发明名称 Analyzing access control configurations
摘要 A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and identifications of principals, the principals having access control privileges relating to the resources, the access control privileges described by access control metadata; an access control scanner component that receives the access control metadata, determines relationships between principals and resources, and emits access control relations information; and an access control inference engine that receives the emitted access control relations information and an access control policy model, analyzes the received information and model, and emits a vulnerability report. In various embodiments, the facility generates an information flow based on access control relations, an access control mechanism model, and an access control policy model; determines, based on the generated information flow, whether privilege escalation is possible; and when privilege escalation is possible, indicates in a vulnerability report that privilege escalation is possible.
申请公布号 US9213843(B2) 申请公布日期 2015.12.15
申请号 US201414253732 申请日期 2014.04.15
申请人 Microsoft Technology Licensing, LLC 发明人 Naldurg Prasad G.;Rajamani Sriram K.;Schwoon Stefan;Lambert John
分类号 G06F11/00;G06F21/57 主分类号 G06F11/00
代理机构 代理人 Swain Sandy;Minhas Micky
主权项 1. A system for analyzing access control, the system comprising: at least one memory; at least one processor; an operating system having resources and principals; an information flow comprising inferred read, write, and execute relations between one or more of the principals and one or more of the resources; an escalation checker configured to determine, based on applying an access control policy model to the inferred read, write, and execute relations of the generated information flow, that one or more privilege escalations are possible; and a vulnerability report indicating that one or more privilege escalations are possible;wherein the vulnerability report comprises one or more hierarchical structures, and wherein each hierarchical structure comprises: a root element identifying a privilege escalation of the one or more privilege escalations; and a derivation comprising one or more non-root elements that are descendants of the root element and identify a source of each of the privilege escalations.
地址 Redmond WA US