Analysis of the Windows Vista Security Model
نویسنده
چکیده
This paper provides an in-depth technical assessment of the security improvements implemented in Windows Vista, focusing primarily on the areas of User Account Protection and User Interface Privilege Isolation. This paper discusses these features and touches on several of their shortcomings. It then demonstrates how it is possible to combine these attacks to gain full control over the machine from low integrity, low privilege process.
منابع مشابه
Implementing Boot Control for Windows Vista
A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted platform module. However, Dig-Force2 cannot be used for Windows Vista systems because the hooked API cannot monitor booting programs in user accounts...
متن کاملCore system event analysis on windows vista
Event Tracing for Windows (ETW) has been the key instrumentation technology on Windows platforms for years. Many core operating system components have been instrumented with ETW, providing a basis for system activity analysis and problem diagnosis for a number of developers and tools. The upcoming Windows Vista ® operating system contains many new events, in response to the growing need to diag...
متن کاملA Type System for Location Integrity in Windows Vista
The Microsoft Windows Vista operating system implements mandatory access control (MAC) for multi-level integrity. Vista's MAC implementation is designed to balance security with functionality—trusted processes may read untrusted values, and integrity labels may be changed dynamically. While such flexibility makes the system more usable, it also opens the door for information flow vulnerabilitie...
متن کاملA Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms
The world of digital communications is expanding day by day, For secure communications over the unsecure mediums, Cryptography plays a crucial role and Symmetric Encryption algorithms do the real part of encoding data before transmission. The deep analysis of their security and speed become the necessity of safe digital communication. In this paper, we study the two popular symmetric cryptograp...
متن کاملPerformance Evaluation of Recent Windows Operating Systems
The primary goal of most OSs (Operating Systems) is the efficient use of computer systems software and hardware resources. Since Windows OSs are most widely used OS for personal computers, they need to satisfy needs of all different kind of computer systems users. In comparison with Windows XP, new versions of the Windows OS; namely Windows Vista and Windows 7, introduce a number of new feature...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006