資源描述:
《analysis of the security of windows ntnew》由會員上傳分享,免費(fèi)在線閱讀,更多相關(guān)內(nèi)容在教育資源-天天文庫。
1、AnalysisoftheSecurityofWindowsNTHansHedbom,StefanLindskog{Hans.Hedbom,Stefan.Lindskog}@hks.seDepartmentofComputerEngineeringChalmersUniversityofTechnologyS-41296G?teborg,SWEDENandDepartmentofComputerScienceUniversityofKarlstadS-65188Karlstad,SWEDENStefa
2、nAxelsson,ErlandJonsson{sax,erland.jonsson}@ce.chalmers.seDepartmentofComputerEngineeringChalmersUniversityofTechnologyS-41296G?teborg,SWEDENAbstractThispaperpresentsananalysisofthesecurityinWindowsNT4.0,workinginbothstand-aloneandnetworkingmode.Theobje
3、ctiveoftheworkwastofindouthowsecurethisoperatingsystemactuallyis.Atechnicaloverviewofthesystem,andinparticularitssecurityfeaturesisgiven.Thesystemsecuritywasanalyzedandpracticalintrusionattemptsweremadeinordertoverifyvulnerabilitiesortofindnewones.Allvu
4、lnerbilitiesaredescribedindetailandclassifiedaccordingtoaclassificationscheme.Acomparisontocom-monlyknownUNIXweaknesseswasmade.Itrevealedgenericsimilaritiesbetweenthetwosystemstoasurprisinglyhighdegree.Finallyanumberofrecommendationsaregiven.Thepapercon
5、cludesthatthereareampleoppor-tunitiestoimprovethesecurityofWindowsNT.WehavereasontobelievethatitisprobablynothigherthanthatofUNIX.AnalysisoftheSecurityofWindowsNT1March19992TableofContents1.Scope..........................................................
6、...................................................92.Introduction................................................................................................103.SystemOverview.........................................................................
7、...............113.1Background............................................................................................................113.2SystemArchitecture............................................................................................
8、...113.3Executive................................................................................................................123.4ProtectedSubsystems............................................................................