Program-based authorization

Information

  • Patent Grant
  • 8321932
  • Patent Number
    8,321,932
  • Date Filed
    Wednesday, December 22, 2010
    15 years ago
  • Date Issued
    Tuesday, November 27, 2012
    13 years ago
Abstract
Techniques which allow definition and enforcement of program-based action authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The subject process, the program file of the subject process, the attempted action and the object of the attempted action are determined. An authorization policy considering the program file indicates whether the attempted action is authorized or not. In a tracking mode, the attempted action and its authorization are logged and the attempted action is allowed to proceed. In an enforcement mode, unauthorized attempts are blocked and logged, thereby enforcing the authorization policy.
Description
BACKGROUND

1. Field


Invention relates generally to authorization of actions on computer systems, and in particular to authorization based on the program initiating the action.


2. Related Art


Access control is a useful and practical concept in the field of information technology. The definition, monitoring and enforcement of access control policies contribute to the predictable and manageable operation and maintenance of business assets and processes.


An abstraction central to access control is that of subjects performing actions on objects. A familiar example of this is a user (subject) attempting to delete (action) a file (object) on a computer. The usefulness of this abstraction stems from the fact that policies can be defined based on an identification of the subject and the object, as well as an authorization for the particular action attempted by the subject on the object. Once defined, such policies can be monitored and enforced, affording visibility into and control over the access and action patterns.


While actions attempted by human subjects are ultimately performed by one or more processes running on the computer, in traditional access control the authorization policies are generally defined for “human” subjects, such as users and system administrators, and tied to credentials such as logins and passwords and file ownerships. As a result, while in theory it is possible to define authorization policies based non-human subjects such as programs and processes running on a computer, today such definitions simply defer to the particular user context within which the subject program or process is executing, using that context as an input into the authorization policy instead of relying on an identification of the process or program itself.


There are a number of reasons why program-based authorization is increasingly needed today, including: a rise in the software-based automation of tasks and decisions such as system provisioning and anti-malware protection, a prevalence of exploits attempted by programs and processes running with minimal human interaction or supervision (such as software worms), the frequent practice of privilege escalation by both programs and humans attempting to gain a “privileged user” status in order to run a program with broader permissions than are allowed under the lower privilege and often resulting in malicious or accidental system breakage, and so forth.


Therefore, a need exists for techniques that allow program-based authorization, allowing authorization decisions to take into account not only the action, the object and the user context of the subject process, but also a range of other attributes of the subject process, such as the program being executed by the subject process.


SUMMARY

We disclose techniques which allow definition and enforcement of program-based action authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The subject process, the program file of the subject process, the attempted action and the object of the attempted action are determined. An authorization policy considering the program file indicates whether the attempted action is authorized or not. In a tracking mode, the attempted action and its authorization are logged and the attempted action is allowed to proceed. In an enforcement mode, unauthorized attempts are blocked and logged, thereby enforcing the authorization policy.





BRIEF DESCRIPTION OF DRAWINGS


FIG. 1 is a diagrammatic illustration of an exemplary system for program-based authorization, in accordance with an embodiment of the present invention.



FIG. 2 is a flow diagram showing a method for program-based action authorization, according to an embodiment of the present invention.



FIG. 3 is a flow diagram showing a method for program-based execution authorization, according to an embodiment of the present invention.





DETAILED DESCRIPTION

In the program-based authorization techniques described herein, a process' attempt to perform an action on an object is intercepted. A program file, representing code or instructions being executed by the process, is then determined, along with the action and the object. By way of example, the interception and subsequent determinations can be performed by a software agent running on the computer. Referring to an authorization policy which considers the program file, action and object, a decision is made to either allow or block the attempted action. In both cases, it may be desirable to generate a log or alert indicative of the decision.



FIG. 1 is a diagrammatic illustration of an exemplary system for program-based authorization, in accordance with an embodiment of the present invention. Computer 101 comprises a memory component 102 and a storage component 103, managed by an operating system (OS). A process 104 (hereinafter also referred to as the “subject process”) is launched and executes within memory component 102. Program file 105 (hereinafter also referred to as “subject program file”) represents the code or sequence of instructions which subject process 104 starts executing upon its launch. The subject program file 105 is typically some type of an executable file, such as a binary executable file, script, batch file, interpreted code, byte code, etc. Program file 105 is stored on storage component 103 or is otherwise accessible to computer 101. Note that subject process 104, during its life, may execute other code or instructions such as dynamic libraries, scripts, accepted input, or any other container of code, but the program file 105 refers to the code that subject process 104 starts out executing upon process launch. Furthermore, as described in more detail below, when subject process 104 is launched to execute a script, the program file 105 refers to the script and not to any interpreter of the script.


At some point during its execution, subject process 104 may attempt to perform an action on an object 106. For example, object 106 may be a file and the action attempt may comprise an attempt to write to the file. Other examples of objects 106 and actions are described below.


The action attempt is intercepted, and an authorization policy is consulted. The authorization policy takes into account the subject program file 105, and optionally may also consider one or more other attributes of the subject process 104 or of the program file 105, one or more attributes of the object 106, and/or one or more attributes of the action being attempted by subject process 104. The authorization policy indicates whether the attempted action is authorized or not.


There are two broad modes of operation for the program-based authorizations of the present invention: a “tracking mode” and an “enforcement mode”. Both modes allow authorized attempts to proceed, but the modes differ in how they handle unauthorized attempts. In an enforcement mode, unauthorized attempts are blocked. In a tracking mode, unauthorized attempts are allowed to proceed, but they are logged. Tracking mode is useful for examining what effects an authorization policy would have on a system were the policy to be enforced. Tracking mode allows experimentation with and fine-tuning of authorization policies on a live computer 101, as well as real-time feedback based thereon, without disturbing the operation or behavior of the computer 101. Once an authorization policy is deemed acceptable, it can be enforced by switching from tracking mode to enforcement mode.


A typical example of an object 106 is a file, managed by a file system of computer 101. In that case the action attempt is a file system action attempt such as a read, write or delete operation on the file, or it may be an attempt to execute the file. Another example of an object 106 is a registry entry, such as one managed by a Windows™ operating system. In that case the action attempt may be a retrieve, create or delete a registry entry. Other examples of objects 106 include containers or resources managed by a service-oriented architecture (SOA), data structures or other objects stored in memory 102, or any other objects that are accessible to subject process 104. In general, the actions that can be attempted by the subject process 104 depend on the object 106 and how the object is being managed. While the following description is illustrated mainly with reference to file system action attempts, this is by way of example and is not intended to limit the scope of the disclosed techniques. It should be obvious to one of ordinary skill in the art that the disclosed techniques can be applied to program-based authorization of any action attempted by a subject process on a computer. Further example actions for files and registry entries are enumerated below.


Program-Based Action Authorization



FIG. 2 is a flow diagram showing a method for program-based action authorization, according to an embodiment of the present invention. Step 201 intercepts a file system action attempt. This step preferably occurs in real-time. Step 202 determines the target file of the file system action attempt (step 202a), which is the object 106 in this action attempt, and one or more attributes of the file object 106 (step 202b). Step 203 determines the subject process 104 that is attempting to perform the action on the file object 106 (step 203a), and the subject program file 105 that represents the code being executed by the subject process 104 (step 203b). Optionally, step 203b also determines one or more other attributes of the subject process 104 and/or the subject program file 105. Examples of such other attributes are enumerated below.


Step 204 consults an authorization policy to determine 205 whether the attempted action is authorized or not. The authorization policy takes into account the subject program file 105 of the subject process 104, and may optionally also consider any other attributes that were determined in step 203b. The authorization policy preferably also takes into account the attempted action and one or more attributes of the file object 106 determined in step 202b (example attributes are described below). Optionally, the authorization policy may disregard some of the supplied information. For example, the authorization policy may disregard some or all of the file object 106 attributes and consider only the attempted action and subject program file 105 of the subject process 104. Authorization policies may be stored using any appropriate data structure, for example in a computer readable medium comprising a matrix with a plurality of entries, with an entry associating a program file (subject) with one or more allowed actions and objects on the computer.


If the action is authorized, step 206 allows the action to proceed and optional step 207 generates one or more log entries and/or alerts indicating that the authorized action was allowed to proceed. If the action is not authorized, step 208 blocks the action from proceeding and optional step 209 generates one or more log entries and/or alerts indicating that the unauthorized action was blocked. A log entry or alert may include information about the subject process, subject program, action, object, relevant authorization policy, date and time, and/or any other information available at the time of logging. Steps 208 and 209 are for an enforcement mode embodiment of the present invention. In a tracking mode embodiment, as described above, step 208 is skipped, allowing the unauthorized action to proceed and recording logs and/or alerts at step 209.


By way of example, and not limitation, attributes of the subject process 104, action and object 106 may include the following:


Subject process 104:

    • the program file 105 of subject process 104. This can be a binary file, script file, batch file, byte code, or any other local or remote container comprising compiled code, interpreted code, or any other code or instructions for execution on the computer 101;
    • one or more attributes of the program file 105 (analogous to the attributes enumerated below for objects 106). Note that for simplicity of exposition and naming, we are considering attributes of the program file 105 as attributes of the subject process 104, since we are considering the subject program file 105 itself as an attribute of the subject process 104;
    • in cases where the subject process 104 executes code other than the program file 105 (as described above), such other pieces of code may represent further attributes of the subject process 104;
    • a unique process identifier assigned by the OS to subject process 104, such as a process identification number, an EPROCESS block identifier, or other data structure or token associated with subject process 104;
    • the computer on which the subject process 104 is executing;
    • the user or group context within which the subject process 104 is executing;
    • any other data or meta-data that the OS associates with the subject process 104, or that another party associates with the subject process 104 (for example when the action is a “delete database” operation on a database object 106 managed by a database management system (DBMS) that associates one or more permissions or attributes with the subject process 104 or the subject program 105);


Action:

    • whether the action is a file system action request, a registry action request, or a request to perform an action on an object 106 managed by another subsystem of the computer 101;
    • action type, for example whether the action is an attempt to read from an object 106, write to an object 106, append to an object 106, truncate an object 106, create an object 106, delete an object 106, rename an object 106, move an object 106, get or set one or more attributes of the object 106, etc.;
    • the date or time at which the action is being attempted;
    • any other data or meta-data that the OS associates with the action, or that another party associates with the action (for example when the action is a “delete database” operation on a database object 106 managed by a DBMS that associates one or more permissions or attributes with such action);


Object 106:

    • object 106 name, path of the object 106 (for example when object 106 is a file or other data structure managed by the OS file system), object 106 size, object 106 permissions, object 106 ownerships (group owner, user owner), etc.;
    • fully qualified name of the object 106 (for example when the object 106 is a registry entry);
    • any other data or meta-data that the OS associates with the object 106, or that another party associates with the object 106 (for example when the object 106 is a database object managed by a DBMS);
    • when the action attempts to alter the contents of the object 106, a set of one or more differences (i.e. one or more “cliffs”) between one or more parts of the object 106 contents before the attempted change and one or more parts of the object's 106 likely contents after the attempted change;
    • note that an attribute may be considered in at least two ways: as what the attribute is at the time of consideration, i.e. before the attempted action takes effect, and as what the attribute likely will be as a result of completion of the attempted action. For example, authorization of an attempted permission change action may consider the current permissions of the object 106 and/or the permissions as they would be as a result of the attempted permission change action.


We now turn to describing the steps of FIG. 2 in more detail. For the interception step 201, OS provisions can be used to intercept file system action requests and registry action requests, as well as to determine whether a file system action request is a an attempt to read a file, write to a file, delete a file, rename a file, move a file, append a file, truncate a file, get or set permissions on a file, or get or set any other attribute of a file. For example, in a Microsoft Windows™ OS environment, a filter driver can be used to intercept file system requests and determine their type.


In other operating systems, such as Linux or other Unix-derived operating systems, a “shim” module or wrapper mechanism can be used for that purpose. A wrapper mechanism would redirect action attempts (e.g. system calls) to a wrapper library that represents an entry point for the interception code, and which may eventually call into the original library or code that implements the intended action attempt. One way of indicating redirection to the wrapper library comprises setting one or more environment variables indicating library load paths and sequences.


A shim module redirects system calls to custom interception code within the kernel, and the interception code decides whether or not to redirect execution to the kernel code that implements the system call. For example, in a Unix-derived OS, one or more virtual file system (VFS) methods may be patched to facilitate redirection to interception code. These and other Techniques for the interception of file system requests should be obvious to one of ordinary skill in the art, and are also briefly described in the above referenced co-pending U.S. patent application Ser. No. 11/346,741. Similarly, OS provisions can be used to intercept registry action requests and determine whether the request is an attempt to read or retrieve an entry, delete an entry, write to an entry, create an entry, or perform any other actions on the entry. We continue to illustrate the steps with exemplary references to file system requests.


Once a file system request is intercepted, the request indicates the file object 106 as well as the action that the subject process 104 is attempting to perform on the file object 106. It then remains to determine the subject process 104 that initiated the file system request (step 203a). One technique for doing this is to start with a unique identifier for the process context of the currently executing subject process 104. This identifier need not necessarily comprise the traditional process identification number (PID) assigned to processes by many operating systems, though it may. For example, in a Microsoft Windows™ OS, an EPROCESS block or a process handle can be used to uniquely identify the subject process 104.


Once an identifier for the subject process 104 is determined, it remains to infer the subject program file 105, and optionally one or more other attributes, of the subject process 104 (step 203b). For some operating systems, such as a Microsoft Windows™ OS, this information may not be available via a published application programming interface (API). In such cases, one technique for inferring the subject program file 105 associated with the subject process 104 is to explicitly keep track of the process-program associations so that they can be referred to when needed. One way to do this is by implementing a “Process Tracking Framework” abstraction which, upon receiving an identifier of a subject process 104 context, indicates the subject program file 105 associated with the subject process 104. The Process Tracking Framework is described separately below.


The authorization rules can be arbitrarily complex and may represent any function or Boolean predicate which effectively takes as input a subject program file 105 of a subject process 104 (and optionally one or more further attributes of the subject process 104), the requested action, and an object 106 (or one or more file object 106 attributes), and outputs an authorization decision. We will now present some specific use cases enabled by the program-based authorization techniques and authorization policies described herein.


One particular example of using program-based action authorization is to implement file read restrictions on a computer. As one example of a read restriction policy, a set of authorization rules can be defined to only allow a specified set of files R to be read by authorized subject processes 104. For example, we may only allow a specific program file 105 P to read any file in the set R. Consequently, whenever a process is created for the execution of some program, the enforcement mode program-based authorization mechanism described herein only allows a file in R to be read by that process when the process represents the execution of program P.


As a concrete example, if P is a specific word processor such as Microsoft Word™ and R is defined as files whose names have the extension of “.doc” or “.rtf” or “.txt”, then no program other than Microsoft Word™ is authorized to read such files. In particular, this means that file transfer programs and file copy utilities will not be able read such files and are thereby prevented from exfiltrating or duplicating such files (unless, of course, those programs are explicitly authorized to do so by the authorization policy or we are operating in tracking mode).


The authorization rules can be extended or amended to allow useful exceptions. For example, the set of programs authorized to read R may be extended to include further word processing programs. As another example, the authorization policies may be amended to authorize one or more backup and restore programs, whose purpose it is to read files for the purpose of archiving them, to read files in R.


Another example of using program-based action authorization is to implement file write restrictions on a computer. As one example of a write restriction policy, a set of authorization rules can be defined to allow a given program to only write to a specified set of files W. For example, we may specify that a specific program P may only write to files in W. Consequently, given a process created for the execution of some program, the enforcement mode program-based authorization mechanism described herein only allows the process to write to files in W when the process represents the execution of the program P.


As a concrete example, if P is a specific hypertext markup language (HTML) browser such as Microsoft Internet Explorer™, and W is defined as files whose names have the extension of “.html” or “.htm”, then Microsoft Internet Explorer™ will be allowed to only write to “.html” and “.htm” files. In particular, Microsoft Internet Explorer™ will be blocked from writing any executable files, scripts, batch files, dynamic libraries, etc. to disk, thereby reducing the risk of browser-written malware.


Other examples of grouping objects for the purpose of defining authorization policies are grouping objects by ownership, grouping objects that were created in a given time window, or grouping objects by their position in an object hierarchy. Corresponding example authorization policies here include: allowing only a predefined set of programs to modify files which (a) are owned by a specified owner; (b) were originally created before a threshold date; or (c) reside in a given directory within the file system.


Other examples of using program-based action authorization comprise extending the concepts disclosed in above-referenced co-pending U.S. patent applications with the program-based authorization techniques disclosed herein. In particular U.S. patent application Ser. Nos. 11/346,741 and 11/277,596 describe techniques involving authorization of updates and changes to and execution of objects resident on a computer system (such as software and configuration files, registry entries, executables, etc.). The present to program-based authorization techniques extend the authorization of updates and changes and executions described in said patents to also take into account one or more attributes of the subject process (and, by extension, of the subject program) attempting the action.


Program-Based Execution Authorization


The process for execution authorization is similar to that for action authorization, except that in some operating systems execution requests may follow a different code path that other file system action requests, and therefore the interception of execution requests may differ in implementation from the interception of other file system action requests.



FIG. 3 is a flow diagram showing a method for program-based execution authorization, according to an embodiment of the present invention. Step 221 intercepts an execution attempt. This step preferably occurs in real-time. Step 222 determines the executable file (step 222a), which is the object 106 in this execution attempt, and one or more attributes of the executable file object 106 (step 222b). Step 223 determines the subject process 104 that is attempting to perform the execute action on the executable file object 106 (step 223a), and the subject program file 105 that represents the code being executed by the subject process 104 (step 223b). Optionally, step 223b also determines one or more other attributes of the subject process 104 along with the subject program file 105. Examples of such other attributes were enumerated above.


Step 224 consults an execution authorization policy to determine 225 whether the attempted execution is authorized or not. The authorization takes into account the subject program file 105 of the subject process 104, and may optionally also consider any other attributes of the subject process 104 that were determined in step 223b. The authorization policy preferably also takes into account one or more attributes of the executable file object 106 determined in step 222b (example attributes were described above). Optionally, the authorization policy may disregard some of the supplied information. For example, the authorization policy may disregard the attributes of the executable file object 106 and consider only the subject program file 105 of the subject process 104.


If the execution is authorized, step 226 allows the execution to proceed and optional step 227 generates one or more log entries and/or alerts indicating that the authorized execution was allowed to proceed. If the execution is not authorized, step 228 blocks the action from proceeding and optional step 229 generates one or more log entries and/or alerts indicating that an unauthorized execution was blocked. Analogous to the above description, steps 228 and 229 are for an enforcement mode embodiment of the present invention. In a tracking mode embodiment, step 228 is skipped, allowing the unauthorized execution to proceed and recoding logs and/or alerts at step 229.


We now turn to describing the steps of FIG. 3 in more detail. One technique for implementing the interception step 221 comprises placing hooks within the process creation and process termination code paths of the OS. Since an execution request submitted to the OS generally includes an indication of the executable file object 106 as an argument (e.g. name or handle of a binary file, script file, batch file, interpreted program file, byte code file, etc.), what remains is to determine the subject process 104 and its subject program file 105, and optionally one or more other determined attributes (step 223). Determination of the subject process (step 223a) can be done as described above, for example by starting with a unique identifier for the process context of the currently executing subject process 104. Determination of subject process 104 attributes (step 223b), such as the actual program file comprising the code for the subject process, can be done by using the Process Tracking Framework.


Process Tracking Framework


By way of example, and not limitation, we now describe an exemplary implementation of the Process Tracking Framework. When the OS boots up, hooks are placed in the process creation and process termination code paths. As processes are created, one or more data structures are maintained which keep track of associations between processes (identified by a unique identifier) and programs (i.e. executable files, such as binaries, scripts, batch files, interpreted code, etc.), wherein a program associated with a process represents the code that the process started out executing when the process was launched. Conversely, as processes terminate, their corresponding entries are removed from the Process Tracking Framework data structures in order to keep the structures up-to-date and properly maintained.


Before turning to example implementations of the Process Tracking Framework, we clarify what is meant by the program 105 associated with a subject process 104 in cases where the process is launched to execute non-native code, such as a script, that requires an interpreter program for its execution. In such cases, for our purposes of program-based authorization, we associate the launched process (subject process 104) with the script (subject program 105), not with the program representing the interpreter of the script. This is true in general for programs that are read in by another program for execution, such as scripts, interpreted code, byte code, etc. For example, when a PERL script is executed, we associate the launched subject process 104 with the script file, not with the PERL interpreter program launched to interpret the script, even though the interpreter program is actually what the subject process starts out executing. Throughout the present description, this is what is meant by the subject program 105 associated with a subject process 104, with the Process Tracking Framework maintaining the appropriate association.


We now turn to an example implementation of the Process Tracking Framework. On a Microsoft Windows™ OS, a request to create a new process may involve calling a user-mode process creation function with an indication of the desired executable file as an argument. This function in turn may (a) call a function in kernel-mode to open the executable file and get a file handle for it, (b) call a function in kernel-mode to create a new section, passing in the file handle and receiving a new section handle, and (c) call a kernel-mode process creation function, passing in the section handle and a handle for the subject process (parent process) and receiving back a handle for the new process that is being created (child process).


Step (b) provides a correspondence between the section handle and the file handle, and we can obtain the file name from the file handle. Hence we can keep track of the correspondence between section handles and executable file names in the Process Tracking Framework data structures. Step (c) provides a correspondence between the section handle and the child process handle, and we can obtain the child process context from the child process handle. Hence we can also keep track of the correspondence between process contexts and section handles in the Process Tracking Framework data structures. Combining the two correspondences, the Process Tracking Framework allows us to obtain executable file names from process contexts. Similar techniques can be used to create and maintain a Process Tracking Framework on other operating systems such as Linux™, Solaris™, HP-UX™, AIX™, other Unix-flavored operating systems, etc. For example, in a Unix-derived OS, exec( ) and exit( ) calls (or variations thereof) may be patched, for example by patching the appropriate system call tables, in order to provide entry points for the creation, maintenance and cleanup of the Process Tracking Framework data structures associating processes with one or more attributes as described above.


Optionally, the Process Tracking Framework may also fulfill the task of providing one or more attributes for the subject process 104 and/or of the executable file object 106, in order to make the abstraction more convenient for the components that use the Process Tracking Framework. But this is an implementation choice, and such tasks may just as well be performed by the components themselves or by any other pieces of code.


Optionally, should deeper visibility into the execution chain be of interest, the history of process creation and termination can be tracked in order to establish and maintain up-to-date process creation trees. This enables the definition, implementation and enforcement of dynamic authorization policies. For example, we may define an authorization policy according to which a newly created executable file (such as a newly created binary executable file) can only be executed by its creator process. This means that when a subject process 104 attempts to execute an executable file object 106, the authorization policy allows the execution only when the subject process 104 is the creator of the executable file object 106. This concept can be extended to consider the program file 105 (of the creator process) as the creator of the executable file object 106, instead of limiting the creator concept to the specific instance of the creator process. In this extended case, the authorization policy allows a subject process 104 to execute an executable file object 106 whenever the subject program file 105 of the subject process 106 is considered the creator of the executable file object 106. The benefit is that this manner of authorization survives the termination of the specific creator process in a meaningful and useful way.


In another example of using the concept of a program file 105 P being considered the creator of an executable file object 106, the program file 105 P may be run in “learning mode” for a period of time. During the learning period, we allow the action and execution attempts by P (i.e. by any subject processes 104 executing the code in P) to proceed without blocking. The intent is to consider such actions and executions as normal activities of P which ought to be considered authorized in the future. At the end of the learning period one or more authorization policies are generated for program P, authorizing the actions and executions observed during the learning period. The authorizations may be subsequently tweaked, narrowed or broadened, in accordance with relevant business or operational concerns. Note that during the learning period P should preferably be configured to run in a manner that excludes unintended or unsafe or unwanted behaviors (as much as possible and practical), since otherwise the generated authorization policy will authorize such unwanted behavior. For example, P should preferably not be allowed to run scripts or macros of unknown authorship or to be operated or accessed by untrusted parties.


The disclosed program-based authorization techniques generalize to any other objects and actions which are accessible to running processes. Examples of such other objects include: synchronization objects such as semaphores and locks; inter-process communication (IPC) objects such as shared memory segments; communication objects such as network sockets; local communication abstractions such as pipes; file access objects such as symbolic links (on a Unix-flavored OS) and shortcuts (on a Windows™ OS); running processes; etc. Actions applicable to such objects depend on the specific abstractions, implementations and semantics of the systems managing the objects, with examples including: killing, suspending, unsuspending or sending signals to processes; acquiring or releasing locks; reading from or writing to shared memory segments; opening, reading from, writing to, or closing network sockets or pipes; etc. The adaptation of the program-based authorization steps disclosed herein to such objects and actions (such as interception of action attempts, determination of object attributes, etc.) should be obvious to one of ordinary skill in the art.


Foregoing described embodiments of the invention are provided as illustrations and descriptions. They are not intended to limit the invention to precise form described. In particular, it is contemplated that functional implementation of invention described herein may be implemented equivalently in hardware, software, firmware, and/or other available functional components or building blocks, and that networks may be wired, wireless, or a combination of wired and wireless. Other variations and embodiments are possible in light of above teachings, and it is thus intended that the scope of invention not be limited by this Detailed Description, but rather by Claims following.

Claims
  • 1. A method, comprising: intercepting a file system action attempt, which is associated with an action by a process relating to a file in a computer system;determining a program file that attempts the file system action, wherein the determining comprises: identifying a process context of the process; andassociating the process context with the program file, the associating comprising: placing hooks in a process creation code path and a process termination code path;creating an entry in a data structure when the process starts executing a code represented by the program file, wherein the entry is deleted when the process stops executing the code, wherein the entry includes associations between the process context and a file handle of the program file; anddetermining the program file associated with the process context from the entry in the data structure;allowing the action to proceed if it is authorized by an authorization policy; andblocking the action when it is not authorized by the authorization policy and when the computer system is operating in a first mode, wherein the computer system includes a second mode that is configured to allow the action when it is not authorized according to the authorization policy.
  • 2. A method as recited in claim 1, wherein a first log is generated for the file system action attempt.
  • 3. A method as recited in claim 1, wherein a second log is subsequently generated to identify the unauthorized action as having occurred when the computer system is operating in the second mode.
  • 4. A method as recited in claim 1, wherein the authorization policy includes data indicative of a set of differences between one or more parts of content of an object sought to be altered by the action, and wherein the differences identify changes between the content before and after the action.
  • 5. A method as recited in claim 1, wherein the determining further includes determining an attribute associated with the program file.
  • 6. A method as recited in claim 1, wherein the action indicates a read operation on the file.
  • 7. A method as recited in claim 1, wherein the action indicates a write, append, or truncate operation on the file.
  • 8. A method as recited in claim 1, wherein the action indicates a delete, move, or rename operation on the file.
  • 9. Logic encoded in non-transitory tangible media that includes code for execution and when executed by a processor is operable to perform operations comprising: intercepting a file system action attempt, which is associated with an action by a process relating to a file in a computer system;determining a program file that attempts the file system action, wherein the determining comprises: identifying a process context of the process; andassociating the process context with the program file, the associating comprising: placing hooks in a process creation code path and a process termination code path;creating an entry in a data structure when the process starts executing a code represented by the program file, wherein the entry is deleted when the process stops executing the code, wherein the entry includes associations between the process context and a file handle of the program file; anddetermining the program file associated with the process context from the entry in the data structure;allowing the action to proceed if it is authorized by an authorization policy; andblocking the action when it is not authorized by the authorization policy and when the computer system is operating in a first mode, wherein the computer system includes a second mode that is configured to allow the action when it is not authorized according to the authorization policy.
  • 10. The logic as recited in claim 9, wherein a first log is generated for the file system action attempt, and wherein a second log is subsequently generated to identify the unauthorized action as having occurred when the computer system is operating in the second mode.
  • 11. The logic as recited in claim 9, wherein the authorization policy includes data indicative of a set of differences between one or more parts of content of an object sought to be altered by the action, and wherein the differences identify changes between the content before and after the action.
  • 12. The logic as recited in claim 9, wherein the action indicates a read operation on the file.
  • 13. The logic as recited in claim 9, wherein the action indicates a write, append, or truncate operation on the file.
  • 14. The logic as recited in claim 9, wherein the action indicates a delete, move, or rename operation on the file.
  • 15. A computer system, comprising: a processor; anda memory, wherein the computer system is configured for: intercepting a file system action attempt, which is associated with an action by a process relating to a file in a computer system;determining a program file that attempts the file system action, wherein the determining comprises: identifying a process context of the process; andassociating the process context with the program file, the associating comprising: placing hooks in a process creation code path and a process termination code path;creating an entry in a data structure when the process starts executing a code represented by the program file, wherein the entry is deleted when the process stops executing the code, wherein the entry includes associations between the process context and a file handle of the program file; anddetermining the program file associated with the process context from the entry in the data structure;allowing the action to proceed if it is authorized by an authorization policy; andblocking the action when it is not authorized by the authorization policy and when the computer system is operating in a first mode, wherein the computer system includes a second mode that is configured to allow the action when it is not authorized according to the authorization policy.
  • 16. The system as recited in claim 15, wherein a first log is generated for the file system action attempt, and wherein a second log is subsequently generated to identify the unauthorized action as having occurred when the computer system is operating in the second mode.
  • 17. The system as recited in claim 15, wherein the authorization policy includes data indicative of a set of differences between one or more parts of content of an object sought to be altered by the action, and wherein the differences identify changes between the content before and after the action.
  • 18. The system as recited in claim 15, wherein the action indicates a read operation on the file.
  • 19. The system as recited in claim 15, wherein the action indicates a write, append, or truncate operation on the file.
  • 20. The system as recited in claim 15, wherein the action indicates a delete, move, or rename operation on the file.
CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation (and claims the benefit of priority under 35 U.S.C. §120) of U.S. application Ser. No. 11/400,085, filed Apr. 7, 2006 now U.S. Pat. No. 7,870,387, entitled “PROGRAM-BASED AUTHORIZATION,” Inventor(s) Rishi Bhargava, et al. The disclosure of the prior application is considered part of (and is incorporated by reference in) the disclosure of this application. This application is related to the following, all of which are incorporated herein by reference in their entirety: co-pending U.S. patent application Ser. No. 10/651,591, entitled “Method And System For Containment of Networked Application Client Software By Explicit Human Input” and filed on Aug. 29, 2003; co-pending U.S. patent application Ser. No. 10/651,588, entitled “Damage Containment By Translation” and filed on Aug. 29, 2003, issued as U.S. Pat. No. 7,464,408 on Dec. 9, 2008; co-pending U.S. patent application Ser. No. 10/806,578, entitled “Containment Of Network Communication” and filed on Mar. 22, 2004, issued as U.S. Pat. No. 7,783,735 on Aug. 24, 2010; co-pending U.S. patent application Ser. No. 10/739,230, entitled “Method And System For Containment Of Usage Of Language Interfaces” and filed on Dec. 17, 2003, issued as U.S. Pat. No. 7,840,968 on Nov. 23, 2010; co-pending U.S. patent application Ser. No. 10/935,772, entitled “Solidifying the Executable Software Set of a Computer” and filed on Sep. 7, 2004, issued as U.S. Pat. No. 7,873,955 on Jan. 18, 2011; co-pending U.S. patent application Ser. No. 11/060,683, entitled “Distribution and Installation of Solidified Software on a Computer” and filed on Feb. 16, 2005; co-pending U.S. patent application Ser. No. 11/122,872, entitled “Piracy Prevention Using Unique Module Translation” and filed on May 4, 2005, issued as U.S. Pat. No. 7,603,552 on Oct. 13, 2009; co-pending U.S. patent application Ser. No. 11/182,320, entitled “Classification of Software on Networked Systems” and filed on Jul. 14, 2005, issued as U.S. Pat. No. 7,856,661 on Dec. 21, 2010; co-pending U.S. patent application Ser. No. 11/346,741, entitled “Enforcing Alignment of Approved Changes and Deployed Changes in the Software Change Life-Cycle” by Rahul Roy-Chowdhury, E. John Sebes and Jay Vaishnav, filed on Feb. 2, 2006, issued as U.S. Pat. No. 7,757,269 on Jul. 13, 2010; and co-pending U.S. patent application Ser. No. 11/277,596, entitled “Execution Environment File Inventory” by Rishi Bhargava and E. John Sebes, filed on Mar. 27, 2006, issued as U.S. Pat. No. 7,895,573 on Feb. 22, 2011.

US Referenced Citations (157)
Number Name Date Kind
4688169 Joshi Aug 1987 A
4982430 Frezza et al. Jan 1991 A
5155847 Kirouac et al. Oct 1992 A
5222134 Waite et al. Jun 1993 A
5390314 Swanson Feb 1995 A
5521849 Adelson et al. May 1996 A
5560008 Johnson et al. Sep 1996 A
5699513 Feigen et al. Dec 1997 A
5778349 Okonogi Jul 1998 A
5787427 Benantar et al. Jul 1998 A
5842017 Hookway et al. Nov 1998 A
5907709 Cantey et al. May 1999 A
5974149 Leppek Oct 1999 A
5987611 Freund Nov 1999 A
5991881 Conklin et al. Nov 1999 A
6141698 Krishnan et al. Oct 2000 A
6192401 Modiri et al. Feb 2001 B1
6192475 Wallace Feb 2001 B1
6256773 Bowman-Amuah Jul 2001 B1
6275938 Bond et al. Aug 2001 B1
6338149 Ciccone, Jr. et al. Jan 2002 B1
6356957 Sanchez, II et al. Mar 2002 B2
6393465 Leeds May 2002 B2
6442686 McArdle et al. Aug 2002 B1
6449040 Fujita Sep 2002 B1
6453468 D'Souza Sep 2002 B1
6587877 Douglis et al. Jul 2003 B1
6662219 Nishanov et al. Dec 2003 B1
6748534 Gryaznov et al. Jun 2004 B1
6769008 Kumar et al. Jul 2004 B1
6769115 Oldman Jul 2004 B1
6795966 Lim et al. Sep 2004 B1
6832227 Seki et al. Dec 2004 B2
6834301 Hanchett Dec 2004 B1
6847993 Novaes et al. Jan 2005 B1
6907600 Neiger et al. Jun 2005 B2
6918110 Hundt et al. Jul 2005 B2
6930985 Rathi et al. Aug 2005 B1
6934755 Saulpaugh et al. Aug 2005 B1
6988101 Ham et al. Jan 2006 B2
6988124 Douceur et al. Jan 2006 B2
7010796 Strom et al. Mar 2006 B1
7024548 O'Toole, Jr. Apr 2006 B1
7039949 Cartmell et al. May 2006 B2
7065767 Kambhammettu et al. Jun 2006 B2
7069330 McArdle et al. Jun 2006 B1
7082456 Mani-Meitav et al. Jul 2006 B2
7093239 van der Made Aug 2006 B1
7124409 Davis et al. Oct 2006 B2
7139916 Billingsley et al. Nov 2006 B2
7152148 Williams et al. Dec 2006 B2
7159036 Hinchliffe et al. Jan 2007 B2
7177267 Oliver et al. Feb 2007 B2
7203864 Goin et al. Apr 2007 B2
7251655 Kaler et al. Jul 2007 B2
7290266 Gladstone et al. Oct 2007 B2
7302558 Campbell et al. Nov 2007 B2
7330849 Gerasoulis et al. Feb 2008 B2
7346781 Cowie et al. Mar 2008 B2
7350204 Lambert et al. Mar 2008 B2
7353501 Tang et al. Apr 2008 B2
7363022 Whelan et al. Apr 2008 B2
7370360 van der Made May 2008 B2
7406517 Hunt et al. Jul 2008 B2
7441265 Staamann et al. Oct 2008 B2
7464408 Shah et al. Dec 2008 B1
7506170 Finnegan Mar 2009 B2
7546333 Alon et al. Jun 2009 B2
7603552 Sebes et al. Oct 2009 B1
7607170 Chesla Oct 2009 B2
7657599 Smith Feb 2010 B2
7698744 Fanton et al. Apr 2010 B2
7757269 Roy-Chowdhury et al. Jul 2010 B1
7783735 Sebes et al. Aug 2010 B1
7836504 Ray et al. Nov 2010 B2
7840968 Sharma et al. Nov 2010 B1
7856661 Sebes et al. Dec 2010 B1
7908653 Brickell et al. Mar 2011 B2
7937455 Saha et al. May 2011 B2
8015563 Araujo et al. Sep 2011 B2
20020069367 Tindal et al. Jun 2002 A1
20020083175 Afek et al. Jun 2002 A1
20020099671 Mastin et al. Jul 2002 A1
20030014667 Kolichtchak Jan 2003 A1
20030023736 Abkemeier Jan 2003 A1
20030033510 Dice Feb 2003 A1
20030073894 Chiang et al. Apr 2003 A1
20030074552 Olkin et al. Apr 2003 A1
20030120601 Ouye et al. Jun 2003 A1
20030120811 Hanson et al. Jun 2003 A1
20030120935 Teal et al. Jun 2003 A1
20030145232 Poletto et al. Jul 2003 A1
20030167399 Audebert et al. Sep 2003 A1
20040003258 Billingsley et al. Jan 2004 A1
20040015554 Wilson Jan 2004 A1
20040051736 Daniell Mar 2004 A1
20040054928 Hall Mar 2004 A1
20040143749 Tajali et al. Jul 2004 A1
20040167906 Smith et al. Aug 2004 A1
20040230963 Rothman et al. Nov 2004 A1
20040243678 Smith et al. Dec 2004 A1
20040255161 Cavanaugh Dec 2004 A1
20050018651 Yan et al. Jan 2005 A1
20050108562 Khazan et al. May 2005 A1
20050114672 Duncan et al. May 2005 A1
20050228990 Kato et al. Oct 2005 A1
20050235360 Pearson Oct 2005 A1
20050257207 Blumfield et al. Nov 2005 A1
20050260996 Groenendaal Nov 2005 A1
20050262558 Usov Nov 2005 A1
20050273858 Zadok et al. Dec 2005 A1
20050283823 Okajo et al. Dec 2005 A1
20060004875 Baron et al. Jan 2006 A1
20060015501 Sanamrad et al. Jan 2006 A1
20060037016 Saha et al. Feb 2006 A1
20060080656 Cain et al. Apr 2006 A1
20060085785 Garrett Apr 2006 A1
20060101277 Meenan et al. May 2006 A1
20060133223 Nakamura et al. Jun 2006 A1
20060136910 Brickell et al. Jun 2006 A1
20060136911 Robinson et al. Jun 2006 A1
20060195906 Jin et al. Aug 2006 A1
20060236398 Trakic et al. Oct 2006 A1
20070011746 Malpani et al. Jan 2007 A1
20070039049 Kupferman et al. Feb 2007 A1
20070050764 Traut Mar 2007 A1
20070074199 Schoenberg Mar 2007 A1
20070083522 Nord et al. Apr 2007 A1
20070101435 Konanka et al. May 2007 A1
20070136579 Levy et al. Jun 2007 A1
20070169079 Keller et al. Jul 2007 A1
20070192329 Croft et al. Aug 2007 A1
20070253430 Minami et al. Nov 2007 A1
20070271561 Winner et al. Nov 2007 A1
20080005737 Saha et al. Jan 2008 A1
20080005798 Ross Jan 2008 A1
20080052468 Speirs et al. Feb 2008 A1
20080082977 Araujo et al. Apr 2008 A1
20080120499 Zimmer et al. May 2008 A1
20080163207 Reumann et al. Jul 2008 A1
20080163210 Bowman et al. Jul 2008 A1
20080184373 Traut et al. Jul 2008 A1
20080294703 Craft et al. Nov 2008 A1
20080301770 Kinder Dec 2008 A1
20090038017 Durham et al. Feb 2009 A1
20090043993 Ford et al. Feb 2009 A1
20090144300 Chatley et al. Jun 2009 A1
20090150639 Ohata Jun 2009 A1
20090249438 Litvin et al. Oct 2009 A1
20090320140 Sebes et al. Dec 2009 A1
20100100970 Chowdhury et al. Apr 2010 A1
20100114825 Siddegowda May 2010 A1
20100281133 Brendel Nov 2010 A1
20100293225 Sebes et al. Nov 2010 A1
20110035423 Kobayashi et al. Feb 2011 A1
20110093842 Sebes Apr 2011 A1
20110138461 Bhargava et al. Jun 2011 A1
Foreign Referenced Citations (10)
Number Date Country
1 482 394 Dec 2004 EP
2 037 657 Mar 2009 EP
WO 9844404 Oct 1998 WO
WO 0184285 Nov 2001 WO
WO 2006012197 Feb 2006 WO
WO 2006124832 Nov 2006 WO
WO 2008054997 May 2008 WO
WO 2011059877 May 2011 WO
WO 2012015485 Feb 2012 WO
WO 201215489 Feb 2012 WO
Related Publications (1)
Number Date Country
20110093950 A1 Apr 2011 US
Continuations (1)
Number Date Country
Parent 11400085 Apr 2006 US
Child 12975745 US