SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Lindskog Stefan) srt2:(1995-1999)"

Search: WFRF:(Lindskog Stefan) > (1995-1999)

  • Result 1-8 of 8
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Hedbom, Hans, et al. (author)
  • A Comparison of the Security of Windows NT and UNIX
  • 1998
  • Conference paper (peer-reviewed)abstract
    • This paper presents a brief comparison of two operating systems, Windows NT and UNIX. The comparison covers two different aspects. First, we compare the main security features of the two operating systems and then we make a comparison of a selection of vulnerabilities most of which we know have been used for making real intrusions. We found that Windows NT has slightly more rigorous security features than standard UNIX but the two systems display similar vulnerabilities. The conclusion is that there are no significant differences in the real level of security between these systems
  •  
2.
  • Hedbom, Hans, et al. (author)
  • Analysis of the Security of Windows NT
  • 1998
  • Reports (peer-reviewed)abstract
    • This paper presents an analysis of the security in Windows NT 4.0, working in both stand-alone and networking mode. The objective of the work was to find out how secure this operating system actually is. A technical overview of the system, and in particular its security features is given. The system security was analyzed and practical intrusion attempts were made in order to verify vulnerabilities or to find new ones. All vulnerabilities are described in detail and classified according to a classification scheme. A comparison to commonly known UNIX weaknesses was made. It revealed generic similarities between the two systems to a surprisingly high degree. Finally a number of recommendations are given. The paper concludes that there are ample opportunities to improve the security of Windows NT. We have reason to believe that it is probably not higher than that of UNIX
  •  
3.
  • Hedbom, Hans, et al. (author)
  • A Preliminary Evaluation of the Security of a Non-Distributed Version of Windows NT
  • 1997
  • Conference paper (peer-reviewed)abstract
    • In this paper we present a preliminary evaluation of the security of a non-distributed version of Windows NT. The objectives of the work are twofold: first, to learn more about the security system; and, second, to find out how secure the system actually is. Thus the architecture and security mechanisms of Windows NT have been studied. Furthermore, the paper contains a few examples of successful intrusions on the target system, which was a standard personal computer with Windows NT Workstation 3.51 and one with NT Workstation 4.0, both working in a stand-alone mode. We have also found some evidence that other, more severe security flaws exist in the system
  •  
4.
  • Hedbom, Hans, et al. (author)
  • A Security Evaluation of a Non-Distributed Version of Windows NT
  • 1997
  • Reports (peer-reviewed)abstract
    • In this paper we present an evaluation of the security in Windows NT. The objectives of the work are twofold: first, to learn more about the security system; and, second, to find out how secure the system actually is. To investigate the latter, the authors, have adopted the role of attackers. This paper contains results from several attempts to violate the security of Windows NT. In some cases, the attempts were successful, meaning that we gained access to information or resources that should be protected. The target systems were standard personal computers with Windows NT Workstation 3.51 and Windows NT Workstation 4.0 respectively, both working in stand-alone mode
  •  
5.
  • Jonsson, Erland, et al. (author)
  • On the Functional Relation between Security and Dependability Impairments
  • 1999
  • Conference paper (peer-reviewed)abstract
    • Problems related to security and dependability/reliability are still treated separately in many contexts. It has been shown that there is a considerable conceptual overlap, however, and an integrated framework for the two disciplines has already been suggested. This paper shows that there is also a conceptual overlap of impairments from these areas and suggests an integrated approach that clarifies the functional relation between these, both from dependability and security viewpoints. The overall objective is to arrive at a general and clear-cut framework that would describe how trustable (dependable, secure) a system is, regardless of the reason for its not being totally trustable. For example, it should be possible to treat a system failure caused by an intentional intrusion or a hardware fault using the same methodology. A few examples from real-world situations are given to support the suggested approach
  •  
6.
  • Lindskog, Stefan, et al. (author)
  • An Analysis of the Security of Windows NT
  • 1999
  • Reports (peer-reviewed)abstract
    • This paper presents an analysis of the security of Windows NT 4.0. The primary objective of the analysis was to investigate how secure the operating system actually is. A technical overview of the system, and in particular of its security features, is given. The system security was analyzed and practical intrusion attempts were made in order to verify known vulnerabilities and find new ones. The paper concludes that there are ample opportunities to improve the security of Windows NT
  •  
7.
  • Lindskog, Stefan, et al. (author)
  • IT Security Research and Education in Synergy
  • 1999
  • Conference paper (peer-reviewed)abstract
    • This paper presents experience from laboratory projects performed by students in Applied Computer Security, a course given at Chalmers University of Technology. From this, we conclude that the combination of security research and education results in a synergy that can be very beneficial to both fields. The paper describes in detail three different types of laboratory projects: intrusion experiments, intrusion analysis and remediation, and intrusion detection. Furthermore, we discuss the outcome and impact of the student projects with respect to education, research, and synergy between the two, as well as ethical issues. Among the benefits of the close connection between research and education in the projects, we find that the students were very motivated by this research connection and that they produced unique research data with natural diversity
  •  
8.
  • Lindskog, Stefan, et al. (author)
  • Security Evolution of a Network Operating System
  • 1999
  • Conference paper (peer-reviewed)abstract
    • In this paper, we study the security evolution of Novell NetWare from version 3.12 until the most recent version of today. A detailed description of both security features and flaws in Netware 3.12 is presented. The flaws were revealed during an intrusion experiment performed by undergraduate students as project work in a course in computer security. The paper also deals with new security features, as well as newly discovered weaknesses, in versions 4 and 5 of the network operating system. The paper concludes that the weakest points of the Novell NetWare system are the clients themselves and the connections between clients and servers. Surprisingly enough, this fact remains true despite significant security improvements in later versions of the system. It is discussed whether this result can be generalized, leading to the conclusion that virtually no commercial system will ever be secure
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-8 of 8
Type of publication
conference paper (5)
reports (3)
Type of content
peer-reviewed (8)
Author/Editor
Lindskog, Stefan (8)
Jonsson, Erland (8)
Hedbom, Hans (5)
Axelsson, Stefan (2)
Strömberg, Lars (1)
Gustafson, Ulf (1)
show more...
Lindqvis, Ulf (1)
show less...
University
Karlstad University (8)
Language
English (8)
Research subject (UKÄ/SCB)
Natural sciences (8)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view