Analysis of the Windows Vista Security Model

نویسنده

  • Matthew Conover
چکیده

This paper provides an in-depth technical assessment of the security improvements implemented in Windows Vista, focusing primarily on the areas of User Account Protection and User Interface Privilege Isolation. This paper discusses these features and touches on several of their shortcomings. It then demonstrates how it is possible to combine these attacks to gain full control over the machine from low integrity, low privilege process.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementing Boot Control for Windows Vista

A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted platform module. However, Dig-Force2 cannot be used for Windows Vista systems because the hooked API cannot monitor booting programs in user accounts...

متن کامل

Core system event analysis on windows vista

Event Tracing for Windows (ETW) has been the key instrumentation technology on Windows platforms for years. Many core operating system components have been instrumented with ETW, providing a basis for system activity analysis and problem diagnosis for a number of developers and tools. The upcoming Windows Vista ® operating system contains many new events, in response to the growing need to diag...

متن کامل

A Type System for Location Integrity in Windows Vista

The Microsoft Windows Vista operating system implements mandatory access control (MAC) for multi-level integrity. Vista's MAC implementation is designed to balance security with functionality—trusted processes may read untrusted values, and integrity labels may be changed dynamically. While such flexibility makes the system more usable, it also opens the door for information flow vulnerabilitie...

متن کامل

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms

The world of digital communications is expanding day by day, For secure communications over the unsecure mediums, Cryptography plays a crucial role and Symmetric Encryption algorithms do the real part of encoding data before transmission. The deep analysis of their security and speed become the necessity of safe digital communication. In this paper, we study the two popular symmetric cryptograp...

متن کامل

Performance Evaluation of Recent Windows Operating Systems

The primary goal of most OSs (Operating Systems) is the efficient use of computer systems software and hardware resources. Since Windows OSs are most widely used OS for personal computers, they need to satisfy needs of all different kind of computer systems users. In comparison with Windows XP, new versions of the Windows OS; namely Windows Vista and Windows 7, introduce a number of new feature...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006