Tenth Annual Computer Security Applications Conference
DOI: 10.1109/csac.1994.367311
|View full text |Cite
|
Sign up to set email alerts
|

Property-based testing of privileged programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 10 publications
0
17
0
Order By: Relevance
“…Recently, several specific security testing techniques have been developed [3][4][5][6][7][8]. Adaptive Vulnerability Analysis (AVA) has been designed by Ghosh et al to quantitatively assess information system security and survivability.…”
Section: Security Testingmentioning
confidence: 99%
“…Recently, several specific security testing techniques have been developed [3][4][5][6][7][8]. Adaptive Vulnerability Analysis (AVA) has been designed by Ghosh et al to quantitatively assess information system security and survivability.…”
Section: Security Testingmentioning
confidence: 99%
“…We chose a proxy in the form of short sequences of system calls executed by running programs. Our focus on system calls followed earlier work by Fink, Levitt and Ko [13,39] that used system calls in a specification-based intrusion detection system. System call sequences can be monitored from the operating system, without necessitating recompilation or instrumentation of binary or source code, making the system extremely portable and potentially applicable to any program that exhibits regular code paths.…”
Section: Behavioral Characteristicsmentioning
confidence: 99%
“…Fink et al [6] use specifications against which a program is sliced to significantly reduce the size of code that needs to be checked for flaws [6]. Similarly, privilege separation creates a smaller trust base that is more easily secured.…”
Section: Related Workmentioning
confidence: 99%