Browse > Article
http://dx.doi.org/10.6109/jkiice.2011.15.9.1947

Protecting Memory of Process Using Mandatory Access Control  

Shim, Jong-Ik (한서대학교 컴퓨터정보공학과)
Park, Tae-Kyou (한서대학교 컴퓨터정보공학과)
Kim, Jin-Tae (한서대학교 컴퓨터정보공학과)
Abstract
There are various attacks such as tampering, bypassing and spoofing which are caused with system-wide vulnerabilities of Windows operating system. The underlying operating system is responsible for protecting application-space mechanisms against such attacks. This paper provides the implementation of mandatory access control known as multi-level security (MLS) rating with TCSEC-B1 level on th kernel of Windows$^{TM}$. By adding especially the protection feature against tampering memory of processes to the security kernel, this implementation meets the responsibility against system-wide vulnerabilities.
Keywords
Process memory; Access control; Multi-level security; TCSEC; Kernel of Windows$^{TM}$;
Citations & Related Records
연도 인용수 순위
  • Reference
1 박태규, 임연호, "커널 기반의 보안 리눅스 운영체제 구현," 제11권, 제4호, pp. 33-43, 정보보호학회논문지, 2001.
2 DoD, "Trusted Computer System Evaluation Criteria," DoD 5200.28.STD, 1985.
3 Dabak, Phadke, and Borate, Undocumented Windows NT, M&T Books, 1999.
4 R. Nagar, Windows NT File System Internals O'Reilly, 1997.
5 P. Orwick and G. Smith, Developing Drivers with the Windows Driver Foundation, Microsoft Press, 2007.
6 C. Cant, Writing Windows WDM Device Drivers, CMP; Pap/Cdr Edition, 1999.
7 Bell and Lapadula, "Secure Computer System : Mathematical Foundations and Model," MITRE Report MTR 2547, 1973.
8 정창성, 강민규, "안전한 컴퓨팅을 위한 보안 인터페이스 구축," 정보처리학회, 2006.
9 이병오, 드라이버 개발자를 위한 윈도우 파일 시스템, 사이버출판사, 2006.
10 http://www.osronline.com