首页> 外文会议>Third Information Survivability Workshop - ISW-2000, Oct 24-26, 2000, Boston, Massachusetts >Execution Control Lists: An Approach to Defending Against New and Unknown Malicious Software
【24h】

Execution Control Lists: An Approach to Defending Against New and Unknown Malicious Software

机译:执行控制列表:防御新的和未知的恶意软件的方法

获取原文
获取原文并翻译 | 示例

摘要

The execution management utility provides security-conscious administrators with a valuable defense against the introduction of new and potentially malicious code. It ensures that no user can execute a program (knowingly or unknowingly) without the explicit consent of the administrator. This greatly reduces the threat posed by viruses, Trojan horses, and even malicious insiders. In addition to security considerations, the EMU also provides control over the distribution of illegally-obtained applications and the use of entertainment programs on corporate resources. There are numerous EMU features that make it manageable at the enterprise level, including centrally-managed execution control lists and client-server communication. The kernel based wrapping approach ensures the non-bypassability of the EMU and results in negligible performance overhead. Security features incorporated in the EMU ensure that even a malicious adversary cannot circumvent the execution management utility's execution control lists. It is important to note that our approach is not a substitute for security protection technologies such as malicious code scanners and sandboxing techniques. Rather, our approach can work together with other techniques. For instance, if a user receives an unknown executable it will be denied execution by the EMU client. The user may then request an administrator permission to run the unknown executable. A system administrator can scan the code against a virus scanner or malicious code classifier. Furthermore, the administrator can choose to run the unknown executable within a sandboxed environment in order to determine if it is trustworthy. If the administrator decides the application can be trusted, then she may subsequently add the executable to the user's ECL to allow future execution. The important protection our approach provides is a first line of defense against users running unknown and possibly malicious executables. Although malicious software inspires our approach, our solution also addresses other problem domains. The execution management utility can assist corporations by enforcing policies regarding the use of unauthorized, unlicensed or pirated software. Games and entertainment software, or even non-standard utilities (e.g., Napster, Gnutella, monitoring utilities like SpectorSoft, eBlaster, and advertising-enhanced browsers such AllAdvantage.com), can be banned or carefully controlled.
机译:执行管理实用程序为注重安全的管理员提供了防范新的和潜在的恶意代码引入的有价值的防御措施。它可以确保未经管理员的明确同意,任何用户都不能(故意或不知不觉)执行程序。这极大地减少了病毒,特洛伊木马甚至恶意内部人员带来的威胁。除了安全方面的考虑外,EMU还提供了对非法获取的应用程序的分发以及公司资源上娱乐程序的使用的控制。有许多EMU功能使其可在企业级别进行管理,包括集中管理的执行控制列表和客户端-服务器通信。基于内核的包装方法可确保EMU的不可旁路性,并导致可忽略的性能开销。 EMU中包含的安全功能可确保即使是恶意对手也不会绕过执行管理实用程序的执行控制列表。重要的是要注意,我们的方法不能替代安全保护技术,例如恶意代码扫描程序和沙盒技术。相反,我们的方法可以与其他技术一起使用。例如,如果用户收到未知的可执行文件,则EMU客户端将拒绝执行该可执行文件。然后,用户可以请求管理员权限来运行未知的可执行文件。系统管理员可以针对病毒扫描程序或恶意代码分类程序来扫描代码。此外,管理员可以选择在沙盒环境中运行未知可执行文件,以确定其是否可信任。如果管理员确定该应用程序可以信任,那么她可以随后将可执行文件添加到用户的ECL中,以允许将来执行。我们的方法提供的重要保护是针对运行未知和可能是恶意可执行文件的用户的第一道防线。尽管恶意软件启发了我们的方法,但我们的解决方案还解决了其他问题领域。执行管理实用程序可以通过执行有关使用未经授权,未经许可或盗版软件的策略来协助公司。游戏和娱乐软件,甚至是非标准实用程序(例如Napster,Gnutella,SpectorSoft,eBlaster等监视实用程序以及AllAdvantage.com等广告增强型浏览器)都可以被禁止或受到严格控制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号