Skip navigation
  • Home
  • Browse
    • Communities
      & Collections
    • Browse Items by:
    • Publication Date
    • Author
    • Title
    • Subject
    • Department
  • Sign on to:
    • My MacSphere
    • Receive email
      updates
    • Edit Profile


McMaster University Home Page
  1. MacSphere
  2. Open Access Dissertations and Theses Community
  3. Open Access Dissertations and Theses
Please use this identifier to cite or link to this item: http://hdl.handle.net/11375/9416
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorQiao, S.en_US
dc.contributor.authorKulbakas, Christopheren_US
dc.date.accessioned2014-06-18T16:47:00Z-
dc.date.available2014-06-18T16:47:00Z-
dc.date.created2011-06-06en_US
dc.date.issued2010-09en_US
dc.identifier.otheropendissertations/4541en_US
dc.identifier.other5559en_US
dc.identifier.other2047699en_US
dc.identifier.urihttp://hdl.handle.net/11375/9416-
dc.description.abstract<p>Authentication frameworks and their implementations are essential to securing computer systems and networks. One such framework is the Pluggable Authentication Modules (PAM) published in 1995 as standard OSF-RFC 86.0. PAM solves the "authentication problem", mainly, how to "integrate multiple authentication mechanisms in a modular and dynamic fashion", making PAM the de facto choice for authentication on most Unix and GNU/Linux-based systems. Linux-PAM is an implementation of PAM for GNU/Linux.</p> <p>To this day, Linux-PAM configurations are poorly understood by administrators. Ad hoc, informal PAM-configuration testing techniques exist, but suffer from many shortcomings.</p> <p>We introduce an automated, formal approach to Linux-PAM configuration testing. First, given a Linux-PAM configuration, we dynamically create an "intemal-to-the-tool" representation of a Hierarchical Coloured Petri Net (HCPN), which encodes all of the possible authentication process instances associated with this configuration. During this creation, "base case" HCPN templates are used, each template created only once, i.e. during tool development, not during testing. Second, we translate the resulting HCPN into a NuSMV model Third, we use NuSMV to verify the model for "security" properties.</p> <p>A tool prototype, implemented in C, automates these three steps. State space size was reduced via manual HCPN and Transition System specification tuning. The State Space Explosion problem was overcome with the use of NuSMV-implemented model checking algorithms. Industrial Linux-PAM configurations were tested, yielding model building times in ones of seconds, and verification times in tens of seconds. Also, the tool produces HCPN representations via Graphviz.</p>en_US
dc.subjectComputer Engineeringen_US
dc.subjectComputer Sciencesen_US
dc.subjectSoftware Engineeringen_US
dc.subjectComputer Engineeringen_US
dc.titleFormally Specifying and Verifying Linux-PAM Configurations Using Hierarchical Coloured Petri Nets and NuSMVen_US
dc.typethesisen_US
dc.contributor.departmentComputing and Softwareen_US
dc.description.degreeMaster of Science (MS)en_US
Appears in Collections:Open Access Dissertations and Theses

Files in This Item:
File SizeFormat 
fulltext.pdf
Open Access
5.66 MBAdobe PDFView/Open
Show simple item record Statistics


Items in MacSphere are protected by copyright, with all rights reserved, unless otherwise indicated.

Sherman Centre for Digital Scholarship     McMaster University Libraries
©2022 McMaster University, 1280 Main Street West, Hamilton, Ontario L8S 4L8 | 905-525-9140 | Contact Us | Terms of Use & Privacy Policy | Feedback

Report Accessibility Issue