Abstract Access control mechanisms are widely used in multi-user IT systems where it is necessary to restrict access to computing resources. This is certainly true of file systems whereby information needs to be protected against unintended access. User permissions often evolve over time, and changes are often made in an ad hoc manner and do not follow any rigorous process. This is largely due to the fact that the structure of the implemented permissions are often determined by experts during initial system configuration and documentation is rarely created. Furthermore, permissions are often not audited due to the volume of information, the requirement of expert knowledge, and the time required to perform manual analysis. This paper present...
Access control configurations are gatekeepers to block unwelcome access to sensitive data. Unfortun...
Operating systems rely heavily on access control mechanisms to achieve security goals and defend aga...
We address the problem of restricting root's ability to change arbitrary files on disk, in order to ...
Identifying irregular file system permissions in large, multi-user systems is challenging due to the...
It is well established that file system permissions in large, multi-user environments can be audited...
File System (NTFS) permissions can be a cumbersome and convoluted task. In today’s data rich world t...
Administrating and monitoring New Technology File System (NTFS) permissions can be a cumbersome and ...
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effect...
Abstract. One of the major challenges facing the security community today is how to prevent DE. DE i...
In Microsoft Windows, two vulnerabilities have been successfully exploited for attacks for years now...
Every organization�s asset is its data and data are stored in files which are maintained by file sys...
At the heart of most computer systems is a file system. The file system contains user data, executab...
The setting of file permissions is no longer reserved for trained professionals. Persons unfamiliar ...
We present a new static analysis for reviewing the se-curity of libraries for systems, such as JVMs ...
Access-control misconfigurations are among the main causes of today’s security incidents. One main r...
Access control configurations are gatekeepers to block unwelcome access to sensitive data. Unfortun...
Operating systems rely heavily on access control mechanisms to achieve security goals and defend aga...
We address the problem of restricting root's ability to change arbitrary files on disk, in order to ...
Identifying irregular file system permissions in large, multi-user systems is challenging due to the...
It is well established that file system permissions in large, multi-user environments can be audited...
File System (NTFS) permissions can be a cumbersome and convoluted task. In today’s data rich world t...
Administrating and monitoring New Technology File System (NTFS) permissions can be a cumbersome and ...
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effect...
Abstract. One of the major challenges facing the security community today is how to prevent DE. DE i...
In Microsoft Windows, two vulnerabilities have been successfully exploited for attacks for years now...
Every organization�s asset is its data and data are stored in files which are maintained by file sys...
At the heart of most computer systems is a file system. The file system contains user data, executab...
The setting of file permissions is no longer reserved for trained professionals. Persons unfamiliar ...
We present a new static analysis for reviewing the se-curity of libraries for systems, such as JVMs ...
Access-control misconfigurations are among the main causes of today’s security incidents. One main r...
Access control configurations are gatekeepers to block unwelcome access to sensitive data. Unfortun...
Operating systems rely heavily on access control mechanisms to achieve security goals and defend aga...
We address the problem of restricting root's ability to change arbitrary files on disk, in order to ...