying information flow goals in Security-Enhanced Linux. Journal of Computer Security, 13(1):115--134, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Hicks, S. Rueda, L. S. Clair, T. Jaeger, and P. D.McDaniel. A logical specification and analysis for SELinux MLS policy. In Proceedings of the ACM Symposium on Access Control Models and Technologies, pages 91--100, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Howard. Mitigate security risks by minimizing the code you expose to untrusted users. MSDN Magazine, November 2004.Google ScholarGoogle Scholar
  12. M. Howard, J. Pincus, and J. M. Wing. Measuring relative attack surfaces. In Proceedings of Workshop on Advanced Developments in Software and Systems Security, December 2003.Google ScholarGoogle Scholar
  13. T. Jaeger, R. Sailer, and X. Zhang. Analyzing integrity protection in the SELinux example policy. In Proceedings of the 12th USENIX Security Symposium, pages 59--74, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. T. Jaeger, X. Zhang, and F. Cacheda. Policy management using access control spaces. ACM Transactions on Information Systems Security, 6(3):327--364, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Jha, O. Sheyner, and J. Wing. Two formal analyses of attack graphs. In In Proceedings of the 15th Computer Security Foundation Workshop, pages 49--63, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Lipner. The trustworthy computing security development lifecycle. In Proceedings of the 20th Annual Computer Security Applications Conference, pages 2--13, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. K. Manadhata, K. M. C. Tan, R. A. Maxion, and J. M. Wing. An approach to measuring a system's attack surface. Technical Report CMU-CS-07-146, CMU, August 2007.Google ScholarGoogle ScholarCross RefCross Ref
  18. M.Miller. Modeling the trust boundaries created by securable objects. In Proceedings of the 2nd Conference on USENIX Workshop on Offensive Technologies, pages 1--7, Berkeley, CA, USA, 2008. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Naldurg, S. Schwoon, S. K. Rajamani, and J. Lambert. NETRA: Seeing through access control. In Proceedings of the 4th ACM Workshop on Formal Methods in Security Engineering, pages 55--66, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Noel, S. Jajodia, B. O'Berry, and M. Jacobs. Efficient minimum-cost network hardening via exploit dependency graphs. In Proceedings of the 19th Annual Computer Security Applications Conference, page 86, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. NSA. Security Enhanced Linux. http://www.nsa.gov/selinux/.Google ScholarGoogle Scholar
  22. X. Ou, W. F. Boyer, and M. A. McQueen. A scalable approach to attack graph generation. In Proceedings of the 13th ACM Conference on Computer and Communications Security, pages 336--345, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. X. Ou, S. Govindavajhala, and A. W. Appel. MulVAL: A logic-based network security analyzer. In Proceedings of the 14th USENIX Security Symposium, Aug. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1-2):189--209, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. In Proceeding of the 26th Annual SIGCHI Conference on Human Factors in Computing Systems, pages 1473--1482, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. R.W. Reeder, P. G. Kelley, A.M.McDonald, and L. F. Cranor. A user study of the expandable grid applied to P3P privacy policy visualization. In Proceedings of the 7th ACM workshop on Privacy in the Electronic Society, pages 45--54, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 273--284, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Tresys technology, SETools - Policy analysis tools for SELinux. http://oss.tresys.com/projects/ setools.Google ScholarGoogle Scholar

Index Terms

  1. Towards analyzing complex operating system access control configurations

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SACMAT '10: Proceedings of the 15th ACM symposium on Access control models and technologies
      June 2010
      212 pages
      ISBN:9781450300490
      DOI:10.1145/1809842

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 June 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate177of597submissions,30%

      Upcoming Conference

      SACMAT 2024

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader