PENETRATING AN OPERATING SYSTEM - STUDY OF VM-370 INTEGRITY

被引:25
作者
ATTANASIO, CR
MARKSTEIN, PW
PHILLIPS, RJ
机构
[1] IBM CORP,RES DIV,YORKTOWN HTS,NY 10598
[2] SYST DEV CORP,2500 COLORADO AVE,SANTA MONICA,CA
关键词
COMPUTER OPERATING SYSTEMS;
D O I
10.1147/sj.151.0102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A team of penetrator-analysts was formed to attempt to penetrate VM/370, with the objective of obtaining information to which they were not entitled, such as passwords or data that belonged to other users. Lesser goals were to acquire an unreasonably large share of resources in order to deny service to other users, and to obtain resources but escape accountability. The only tool that was available to the penetration team was a listing of the VM/370 operating system code. The method used in this study comprised the following steps: modeling the system control structure; flaw hypothesis generation; flaw hypothesis confirmation; and flaw generalization. Details of the methodology and results of penetration efforts are discussed. Input/output was found to be involved in most of the weaknesses discovered. Relative design simplicity was found to be the source of greatest protection against penetration efforts.
引用
收藏
页码:102 / 116
页数:15
相关论文
共 22 条
[1]  
ANDERSON JP, 1971, ESDTR71398 HANSC AIR
[2]  
ANDERSON JP, 1972, ESDTR73511 HANSC AIR
[3]  
BERGART J, 1972, COMPUTER SECURITY AC
[4]  
BISBEY R, ENCAPSULATION APPROA
[5]  
INGLIS WM, 1973, 730S12 DEF COMM AG B
[6]  
*INT BUS MACH CORP, GC263783 PUBL
[7]  
*INT BUS MACH CORP, GC201804 PUBL
[8]  
*INT BUS MACH CORP, SY200880 PUBL
[9]  
*INT BUS MACH CORP, GA227000 PUBL
[10]  
JONES A, 1973, THESIS CARNEGIEMELLO