Automated detection of vulnerabilities in privileged programs by execution monitoring
- 17 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 134-144
- https://doi.org/10.1109/csac.1994.367313
Abstract
Presents a method for detecting exploitations of vulnerabilities in privileged programs by monitoring their execution using audit trails, where the monitoring is with respect to specifications of the security-relevant behavior of the programs. Our work is motivated by the intrusion detection paradigm, but is an attempt to avoid ad hoc approaches to codifying misuse behavior. Our approach is based on the observation that although privileged programs can be exploited (due to errors) to cause security compromises in systems because of the privileges accorded to them, the intended behavior of privileged programs is, of course, limited and benign. The key, then, is to specify the intended behavior (i.e. the program policy) and to detect any action by a privileged program that is outside the intended behavior and that imperils security. We describe a program policy specification language, which is based on simple predicate logic and regular expressions. In addition, we present specifications of privileged programs in Unix, and a prototype execution monitor for analyzing audit trails with respect to these specifications. The program policies are surprisingly concise and clear, and in addition, capable of detecting exploitations of known vulnerabilities in these programs. Although our work has been motivated by the known vulnerabilities in Unix, we believe that by tightly restricting the behavior of all privileged programs, exploitations of unknown vulnerabilities can be detected. As a check on the specifications, work is in progress on verifying them with respect to an abstract security policy.Keywords
This publication has 8 references indexed in Scilit:
- With microscope and tweezers: an analysis of the Internet virus of November 1988Published by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Detection of anomalous computer session activityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Haystack: an intrusion detection systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- USTAT: a real-time intrusion detection system for UNIXPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The internet worm program: an analysisACM SIGCOMM Computer Communication Review, 1989
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Limiting the Damage Potential of Discretionary Trojan HorsesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- An Intrusion-Detection ModelIEEE Transactions on Software Engineering, 1987