Algorithms for Automatic Analysis of SELinux Security Policy

被引:0
|
作者
Zhai, Gaoshou [1 ]
Wu, Tong [1 ]
Bai, Jing [1 ]
Guo, Tao [1 ]
Li, Tianyou [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
关键词
Validity analysis; Integrity analysis; Security policy; SELinux; Access control; Secure operating systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Configuration of security policies is an important but complicated work for running of secure operating systems. On the one hand, completely correct and consistent configuration is the necessary prerequisite for secure and credible system operation. On the other hand, errors and bugs are incidental anywhere within configuration at all time. Therefore, algorithms for automatic analysis of SELinux security policy are studied in this paper. Based on an improved analysis model similar to SELAC model, both algorithms for validity analysis and integrity analysis are designed. So that any access relations among subjects and objects with specified security contexts can be identified correctly by using the former algorithm. And all rules that could potentially influence integrity of subjects and objects can be detected based on the latter algorithm. Furthermore, a corresponding prototype is implemented in C Language and a security policy configuration as to an application system called Student-Teacher system is designed based on the architecture of reference policy in order to test the prototype. Results are satisfactory and it shows that related algorithms are potential to be used to build an appropriate tool to assist people to perform configuration work and to complete correct and reliable configuration.
引用
收藏
页码:71 / 83
页数:13
相关论文
共 50 条
  • [1] Automatic Analysis Method for SELinux Security Policy
    Zhai, Gaoshou
    Wu, Tong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 229 - 234
  • [2] A Logical Specification and Analysis for SELinux MLS Policy
    Hicks, Boniface
    Rueda, Sandra
    St Clair, Luke
    Jaeger, Trent
    McDaniel, Patrick
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [3] A Logical Specification and Analysis for SELinux MLS Policy
    Hicks, Boniface
    Rueda, Sandra
    Clair, Luke St.
    Jaeger, Trent
    McDaniel, Patrick
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 91 - 100
  • [4] SEFlowViz: A Visualization Tool for SELinux Policy Analysis
    Singh, Karan Kumar
    Radhika, B. S.
    Shyamasundar, R. K.
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 439 - 444
  • [5] Visualization Based Policy Analysis: Case Study in SELinux
    Xu, Wenjuan
    Shehab, Mohamed
    Ahn, Gail-Joon
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 165 - 174
  • [6] FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies
    Radhika, B. S.
    Kumar, N. V. Narendra
    Shyamasundar, R. K.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 219 - 231
  • [7] Systematic policy analysis for high-assurance services in SELinux
    Ahn, Gail-Joon
    Xu, Wenjuan
    Zhang, Xinwen
    2008 IEEE WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2008, : 3 - +
  • [8] Visualization-based policy analysis for SELinux: framework and user study
    Wenjuan Xu
    Mohamed Shehab
    Gail-Joon Ahn
    International Journal of Information Security, 2013, 12 : 155 - 171
  • [9] Integrating SELinux with security-typed languages
    Hicks, Boniface
    Rueda, Sandra
    Jaeger, Trent
    McDaniel, Patrick
    PROCEEDINGS OF THE THIRD ANNUAL SECURITY ENHANCED LINUX SYMPOSIUM, 2007, : 85 - 92
  • [10] Review of Existing Analysis Tools for SELinux Security Policies: Challenges and a Proposed Solution
    Eaman, Amir
    Sistany, Bahman
    Felty, Amy
    E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 116 - 135