[go: up one dir, main page]

CN102542182A - Device and method for controlling mandatory access based on Windows platform - Google Patents

Device and method for controlling mandatory access based on Windows platform Download PDF

Info

Publication number
CN102542182A
CN102542182A CN2010105875815A CN201010587581A CN102542182A CN 102542182 A CN102542182 A CN 102542182A CN 2010105875815 A CN2010105875815 A CN 2010105875815A CN 201010587581 A CN201010587581 A CN 201010587581A CN 102542182 A CN102542182 A CN 102542182A
Authority
CN
China
Prior art keywords
file
windows
access control
kernel
security server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105875815A
Other languages
Chinese (zh)
Inventor
杨峰
陶园
李桄宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU LINGXIAO TECHNOLOGY Co Ltd
Original Assignee
SUZHOU LINGXIAO TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU LINGXIAO TECHNOLOGY Co Ltd filed Critical SUZHOU LINGXIAO TECHNOLOGY Co Ltd
Priority to CN2010105875815A priority Critical patent/CN102542182A/en
Publication of CN102542182A publication Critical patent/CN102542182A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a device and method for controlling mandatory access based on a Windows platform. The device comprises a monitoring module and is characterized in that access control on progresses, files and register lists can be realized on the Windows platform, access requests of a subject of the access control on an object are intercepted and provided for a core safety server to be used for safety judgment; and the core safety server carries out authority judgment according to safety rules of mandatory access control and returns a result to the monitoring module so that the mandatory access control is realized. According to the device and method for controlling the mandatory access based on the Windows platform, disclosed by the invention, an access control decision of a windows system does not depend on the subject, and whether access is allowed or not is determined by comparing safety identifiers of the subject and the object through a safety policy; and the device for controlling the mandatory access based on the Windows platform, disclosed by the invention, is compatible with a windows-self-attached discretionary access control mechanism and also has higher safety grade compared with the original mechanism.

Description

Pressure access control apparatus and control method based on windows platform
Technical field
the invention belongs to the SOS field; The security hardening method that relates to a kind of Windows system; Be specifically related to a kind of pressure access control system and control method, can realize pressure access control the Windows system based on windows platform.
Background technology
are one of widely used operating system now, a problem that institute is concerned about and worries that its security also becomes users.The autonomous access control function that Windows operating system carries is the core content of Windows system security assurance mechanism, and it comes the control that conducts interviews of system's sensitive resource through the secure subsystem key component.The basic thought of autonomous access control mechanisms be have the main body of object can be with the access control right that means other these objects of body portion pairing.This mechanism has great independence and dirigibility for subject user, but the security protection that provides is relatively low, therefore can't resist the attack of Trojan Horse and so on.Find through popular in the market safety product being carried out statistics and analysis; Special at present safety product such as fire wall and antivirus software to the Windows system; Mostly be to move with the application program of client layer; Can play the effect of defence to the environment of system peripherals, but very limited to the security effect of raising system self.So the Windows system has been monitored very important meaning from kernel state.
Summary of the invention
the object of the invention is to provide a kind of pressure access control system based on windows platform, has solved the not enough safety problem that is caused of the autonomous access control mechanisms control and monitoring of Windows operating system.
In order to solve these problems of the prior art, technical scheme provided by the invention is:
a kind of pressure access control apparatus based on windows platform; Comprise and be used to intercept and capture the monitoring module of window application through the request of system call visit Windows system kernel object and be used to judge request legitimacy whether core security server; It is characterized in that said monitoring module and core security server all are arranged on Windows system kernel layer; Monitoring module capturing operation system process is to the access request of kernel objects, and offers core security server and carry out strategy and judge; Core security server is carried out after authority judges, according to the judged result permits access Windows system kernel object requests of security server whether monitoring module if allow, then carries out original system call; If refusal then directly returns.
are preferred, and monitoring module request captured object is selected from any or two or more combination in any of window application through file object, process object, thread object or the registry objects of system call visit.
are preferred, and said monitoring module comprises the process monitoring submodule, file monitor submodule and registry monitoring submodule; Said process monitoring submodule is used for handling independently the control to process object or thread object visit, and said file monitor submodule and registry monitoring submodule all need the calling process monitoring submodule to accomplish the control to file object and registry objects visit.
are preferred; Said monitoring module is for adopting the kernel SSDT-HOOK module of kernel level Hook technology, the Hook collection of said process monitoring submodule is used to monitor the establishment process, opens process, the termination process, create thread, open thread, terminate thread; The Hook collection of said file monitor submodule is used to monitor to be created or opens file, opens file, deletion or Rename file, the extended attribute of file is set; The Hook collection of said registry monitoring submodule is used for that monitoring is created or opened registry entry, opens registry entry, the deletion registry entry, add or registry key, deletion registry key be set.
are preferred, and said core security server is used to manage the safe context of kernel objects, and treatment progress is forced the decision request of access control system and returned the result of decision-making.
are preferred, and said core security server is formed for the binary file of the strategy judgement of different objects according to the DTE security model according to the difference of access object.
The present invention also provides a kind of forced access control method based on windows platform, it is characterized in that said method by monitoring module that is provided with at Windows system kernel layer and core security server control, said method comprising the steps of:
(1) window application sends access request through system call to Windows system kernel object;
(2) monitoring module is intercepted and captured the access request of Windows operating system process to kernel objects, and offers core security server and carry out strategy judgement;
(3) core security server is carried out after authority judges, according to the judged result permits access object requests of security server whether monitoring module if allow, then carries out original system call, if refusal then directly returns.
are preferred; When the kernel objects of visit is process object or thread object; Monitoring module adds secure identifier to process object or thread object, and secure identifier is provided with according to the binary file of the rule creation of process object or thread object through reading core security server.
are preferred, and said monitoring module is used to monitor the access object in the life cycle for adopting the kernel SSDT-HOOK module of kernel level Hook technology.
the present invention forces the overall framework of access control apparatus as shown in Figure 1, comprises core security server and monitoring module.Overall execution flow process such as Fig. 2 are divided into three steps:
(1) user level process is sent access request through system call to the Windows kernel module;
(2) monitoring module capturing operation system process is to the access request of kernel objects, and offers core security server and carry out strategy and judge;
(3) core security server is carried out after authority judges, according to the judged result permits access object requests of security server whether monitoring module if allow, then carries out original system call, if refusal then directly returns.
The main task of core security server is the safe context of management kernel objects, and treatment progress is forced the decision request of access control system and returned the result of decision-making.
monitoring module comprises three sub-module: the process monitoring submodule, file monitor submodule and registry monitoring submodule are accomplished respectively process, file, the pressure access control function of registry access.The process monitoring submodule can be handled the control to the process visit independently, and file monitor submodule and registry monitoring submodule then need the calling process monitoring submodule to accomplish the control to file and registry access.The realization of this three sub-module can be divided into the secure identifier of managing kernel objects and two parts of HOOK function monitoring kernel operations function are set to be accomplished.Core security server can form the binary file that strategy is judged according to the secure identifier of process object or thread object and give rule, territory transition rule and other rules of secure identifier; Core security server is confirmed the content of the secure identifier of registry objects according to the DTE security model.
The secure identifier of one management kernel objects
A. process object
(1) the secure identifier content confirms
secure identifier is one of main security feature in the access control mechanisms.Secure identifier is also referred to as security attribute, is the description to the security of system object.The content of secure identifier is that the strategy by DTE (Domain and Type Enforcement) model decides.The DTE model has given main body different territories (Domain), and the control that conducts interviews of the different type (Type) of object all needs the judgement of DTE strategy from another territory of domain browsing or from a different type of domain browsing.For process object, the content of secure identifier promptly is the content in territory, is to be represented by the nonnegative number of an integer.
Deposit the strategy of secure identifier or obtaining of file
The content of secure identifier is to have the strategy of core security server CSS to decide, and the secure identifier of all Subjective and Objective objects also all provides a file to obtain by CSS.CSS is with the rule of giving of the secure identifier of process and secure identifier, and territory transition rule and other rule are write into a binary strategy file policy.db, and the process that offers is then forced access control system.When needs obtain this file; Process forces access control system can load the secure identifier that this binary strategy file policy.db obtains No. 0 process, and the secure identifier of each new process of creating all is to generate automatically according to the policing rule of this strategy file is next afterwards.
The description of secure identifier storage scheme is with definite
Secure identifier need be added to process object and thread object in in the process monitoring submodule.In the Windows system; Thread is not only the actual thread of system; And be the operation of lightweight, all have same process context piece because belong to all threads of same process again, so thread object can be inherited the secure identifier of affiliated process fully.
Realize through safeguarding a doubly linked list the storage of the secure identifier of process .
The node of this doubly linked list is a self-defining data structure, and the name of secure identifier and corresponding process has been stored in the inside, and the corresponding relation that this data structure is used as secure identifier and process is articulated in the chained list.For the secure identifier of thread object, the secure identifier of thread is a secure identifier of having inherited affiliated process.
Secure identifier is provided with
are for process object; After each process (system process or consumer process) is created success, corresponding secure identifier just is set; All operations relevant afterwards with process, as open a process, stop a process; Or other are as long as be the operation of main body with the process, just can control according to the strategy of pressure access control mechanisms.The setting of the secure identifier of process promptly is to contain this process with one to be inserted in the doubly linked list of an overall situation with the secure identifier of correspondence and the data structure of other information.For the secure identifier of thread object, then do not need to be provided with, all threads that belong to a process also use the secure identifier of this process jointly.
The inquiry of secure identifier
because the secure identifier of process is to be stored in the doubly linked list, so just changed into the inquiry to doubly linked list for the inquiry of the secure identifier of process.The index of inquiry can be the handle PID of process or the name of process.But because the unfixed characteristics of PID, so be chosen to be the name of process.
The inquiry of the secure identifier of thread need be found the pointer field _ EPROCESS of a process under this thread of sensing in the kernel data structure _ ETHREAD of thread; Just can obtain the secure identifier of process, that is to say the secure identifier of this thread according to _ EPROCESS afterwards.
The deletion of secure identifier
except stopping whole system resources that this process has, also need discharge the secure identifier of this process in the time of process of system closure.The process of deletion secure identifier is in doubly linked list, to travel through the node that finds the secure identifier that comprises this process according to index value (for the name of process), carries out the deletion action of chained list then.
can not influence the secure identifier of affiliated process to any operation of thread.After a process was terminated, all inner threads of this process also were terminated simultaneously, and the resource that has also all is released.
Other problem (like processing) to object that secure identifier is not set
for processes all in the system, the Windows system does not have compulsory safeguard measure, so all processes in the system can be added secure identifier.If process is before process forces access control system to start, just to be created, the secure identifier of this process need be set when referring to this process for the first time so, concrete method is identical with when creating, secure identifier being set.
File object
need the secure identifier of the file of pressure access control to be stored in the extended attribute of this document, have realized the support to new technology file system at present.
Registry objects
(1) the secure identifier content confirms
The confirming of the content of the secure identifier of registration table decided by core security server CSS.Forcing in the mutual CSS system of access control system with process, employing be the DTE security model, be to confirm so the DTE model is given the secure identifier of which kind of type of object by concrete security strategy.In native system, the secure identifier of registration table is different from the integers secure identifier of process, but has adopted the type of a character string.
Deposit the strategy of secure identifier or obtaining of file
are because the content of the secure identifier of all Subjective and Objective objects all is a strategy by core security server CSS decides, so the secure identifier of all Subjective and Objective objects also all provides a file to obtain by CSS.The method of obtaining this strategy file with the process primary module is identical; After having loaded this strategy file for the first time, when needs are provided with secure identifier to registration table, will call registry module; Thereby read this strategy file, corresponding secure identifier is set to registration table.
The description of secure identifier storage scheme is with definite
are provided with the inner structure that secure identifier is to use operating system to registry entry.Under the level of the directory tree under the registry entry, set up a key assignments, as the storage space of secure identifier.
Secure identifier is provided with
adopted the method for traversal that corresponding secure identifier is set before supervisory system starts for the registry entry that can visit.For the registry entry of system protection, leave in the core security server and safeguard.
The inquiry of secure identifier
are left the secure identifier under the registry entry in the form of key assignments, can read key assignments through the api function that kernel provides, thereby obtain secure identifier.And, can only obtain the value of secure identifier through the request of sending for the secure identifier that leaves in the security server.
The deletion of secure identifier
are deleted when a registry entry, and this registry entry itself is added all key assignments (also comprising the key assignments of depositing secure identifier) that it comprises and all will be deleted so.
Two are provided with HOOK function monitoring kernel operations function
A. choosing by the function of Hook
Hook collection choose the whole life that need contain kernel objects, can not have influence on the stable of system simultaneously.
The Hook collection of process monitoring submodule is opened process function for creating process function, stops process function, creates thread function, opens thread function and terminate thread function.
The Hook collection of file monitor submodule is for creating or the function that opens file, and the function that opens file is deleted or the Rename file function, and the extended attribute function of file is set.
The Hook collection of registry monitoring submodule is opened the registry entry function for creating or opening the registry entry function, and deletion registry entry function adds or registry key function, deletion registry key function be set.
Technology
adopt more stable, kernel level Hook technology SSDT-HOOK, and the system function call address of revising or replacing storage in the SSDT table realizes.
Description of drawings
Below in conjunction with accompanying drawing and embodiment the present invention is further described:
Fig. 1 is the system architecture diagram of the embodiment of the invention based on the pressure access control apparatus of windows platform;
Fig. 2 is the operational scheme synoptic diagram of the embodiment of the invention based on the pressure access control apparatus of windows platform;
Fig. 3 is the concrete control work flows journey synoptic diagram of the embodiment of the invention based on the pressure access control apparatus of windows platform.
Embodiment
further specify such scheme below in conjunction with specific embodiment.Should be understood that these embodiment are used to the present invention is described and are not limited to limit scope of the present invention.The implementation condition that adopts among the embodiment can be done further adjustment according to the condition of concrete producer, and not marked implementation condition is generally the condition in the normal experiment.
The pressure access control of embodiment Windows realizes
following examples have specifically realized the security hardening process based on windows platform, and its basic technical scheme that adopts comprises as stated: monitoring module and core security server, the frame diagram of control device is as shown in Figure 1.
are that form with driver realizes based on the pressure access control apparatus of windows platform; In a single day this driver is loaded success; Be similar to the notion of patch in the linux system; Driver just becomes the ingredient of Windows kernel, and the memory headroom in kernel is to be shared by all processes, also just can reach all purposes to the kernel objects access control of monitoring.
Creating process function with monitoring below is that example is introduced the monitoring to process:
process initiation module mainly is that two kernel function ZwCreateProcess that create process are carried out Hook with ZwCreateProcessEx, and the function HookedNtCreateProcess of realization and function that HookedNtCreateProcessEx come respectively replace this two system calls self-defined with our.Because the operating system version that ZwCreateProcess and ZwCreateProcessEx just exist is different, specifically the details of realization remains identical, thus following we will be that example carries out discussing carefully with ZwCreateProcess.
The SQL that are used for replacing ZwCreateProcess is HookedNtCreateProcess.The HookedNtCreateProcess function has been accepted the input parameter of all parameters of ZwCreateProcess as oneself.Be the prototype of HookedNtCreateProcess function below:
NTSTATUS
NTAPI
HookedNtCreateProcess
(
OUT?PHANDLE ProcessHandle,
IN?ACCESS_MASK DesiredAccess,
IN?POBJECT_ATTRIBUTES?ObjectAttributes,
IN?HANDLE InheritFromProcessHandle,
IN?BOOLEAN InheritHandles,
IN?HANDLE SectionHandle?OPTIONAL,
IN?HANDLE DebugPort?OPTIONAL,
IN?HANDLE ExceptionPort?OPTIONAL,
);
first parameter is the pointer that process is created the handle that returns after the success, and what note representative here is not the handle value; The authority of second parameter representative visit does not generally process this parameter; The 4th parameter is exactly the handle that is created the parent process of process in fact, and this parameter is extremely important, because can obtain the secure identifier of main body through it; The 6th parameter is to have represented some key messages of the subprocess that is created, and we can get access to the complete trails of object object (that is to say the executable file of process) through it, just can inquire the secure identifier of object afterwards according to complete trails; Other parameter can be left intact.
After the prototype of having analyzed function, will introduce the whole execution flow process of function below:
(1) under user's attitude, open an executable file, the API of the automatic calling application layer of system is CreateProcess
After (2) CreateProcess function calls request gets into kernel; Through int2e instruction or SYSENTER instruction request is forwarded to the SSDT table, purpose is from the SSDT table, to inquire the corresponding kernel function ZwCreateProcess of CreateProcess function.And on this opportunity; The address that process forces access control system will at first intercept and capture the ZwCreateProcess function through the SSDT-Hook technology; Come temporary transient this function address that stores with a global variable OriginalNtCreateProcess, then the address of self-defining function HookedNtCreateProcess is replaced the position of ZwCreateProcess in the SSDT table.System will call the execution of HookedNtCreateProcess function automatically like this.
In the HookedNtCreateProcess function, need to accomplish earlier the following step:
at first, need obtain the secure identifier of main body.According to the 4th parameter acquiring parent process of function _ pointer of EPROCESS, be the secure identifier of parent process in the search index doubly linked list then with this pointer, preserve with an integers sSid;
secondly need obtain the secure identifier of object.According to the complete trails of the executable file of the 6th parameter acquiring subprocess, can inquire the secure identifier of executable file through complete trails.Because the secure identifier of file is a character string STRING type, so need twice inquiry to accomplish.The size of query safe identifier for the first time, dynamically allocation space is stored this secure identifier then, formally comes the query safe identifier and puts into the space of preparation for the second time.So far, the secure identifier of Subjective and Objective all obtains.
The problem that this step should be noted that is, if carry out the system call of establishment process earlier, wait subprocess to create successfully after, inquire about the secure identifier of subprocess again, return the result of refusal as if security server, just stop this subprocess.This scheme be process also as the object object, rather than executable file as the object object, this method of afterwards handling is obviously not as the scheme of advance preventing.Executable file is first object that need visit of creating a process, and can gain the initiative more more the opportunity of monitoring, also just can more effective prevention.
are last, send into the secure identifier of Subjective and Objective in the security server through function call SEWindowsProcessCreate, and security server can return the variable ecbatic of a NTSTATUS type.If refusal then no longer calls the ZwCreateProcess function, directly return failure.If the result then changes ZwCreateProcess () function over to for allowing, call the ZwCreateProcess function through the global variable OriginalNtCreateProcess that stores ZwCreateProcess () function, accomplish establishment to subprocess.
were then returned the result of failure again if the subprocess in a last step is created failure; If create successfully, then need carry out the operation that the subprocess territory is shifted.The territory transfer need be called the interface function pfac_transition_sid of security server, and input parameter is the secure identifier of subject process and object executable file, and output parameter is the new secure identifier of subprocess.
next need this is newly-generated the secure identifier of process deposit in the doubly linked list, in order to later use.The interface function SetProcessSid that calls secure identifier is provided with the secure identifier of subprocess.
Whether successful whether inquired about this secure identifier through query function QueryProcessSid and correctly added for the setting of test safety identifier.So far, the HookedNtCreateProcess function is complete.
concrete execution is flowed like Fig. 3.
above-mentioned instance only is explanation technical conceive of the present invention and characteristics, and its purpose is to let the people who is familiar with this technology can understand content of the present invention and enforcement according to this, can not limit protection scope of the present invention with this.All equivalent transformations that spirit is done according to the present invention or modification all should be encompassed within protection scope of the present invention.

Claims (9)

1. pressure access control apparatus based on windows platform; Comprise and be used to intercept and capture the monitoring module of window application through the request of system call visit Windows system kernel object and be used to judge request legitimacy whether core security server; It is characterized in that said monitoring module and core security server all are arranged on Windows system kernel layer; Monitoring module capturing operation system process is to the access request of kernel objects, and offers core security server and carry out strategy and judge; Core security server is carried out after authority judges, according to the judged result permits access Windows system kernel object requests of security server whether monitoring module if allow, then carries out original system call; If refusal then directly returns.
2. the pressure access control apparatus based on windows platform according to claim 1 is characterized in that monitoring module request captured object is selected from any or two or more combination in any of window application through file object, process object, thread object or the registry objects of system call visit.
3. the pressure access control apparatus based on windows platform according to claim 1 is characterized in that said monitoring module comprises the process monitoring submodule, file monitor submodule and registry monitoring submodule; Said process monitoring submodule is used for handling independently the control to process object or thread object visit, and said file monitor submodule and registry monitoring submodule all need the calling process monitoring submodule to accomplish the control to file object and registry objects visit.
4. the pressure access control apparatus based on windows platform according to claim 3; It is characterized in that said monitoring module for adopting the kernel SSDT-HOOK module of kernel level Hook technology, the Hook collection of said process monitoring submodule is used to monitor the establishment process, opens process, the termination process, create thread, open thread, terminate thread; The Hook collection of said file monitor submodule is used to monitor to be created or opens file, opens file, deletion or Rename file, the extended attribute of file is set; The Hook collection of said registry monitoring submodule is used for that monitoring is created or opened registry entry, opens registry entry, the deletion registry entry, add or registry key, deletion registry key be set.
5. the pressure access control apparatus based on windows platform according to claim 1; It is characterized in that said core security server is used to manage the safe context of kernel objects, treatment progress is forced the decision request of access control system and is returned the result of decision-making.
6. the pressure access control apparatus based on windows platform according to claim 1 is characterized in that said core security server is formed for the binary file of the strategy judgement of different objects according to the DTE security model according to the difference of access object.
7. forced access control method based on windows platform is characterized in that said method controlled by monitoring module that is provided with at Windows system kernel layer and core security server, said method comprising the steps of:
(1) window application sends access request through system call to Windows system kernel object;
(2) monitoring module is intercepted and captured the access request of Windows operating system process to kernel objects, and offers core security server and carry out strategy judgement;
(3) core security server is carried out after authority judges, according to the judged result permits access object requests of security server whether monitoring module if allow, then carries out original system call, if refusal then directly returns.
8. method according to claim 7; It is characterized in that when the kernel objects of visit is process object or thread object; Monitoring module adds secure identifier to process object or thread object, and secure identifier is provided with according to the binary file of the rule creation of process object or thread object through reading core security server.
9. method according to claim 7 is characterized in that said monitoring module for adopting the kernel SSDT-HOOK module of kernel level Hook technology, is used to monitor the access object in the life cycle.
CN2010105875815A 2010-12-15 2010-12-15 Device and method for controlling mandatory access based on Windows platform Pending CN102542182A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105875815A CN102542182A (en) 2010-12-15 2010-12-15 Device and method for controlling mandatory access based on Windows platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105875815A CN102542182A (en) 2010-12-15 2010-12-15 Device and method for controlling mandatory access based on Windows platform

Publications (1)

Publication Number Publication Date
CN102542182A true CN102542182A (en) 2012-07-04

Family

ID=46349052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105875815A Pending CN102542182A (en) 2010-12-15 2010-12-15 Device and method for controlling mandatory access based on Windows platform

Country Status (1)

Country Link
CN (1) CN102542182A (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904889A (en) * 2012-10-12 2013-01-30 北京可信华泰信息技术有限公司 Cross-platform-unified-management-supported mandatory access controlling system and method
WO2014059885A1 (en) * 2012-10-17 2014-04-24 Tencent Technology (Shenzhen) Company Limited Apparatus and method for preventing a virus file from illegally manipulating a device
CN103778006A (en) * 2014-02-12 2014-05-07 成都卫士通信息安全技术有限公司 Method for controlling progress of operating system
CN104133726A (en) * 2014-08-13 2014-11-05 浪潮电子信息产业股份有限公司 Process context mandatory access control method
CN104394175A (en) * 2014-12-17 2015-03-04 中国人民解放军国防科学技术大学 Message access control method based on network marking
CN104508676A (en) * 2012-08-03 2015-04-08 阿尔卡特朗讯公司 Mandatory protection control in virtual machines
CN104881291A (en) * 2015-06-03 2015-09-02 北京金山安全软件有限公司 Control method and device of default browser and terminal
CN106156610A (en) * 2016-06-29 2016-11-23 北京金山安全软件有限公司 Process path acquisition method and device and electronic equipment
CN106156622A (en) * 2016-07-04 2016-11-23 北京金山安全软件有限公司 Service process registration method and device and terminal equipment
CN106778208A (en) * 2016-12-01 2017-05-31 深圳Tcl新技术有限公司 The access processing method and device of application program
CN106778298A (en) * 2016-12-01 2017-05-31 电子科技大学 A kind of forced access control method and device towards real time operating system
CN107547520A (en) * 2017-07-31 2018-01-05 中国科学院信息工程研究所 Flask security modules, construction method and mobile Web system
CN108287779A (en) * 2018-01-24 2018-07-17 郑州云海信息技术有限公司 A kind of Windows startup items monitoring method and system
CN108536448A (en) * 2018-03-21 2018-09-14 江苏长顺江波软件科技发展有限公司 A method of modification windows operating systems SID
WO2019051948A1 (en) * 2017-09-15 2019-03-21 平安科技(深圳)有限公司 Method, apparatus, server, and storage medium for processing monitoring data
CN109740310A (en) * 2018-12-29 2019-05-10 北京嘉楠捷思信息技术有限公司 Kernel object access method and device for embedded operating system
CN109831420A (en) * 2018-05-04 2019-05-31 360企业安全技术(珠海)有限公司 The determination method and device of kernel process permission
CN110348234A (en) * 2019-07-01 2019-10-18 电子科技大学 Pressure access safety strategy implementation method and management method in MILS framework
CN110472412A (en) * 2019-08-21 2019-11-19 杭州安恒信息技术股份有限公司 The program self-protection method and device monopolized based on kernel
CN110532798A (en) * 2019-07-26 2019-12-03 苏州浪潮智能科技有限公司 A kind of file forced access control method and device
CN111259348A (en) * 2020-02-20 2020-06-09 国网信息通信产业集团有限公司 Method and system for safely running executable file
CN112597492A (en) * 2020-12-24 2021-04-02 浙大网新科技股份有限公司 Binary executable file change monitoring method based on Windows kernel
WO2024078348A1 (en) * 2022-10-13 2024-04-18 中科方德软件有限公司 Method and apparatus for processing registry operation in application porting environment, and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020166052A1 (en) * 2001-05-04 2002-11-07 Microsoft Corporation System and methods for caching in connection with authorization in a computer system
CN101729550A (en) * 2009-11-09 2010-06-09 西北大学 Digital content safeguard system based on transparent encryption and decryption method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020166052A1 (en) * 2001-05-04 2002-11-07 Microsoft Corporation System and methods for caching in connection with authorization in a computer system
CN101729550A (en) * 2009-11-09 2010-06-09 西北大学 Digital content safeguard system based on transparent encryption and decryption method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李奇: "Windows访问控制实施框架研究、设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104508676B (en) * 2012-08-03 2017-12-01 阿尔卡特朗讯公司 Mandatory protection control in virtual machine
CN104508676A (en) * 2012-08-03 2015-04-08 阿尔卡特朗讯公司 Mandatory protection control in virtual machines
CN102904889B (en) * 2012-10-12 2016-09-07 北京可信华泰信息技术有限公司 Support the forced symmetric centralization system and method for cross-platform unified management
CN102904889A (en) * 2012-10-12 2013-01-30 北京可信华泰信息技术有限公司 Cross-platform-unified-management-supported mandatory access controlling system and method
WO2014059885A1 (en) * 2012-10-17 2014-04-24 Tencent Technology (Shenzhen) Company Limited Apparatus and method for preventing a virus file from illegally manipulating a device
CN103778006A (en) * 2014-02-12 2014-05-07 成都卫士通信息安全技术有限公司 Method for controlling progress of operating system
CN103778006B (en) * 2014-02-12 2017-02-08 成都卫士通信息安全技术有限公司 Method for controlling progress of operating system
CN104133726A (en) * 2014-08-13 2014-11-05 浪潮电子信息产业股份有限公司 Process context mandatory access control method
CN104394175A (en) * 2014-12-17 2015-03-04 中国人民解放军国防科学技术大学 Message access control method based on network marking
CN104881291A (en) * 2015-06-03 2015-09-02 北京金山安全软件有限公司 Control method and device of default browser and terminal
CN104881291B (en) * 2015-06-03 2018-05-25 北京金山安全软件有限公司 Control method and device of default browser and terminal
CN106156610A (en) * 2016-06-29 2016-11-23 北京金山安全软件有限公司 Process path acquisition method and device and electronic equipment
CN106156610B (en) * 2016-06-29 2019-02-12 珠海豹趣科技有限公司 A kind of process path acquisition methods, device and electronic equipment
CN106156622A (en) * 2016-07-04 2016-11-23 北京金山安全软件有限公司 Service process registration method and device and terminal equipment
CN106778298A (en) * 2016-12-01 2017-05-31 电子科技大学 A kind of forced access control method and device towards real time operating system
CN106778208A (en) * 2016-12-01 2017-05-31 深圳Tcl新技术有限公司 The access processing method and device of application program
CN107547520A (en) * 2017-07-31 2018-01-05 中国科学院信息工程研究所 Flask security modules, construction method and mobile Web system
WO2019051948A1 (en) * 2017-09-15 2019-03-21 平安科技(深圳)有限公司 Method, apparatus, server, and storage medium for processing monitoring data
CN108287779A (en) * 2018-01-24 2018-07-17 郑州云海信息技术有限公司 A kind of Windows startup items monitoring method and system
CN108287779B (en) * 2018-01-24 2021-07-27 郑州云海信息技术有限公司 A kind of Windows startup item monitoring method and system
CN108536448A (en) * 2018-03-21 2018-09-14 江苏长顺江波软件科技发展有限公司 A method of modification windows operating systems SID
CN109831420A (en) * 2018-05-04 2019-05-31 360企业安全技术(珠海)有限公司 The determination method and device of kernel process permission
CN109831420B (en) * 2018-05-04 2021-10-22 360企业安全技术(珠海)有限公司 Method and device for determining kernel process authority
CN109740310A (en) * 2018-12-29 2019-05-10 北京嘉楠捷思信息技术有限公司 Kernel object access method and device for embedded operating system
CN109740310B (en) * 2018-12-29 2024-06-07 嘉楠明芯(北京)科技有限公司 Kernel object access method and device for embedded operating system
CN110348234A (en) * 2019-07-01 2019-10-18 电子科技大学 Pressure access safety strategy implementation method and management method in MILS framework
CN110532798B (en) * 2019-07-26 2021-07-27 苏州浪潮智能科技有限公司 A kind of file mandatory access control method and device
CN110532798A (en) * 2019-07-26 2019-12-03 苏州浪潮智能科技有限公司 A kind of file forced access control method and device
CN110472412A (en) * 2019-08-21 2019-11-19 杭州安恒信息技术股份有限公司 The program self-protection method and device monopolized based on kernel
CN111259348A (en) * 2020-02-20 2020-06-09 国网信息通信产业集团有限公司 Method and system for safely running executable file
CN111259348B (en) * 2020-02-20 2023-03-07 国网信息通信产业集团有限公司 Method and system for safely running executable file
CN112597492A (en) * 2020-12-24 2021-04-02 浙大网新科技股份有限公司 Binary executable file change monitoring method based on Windows kernel
CN112597492B (en) * 2020-12-24 2023-09-19 浙大网新科技股份有限公司 Binary executable file modification monitoring method based on Windows kernel
WO2024078348A1 (en) * 2022-10-13 2024-04-18 中科方德软件有限公司 Method and apparatus for processing registry operation in application porting environment, and medium

Similar Documents

Publication Publication Date Title
CN102542182A (en) Device and method for controlling mandatory access based on Windows platform
US8321932B2 (en) Program-based authorization
TWI333614B (en) Method, system, and program for processing a file request
US10417179B2 (en) Method for managing files and apparatus using the same
US7386885B1 (en) Constraint-based and attribute-based security system for controlling software component interaction
CN104732147A (en) Application program processing method
US7580933B2 (en) Resource handling for taking permissions
CN104751050A (en) Client application program management method
JP2021535475A (en) Access control policy placement methods, devices, systems and storage media
CN109923547B (en) Program behavior monitoring device, distributed object generation management device, storage medium, and program behavior monitoring system
CN115917539A (en) Method for securing system calls, method for enforcing associated security policies, and device for executing said methods
EP3779747B1 (en) Methods and systems to identify a compromised device through active testing
JP2020502699A (en) Architecture, method and apparatus for implementing collection and display of computer file metadata
US20200274753A1 (en) Method for creating and managing permissions for accessing yang data in yang-based datastores
JP2004303242A (en) Security attributes in trusted computing systems
US20230214248A1 (en) Controlling Container Commands Issued In A Distributed Computing Environment
JP2008152519A (en) Computer and its basic software
CN109784041B (en) Event processing method and device, storage medium and electronic device
Lovat et al. Data-centric multi-layer usage control enforcement: A social network example
KR101956725B1 (en) A system for server access control using permitted execution files and dynamic library files
US11954203B2 (en) Methods and systems for identifying a compromised device through its unmanaged profile
US11343258B2 (en) Methods and systems for identifying a compromised device through its managed profile
US11645402B2 (en) Methods and systems for identifying compromised devices from file tree structure
CN115270101A (en) Application control method executed on the client side
CN107944297B (en) A control method and device for accessing files

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120704