Title
Database Isolation and Filtering against Data Corruption Attacks
Abstract
A protection profile for high-robustness separation kernels has recently been validated and several implementations are under development. However, medium-robustness separation kernel development efforts have no protection profile, although the US Government has published guidance for authoring such a profile. As a step toward a protection profile, a set of security requirements for medium-robustness separation kernels is proposed. These requirements result from an informal, yet principled, approach. By bracketing the problem with appropriate reference points and elaborating a method for interpolating the requirements both a measure of uniformity and a basis for further discussion are achieved. Our reference points include the high robustness protection profile, the existing medium robustness consistency instruction, and our familiarity with the nuances of separation kernels. This practitioner-oriented study is intended to advance the prevailing practices for commercial software development, which presently falls far short of the rigor needed for either high-robustness or medium-robustness systems. These requirements represent an incremental improvement in the pursuit of secure software - and is intended to be a step forward on the road to higher assurance.
Year
DOI
Venue
2007
10.1109/ACSAC.2007.17
TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS
Keywords
Field
DocType
sql injection,transaction processing,database system,data integrity,sql,quality of service,sql injections,sequential analysis,intrusion detection system
SQL,Transaction processing,Data mining,Computer science,Latency (engineering),Computer security,Database testing,Data integrity,Data Corruption,Intrusion detection system,SQL injection,Database
Conference
Citations 
PageRank 
References 
3
0.42
15
Authors
3
Name
Order
Citations
PageRank
Meng Yu152466.52
Wanyu Zang219321.20
Peng Liu31701171.49