A Logical Specification and Analysis for SELinux MLS Policy

被引:32
|
作者
Hicks, Boniface [1 ]
Rueda, Sandra [2 ]
St Clair, Luke [2 ]
Jaeger, Trent [2 ]
McDaniel, Patrick [2 ]
机构
[1] St Vincent Coll, Latrobe, PA 15650 USA
[2] Penn State Univ, Syst & Internet Infrastruct Secur Lab, University Pk, PA 16802 USA
关键词
Security; Languages; Verification; SELinux; multilevel security; policy compliance; policy analysis;
D O I
10.1145/1805874.1805982
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The SELinux mandatory access control (MAC) policy has recently added a multilevel security (MLS) model which is able to express a fine granularity of control over a subject's access rights. The problem is that the richness of the SELinux MLS model makes it impractical to manually evaluate that a given policy meets certain specific properties. To address this issue, we have modeled the SELinux MLS model, using a logical specification and implemented that specification in the Prolog language. Furthermore, we have developed some analyses for testing information flow properties of a given policy as well as an algorithm to determine whether one policy is compliant with another. We have implemented these analyses in Prolog and compiled our implementation into a tool for SELinux MLS policy analysis, called PALMS. Using PALMS, we verified some important properties of the SELinux MLS reference policy, namely that it satisfies the simple security condition and star-property defined by Bell and LaPadula. We also evaluated whether the policy associated to a given application is compliant with the policy of the SELinux system in which it would be deployed.
引用
收藏
页数:31
相关论文
共 50 条
  • [1] A Logical Specification and Analysis for SELinux MLS Policy
    Hicks, Boniface
    Rueda, Sandra
    Clair, Luke St.
    Jaeger, Trent
    McDaniel, Patrick
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 91 - 100
  • [2] Algorithms for Automatic Analysis of SELinux Security Policy
    Zhai, Gaoshou
    Wu, Tong
    Bai, Jing
    Guo, Tao
    Li, Tianyou
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 71 - 83
  • [3] Automatic Analysis Method for SELinux Security Policy
    Zhai, Gaoshou
    Wu, Tong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 229 - 234
  • [4] SEFlowViz: A Visualization Tool for SELinux Policy Analysis
    Singh, Karan Kumar
    Radhika, B. S.
    Shyamasundar, R. K.
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 439 - 444
  • [5] Visualization Based Policy Analysis: Case Study in SELinux
    Xu, Wenjuan
    Shehab, Mohamed
    Ahn, Gail-Joon
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 165 - 174
  • [6] Toward a Real MLS/SELinux System for End Users: An Empirical Study
    Blanc, Mathieu
    Clemente, Patrice
    Kissi, Steve-William
    PROCEEDINGS OF THE 2009 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2009, : 209 - +
  • [7] Systematic policy analysis for high-assurance services in SELinux
    Ahn, Gail-Joon
    Xu, Wenjuan
    Zhang, Xinwen
    2008 IEEE WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2008, : 3 - +
  • [8] Visualization-based policy analysis for SELinux: framework and user study
    Wenjuan Xu
    Mohamed Shehab
    Gail-Joon Ahn
    International Journal of Information Security, 2013, 12 : 155 - 171
  • [9] A System for Distributed SELinux Policy Management
    Chavez Lugo, Pedro
    Garcia Garcia, Juan Manuel
    Flores, Juan J.
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 254 - 261
  • [10] LOGICAL SENSOR SPECIFICATION
    HANSEN, C
    HENDERSON, TC
    SHILCRAT, E
    FAI, WS
    PROCEEDINGS OF THE SOCIETY OF PHOTO-OPTICAL INSTRUMENTATION ENGINEERS, 1984, 449 : 578 - 583