×

Analyzing access control configurations

  • US 8,701,200 B2
  • Filed: 09/11/2012
  • Issued: 04/15/2014
  • Est. Priority Date: 10/31/2006
  • Status: Active Grant
First Claim
Patent Images

1. A computer-readable memory device encoded with computer-executable instructions that, when executed, perform a method of analyzing access control configurations, the method comprising:

  • generating an information flow based on access control relations, an access control mechanism model, and an access control policy model, wherein the information flow comprises inferred read, write, and execute relations between one or more principals and one or more resources, the inferred read, write, and execute relations determined by processing the access control relations according to functions of the access control mechanism model;

    determining, based on applying functions of the access control policy model to the inferred read, write, and execute relations of the generated information flow, whether privilege escalation is possible; and

    when privilege escalation is possible, indicating in a vulnerability report that the privilege escalation is possible;

    wherein the vulnerability report comprises one or more hierarchical structures, and wherein each hierarchical structure comprises;

    a root element identifying a potential privilege escalation with a corresponding type, resource, and principal; and

    a derivation comprising one or more non-root elements that are descendants of the root element and identify the source of each of the type, resource, and principal.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×