1976
DOI: 10.6028/nbs.ir.76-1041
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis and enhancements of computer operating systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
57
0
2

Year Published

1996
1996
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 71 publications
(61 citation statements)
references
References 5 publications
0
57
0
2
Order By: Relevance
“…Earlier, in the infancy of penetration testing, it was believed that flaws would fall into recognizable patterns, and tools could be built to seek out these generic pattern during penetration testing [ABB076,CARL75,HOLL74,TRAT76]. Unfortunately, the large number of different processors, operating systems, and programming languages used to build TCBs, with their different syntax and semantics made it difficult and impractical to apply such pattern-matching tools to penetration testing.…”
Section: Automated Aidsmentioning
confidence: 99%
“…Earlier, in the infancy of penetration testing, it was believed that flaws would fall into recognizable patterns, and tools could be built to seek out these generic pattern during penetration testing [ABB076,CARL75,HOLL74,TRAT76]. Unfortunately, the large number of different processors, operating systems, and programming languages used to build TCBs, with their different syntax and semantics made it difficult and impractical to apply such pattern-matching tools to penetration testing.…”
Section: Automated Aidsmentioning
confidence: 99%
“…We've previously used a method 5,6 in which we chose a set of experiments because they covered all classes of two flaw domains, as enumerated in the seminal Research into Secure Operating Systems (RISOS) and Protection Analysis (PA) reports, 7,8 which are generally accepted as complete. (Note: when referring to the classes enumerated in the PA report, we use the revised hierarchy described by Peter Neumann.…”
Section: Our Idea For Designing Experimentsmentioning
confidence: 99%
“…One, the RISOS study [1], focused on flaws in operating systems; the other, the Program Analysis (PA) study [4], included both operating systems and programs. Interestingly enough, the taxonomies both presented were similar, in that the classes of flaws could be mapped to one another.…”
Section: Introductionmentioning
confidence: 99%