Font Size: a A A

Using The Power To Prevent The Suid Attacks In The Linux Kernel

Posted on:2005-02-04Degree:MasterType:Thesis
Country:ChinaCandidate:J H LiuFull Text:PDF
GTID:2208360152965086Subject:Computer software
Abstract/Summary:PDF Full Text Request
Linux is a mature and applied operating system . It has abundant application and developer tools and supports all kinds of hardware interface and peripheral equipment. And also , Linux is a completely opening software and his source code might be easily get. Everyone can analyse its inner structure and study his idea, and amend anywhere if you want. So Linux is a software called to achieve freedom. Just because of this, people pay more and more attention to Linux and his security issue has been brought out.Linux has risked his security for the single user-root is endowed with all of the system' s right and more and more bugs have been exposed. This paper simply analyses the advantages and disadvantages of two mainstream access control modes-MAC (Mandatory Access Control) and DAC( Discretionary Access Control) in the history . Linux has used the DAC mode . After this paper adopt a newly mode-RBAC (Roled Based Access Control) into this task and uses its mechanism to solve the practical security issue of Linux. The mode of RBAC is between MAC and DAC .By reasonable configuration, we can achieve the mode which can develop the useful and discard the useless of MAC and DAC .After analyzing the integrant kernel code about accessing control, this paper mainly aims at bufferflow of system and brings forward a method based on RABC to solve the security issue due to bufferflow.This task' s experiment environment is Linux 9.0 with kernel version of 2.4.20. In the process of implement, this paper utilizes the kernel correlative resource and designs the project. Finally, tried in the kernel and comes to true.This paper is divided into several chapters below:1 the mechanism of RBAC2 the characteristic of Linux' s access control3 the analysis of code about access control4 the improved project5 the conclusion and the contrast...
Keywords/Search Tags:access control, access control based on role, capability, least privilege, shellcode
PDF Full Text Request
Related items