Supporting a Trusted Path for the LINUX operating system

Download
Author
Bartram, Scott A.
Date
2000-06Advisor
Irvine, Cynthia E.
Clark, Paul C.
Second Reader
NA
Metadata
Show full item recordAbstract
The existence of Trojan horses, viruses, and other malicious software has motivated the computer security industry to invent mechanisms that protect against malicious software. One such mechanism is called the Trusted Path. The Trusted Path provides a way for the system to authenticate itself to the user. Once invoked, the Trusted Path provides an environment in which the user can perform trusted operations such as login, logout, and change password. This thesis provides a high level design for a Trusted Path and an in depth analysis of how a Trusted Path can be implemented in the Linux operating system. Research of process family creation and keyboard handling has led to the implementation of a Secure Attention Key that can be used to invoke a Trusted Path in Linux. This research is meant to be used in combination with other efforts to enhance the Linux operating system as an inexpensive platform for instruction on computer security policies.
Collections
Related items
Showing items related by title, author, creator and subject.
-
A Trusted Path design and implementation for Security Enhanced Linux
Hilchie, Allan T. (Monterey, California. Naval Postgraduate School, 2004-09);The threat posed by malicious software and networked adversaries to computers has resulted in the development of mechanisms to provide assurance that security sensitive information is not being compromised. One such mechanism ... -
Ensuring a C2 level of trust and interoperability in a networked Windows NT environment
Lucas, Julie A. (Monterey, California. Naval Postgraduate School, 1996-09);With the progression of computer systems to local and wide area networks, the scope of computer security has increased dramatically over the past two decades. Now, more than ever, the use of trusted systems is needed to ... -
Integrating a trusted computing base extension server and secure session server into the Linux operating system
Glover, Mark V. (Monterey, California. Naval Postgraduate School, 2001-09);Multilevel Secure Local Area Network (MLS LAN) Project at the Naval Postgraduate Schoolαs, Center for Information Security (INFOSEC) Studies and Research (NPS CISR) is building a trusted network system that is both necessary ...