Package Manager Security

نویسندگان

  • Anish Athalye
  • Rumen Hristov
  • Tran Nguyen
  • Qui Nguyen
چکیده

We analyze the security properties of package management software. First, we examine many package managers for basic security properties and we perform an in-depth security audit for several chosen package managers. Next, we construct and demonstrate an automated end-to-end attack against CPAN, a popular packagemanager for Perl. Finally, we make recommendations on how to build more secure package management programs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Package Management Security

Package management is the task of determining which packages should be installed on a host and then downloading and installing those packages. This paper examines the popular package managers APT and YUM and presents nine feasible attacks on them. There are attacks that install malicious packages, deny users package updates, or cause the host to crash. This work identifies three rules of packag...

متن کامل

An Approach for Secure Software

We present an approach that addresses the problem of securing software configurations from the security-relevant actions of poorly built/faulty installation packages. Our approach is based on a policy-based control of the package manager’s actions and is customizable for site-specific policies. We discuss an implementation of this approach in the context of the Linux operating system for the Re...

متن کامل

An Approach for Secure Software Installation

We present an approach that addresses the problem of securing software configurations from the security-relevant actions of poorly built/faulty installation packages. Our approach is based on a policy-based control of the package manager’s actions and is customizable for site-specific policies. We discuss an implementation of this approach in the context of the Linux operating system for the Re...

متن کامل

Security Policy Generation through Package Management

Generation and maintenance of security policies is too complex and needs simplification for it to be widely adopted and thus truly make a difference in delivering the promise of more secure computing systems (rather than just being ignored by administrators). In practice, one of the great obstacles to the adoption of security measures in system software is the complexity of configuration that i...

متن کامل

ISRAM: information security risk analysis method

Continuously changing nature of technological environment has been enforcing to revise the process of information security risk analysis accordingly. A number of quantitative and qualitative risk analysis methods have been proposed by researchers and vendors. The purpose of these methods is to analyze today's information security risks properly. Some of these methods are supported by a software...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014