Security-Oriented Program Transformation - PowerPoint PPT Presentation

ilario
security oriented program transformation n.
Skip this Video
Loading SlideShow in 5 Seconds..
Security-Oriented Program Transformation PowerPoint Presentation
Download Presentation
Security-Oriented Program Transformation

play fullscreen
1 / 9
Download Presentation
Security-Oriented Program Transformation
124 Views
Download Presentation

Security-Oriented Program Transformation

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Security-Oriented Program Transformation Pure Symposium Spring 2011 Mentee: Noreen Sudirman Mentor: Prof. Munawar Hafiz Noreen. S

  2. Big Idea of the Project • To gather information necessary to build an automated program transformation that eliminate security threats Noreen. S

  3. Problem • One of the crucial part in determining secured programming is PRIVILEGES • The privilege differs between child and parent process Noreen. S

  4. Research Goal • To find out the privileges of parent process and child process • Find similarities between the privileges given to either parent process or child process in real-life program Noreen. S

  5. Progress • Understanding the file descriptors needed, such as pipe, named pipes (FIFO), socket, etc • Find real life program that uses FORK from gnu.org, sourceforge, etc Noreen. S

  6. Typical Fork Process intuid = getuid(); intgid = getgid(); if (!detached || dflag !=2){ MasterPid = fork(); printf("after fork, uid: %d; gid: %d\n", uid, gid); } Snippets of code from gnu.org/software/screen/screen.c Noreen. S

  7. Checking the Privileges intuid = getuid(); intgid = getgid(); if (!detached || dflag !=2){ printf(“before fork, uid: %d; gid:%d\n”, uid, gid); MasterPid = fork(); uid = getuid(); gid = getgid(); printf("after fork, uid: %d; gid: %d\n", uid, gid); } Snippets of code which is edited from gnu.org/software/screen/screen.c Noreen. S

  8. Problems Encountered Hard to manipulate real life code because of the size of the file, many complicated functions. Noreen. S

  9. THANK YOU My mentor Prof. Munawar Hafiz Pure Committee Noreen. S