Mandatory Access Control Method for Windows Embedded OS Security

被引:5
作者
Cho, Chaeho [1 ]
Seong, Yeonsang [2 ]
Won, Yoojae [1 ]
机构
[1] Chungnam Natl Univ, Convergence Secur Res Ctr, Dept Comp Engn, Daejeon 34134, South Korea
[2] Hauri Inc, Windows Driver Dev Team, Daejeon 34134, South Korea
关键词
Windows Embedded OS; file system filter driver; access control; discretionary access control; mandatory access control;
D O I
10.3390/electronics10202478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Windows Embedded operating system (OS) adopts a discretionary access control (DAC)-based policy, but underlying vulnerabilities exist because of external hacker attacks and other factors. In this study, we propose a system that improves the security of the Windows Embedded OS by applying a mandatory access control (MAC) policy in which the access rights of objects, such as files and folders, and subjects' privileges, such as processes, are compared. We conducted access control tests to verify whether the proposed system could avoid the vulnerabilities of DAC-based systems. Our results indicate that the existing DAC-based security systems could be neutralized if a principal's security policy is removed. However, in the proposed MAC-based Windows Embedded OS, even if the clearance and category values of a subject's files are given the highest rating, all accesses are automatically denied. Therefore, the execution of all files that were not previously registered on the whitelist was denied, proving that security was improved relative to DAC-based systems
引用
收藏
页数:12
相关论文
共 11 条
[1]  
Ausanka-Crues R., METHODS ACCESS CONTR
[2]  
Bai Q., 2011, P 2011 CROSS STRAIT, P830
[3]  
Bell D. E., 1973, SECURE COMPUTER SYST, P74
[4]   Data augmentation based malware detection using convolutional neural networks [J].
Catak, Ferhat Ozgur ;
Ahmed, Javed ;
Sahinbas, Kevser ;
Khand, Zahid Hussain .
PEERJ COMPUTER SCIENCE, 2021,
[5]   Distributed denial of service attack detection using autoencoder and deep neural networks [J].
Catak, Ferhat Ozgur ;
Mustacoglu, Ahmet Fatih .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (03) :3969-3979
[6]  
Meshram B.B., 2018, INT J CYBER SECURITY, V7, P100
[7]  
MSDN, OV WIND I O MOD
[8]  
MSDN, FIL SYST FILT DRIV D
[9]  
Pittman RD, 2010, HANDBOOK OF DIGITAL FORENSICS AND INVESTIGATION, P209, DOI 10.1016/B978-0-12-374267-4.00005-7
[10]  
Red Hat Enterprise, LIN 7 SELINUX US ADM