首页> 外文会议> >Thirty years later: lessons from the Multics security evaluation
【24h】

Thirty years later: lessons from the Multics security evaluation

机译:三十年后:Multics安全评估的教训

获取原文

摘要

Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and current) computer systems. Considerably more important than any of the individual design and implementation flaws was the demonstration of subversion of the protection mechanism using malicious software (e.g., trap doors and Trojan horses). A series of enhancements were suggested that enabled Multics to serve in a relatively benign environment. These included addition of "mandatory access controls" and these enhancements were greatly enabled by the fact the Multics was designed from the start for security. However, the bottom-line conclusion was that "restructuring is essential" around a verifiable "security kernel" before using Multics (or any other system) in an open environment (as in today's Internet) with the existence of well-motivated professional attackers employing subversion. The lessons learned from the vulnerability assessment are highly applicable today as governments and industry strive (unsuccessfully) to "secure" today's weaker operating systems through add-ons, "hardening", and intrusion detection schemes.
机译:大约30年前,尽管Multics比其他现代(和当前)计算机系统更安全,但对Multics的漏洞评估仍然确定了重大漏洞。比起任何单个设计和实现缺陷,更为重要的是,演示了使用恶意软件(例如活板门和特洛伊木马)颠覆保护机制的行为。提出了一系列增强功能,这些功能使Multics可以在相对良好的环境中使用。这些包括增加了“强制性访问控制”,并且这些增强功能是由于Multics从一开始就为安全性而设计的。但是,最重要的结论是,在开放环境(如当今的Internet)中使用Multics(或任何其他系统)之前,围绕可验证的“安全内核”进行“重组是必不可少的”,并且存在着积极进取的专业攻击者颠覆。从漏洞评估中汲取的教训在当今已经非常适用,因为政府和行业正在努力(未成功)通过附加组件,“强化”和入侵检测方案来“保护”当今较弱的操作系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号