An Inverse Approach to Windows' Resource-Based Permission Mechanism for Access Permission Vulnerability Detection

نویسندگان

چکیده

In organizations, employees work with information stored in files according to their duties and responsibilities. Windows uses resource-based access permissions that any permission for user has be set separately per resource. This approach gets complicated as the number of resources users increase, causes oversights assigning permissions. Therefore, a special mechanism is required scrutinize what employee on resources. requirement circumvented by reversing Windows’ terms user-accessible implemented program allowing quick easy examination type granted or denied active directory folder. this way, administrators can make sure there no missing overlooked setting could cause security vulnerability. easily extended other resources, local objects.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Permission-Based Android Malware Detection

Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile devices had appeared lately and, they were now an ideal target for attackers. Android-based smartphone users can get free applications from Android Application Market. But, these applications were not certified by legitimate organizations and the...

متن کامل

Dynamic Permission Mechanism on Android

This paper discusses the implementation of protecting user's data on mobile device based on Android platform. The mobile platform surpasses computers in its popularity in many aspects of one daily routine. Protection of data is one of the basic security feature of each operating system. Android platform raise its protection with every new version of the system. This paper covers the new approac...

متن کامل

Permission based Malware Analysis & Detection in Android

Android being a leading and the most popular operating system for smart phones and tablets, has also become a prime target for the attackers due to its growing users and it being an open source platform. This document describes the work done in detecting malware in the Android platform by performing static analysis on the permission based framework in Android platform. In our work, we have extr...

متن کامل

PMDS: Permission-Based Malware Detection System

The meteoric growth of the Android mobile platform has made it a main target of cyber-criminals. Mobile malware specifically targeting Android has surged and grown in tandem with the rising popularity of the platform [3, 5, 4, 6]. In response, the honus is on defenders to increase the difficulty of malware development to curb its rampant growth, and to devise effective detection mechanisms spec...

متن کامل

Permission to speak: A logic for access control and conformance

Formal languages for policy have been developed for access control and conformance checking. In this paper, we describe a formalism that combines features that have been developed for each application. From access control, we adopt the use of a saying operator. From conformance checking, we adopt the use of operators for obligation and permission. The operators are combined using an axiom that ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Osmaniye Korkut Ata Üniversitesi Fen Bilimleri Enstitüsü dergisi

سال: 2022

ISSN: ['2687-3729']

DOI: https://doi.org/10.47495/okufbed.1033540