A Logical Specification and Analysis for SELinux MLS Policy

被引:32
|
作者
Hicks, Boniface [1 ]
Rueda, Sandra [2 ]
St Clair, Luke [2 ]
Jaeger, Trent [2 ]
McDaniel, Patrick [2 ]
机构
[1] St Vincent Coll, Latrobe, PA 15650 USA
[2] Penn State Univ, Syst & Internet Infrastruct Secur Lab, University Pk, PA 16802 USA
关键词
Security; Languages; Verification; SELinux; multilevel security; policy compliance; policy analysis;
D O I
10.1145/1805874.1805982
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The SELinux mandatory access control (MAC) policy has recently added a multilevel security (MLS) model which is able to express a fine granularity of control over a subject's access rights. The problem is that the richness of the SELinux MLS model makes it impractical to manually evaluate that a given policy meets certain specific properties. To address this issue, we have modeled the SELinux MLS model, using a logical specification and implemented that specification in the Prolog language. Furthermore, we have developed some analyses for testing information flow properties of a given policy as well as an algorithm to determine whether one policy is compliant with another. We have implemented these analyses in Prolog and compiled our implementation into a tool for SELinux MLS policy analysis, called PALMS. Using PALMS, we verified some important properties of the SELinux MLS reference policy, namely that it satisfies the simple security condition and star-property defined by Bell and LaPadula. We also evaluated whether the policy associated to a given application is compliant with the policy of the SELinux system in which it would be deployed.
引用
收藏
页数:31
相关论文
共 50 条
  • [41] Automated Synthesis of Recursive Programs from a ∀∃ Logical Specification
    Jacques Chazarain
    Serge Muller
    Journal of Automated Reasoning, 1998, 21 : 233 - 275
  • [42] Towards logical specification of adversarial examples in machine learning
    Zeroual, Marwa
    Hamid, Brahim
    Adedjoumaa, Morayo
    Jaskolka, Jason
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1575 - 1580
  • [43] A Logical Approach to Quality of Service Specification in Video Databases
    Elisa Bertino
    Ahmed K. Elmagarmid
    Mohand-Saïd Hacid
    Multimedia Tools and Applications, 2004, 23 : 75 - 101
  • [44] KNOWLEDGE-BASED APPROACH TO STRUCTURAL INTEGRITY VERIFICATION IN REQUIREMENTS ANALYSIS AND LOGICAL SYSTEM SPECIFICATION
    AGARWAL, R
    SAKTHIVEL, S
    TANNIRU, M
    KNOWLEDGE-BASED SYSTEMS, 1993, 6 (03) : 165 - 173
  • [45] Challenges to Performance Management: logical analysis of an Evaluation Policy in Health Surveillance
    Albuquerque Bezerra, Luciana Caroline
    Felisberto, Eronildo
    Barbosa da Silva Costa, Juliana Martins
    de Almeida Alves, Cinthia Kalyne
    Hartz, Zulmira
    CIENCIA & SAUDE COLETIVA, 2020, 25 (12): : 5017 - 5028
  • [46] A performance analysis of ARM virtual machines secured using SELinux
    Paolino, Michele
    Hamayun, Mian M.
    Raho, Daniel
    Communications in Computer and Information Science, 2014, 470 : 28 - 36
  • [47] SYSTEM V/MLS LABELING AND MANDATORY POLICY ALTERNATIVES
    FLINK, CW
    WEISS, JD
    AT&T TECHNICAL JOURNAL, 1988, 67 (03): : 53 - 64
  • [48] PROPERTIES OF THE MLS SYSTEM - A REVISED FORMULATION OF MLS GENETICS AND AN ANALYSIS OF T-CELL RECOGNITION OF MLS DETERMINANTS
    ABE, R
    HODES, RJ
    IMMUNOLOGICAL REVIEWS, 1989, 107 : 5 - 28
  • [49] Logical analysis and logical construction
    Linsky, Bernard
    ANALYTIC TURN: ANALYSIS IN EARLY ANALYTIC PHILOSOPHY AND PHENOMENOLOGY, 2007, 30 : 107 - 122
  • [50] Security and management policy specification
    Sloman, M
    Lupu, E
    IEEE NETWORK, 2002, 16 (02): : 10 - 19