Algorithms for Automatic Analysis of SELinux Security Policy

被引:0
|
作者
Zhai, Gaoshou [1 ]
Wu, Tong [1 ]
Bai, Jing [1 ]
Guo, Tao [1 ]
Li, Tianyou [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
关键词
Validity analysis; Integrity analysis; Security policy; SELinux; Access control; Secure operating systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Configuration of security policies is an important but complicated work for running of secure operating systems. On the one hand, completely correct and consistent configuration is the necessary prerequisite for secure and credible system operation. On the other hand, errors and bugs are incidental anywhere within configuration at all time. Therefore, algorithms for automatic analysis of SELinux security policy are studied in this paper. Based on an improved analysis model similar to SELAC model, both algorithms for validity analysis and integrity analysis are designed. So that any access relations among subjects and objects with specified security contexts can be identified correctly by using the former algorithm. And all rules that could potentially influence integrity of subjects and objects can be detected based on the latter algorithm. Furthermore, a corresponding prototype is implemented in C Language and a security policy configuration as to an application system called Student-Teacher system is designed based on the architecture of reference policy in order to test the prototype. Results are satisfactory and it shows that related algorithms are potential to be used to build an appropriate tool to assist people to perform configuration work and to complete correct and reliable configuration.
引用
收藏
页码:71 / 83
页数:13
相关论文
共 50 条
  • [11] Automatic management of network security policy
    Burns, J
    Cheng, A
    Gurung, P
    Rajagopalan, S
    Rao, P
    Rosenbluth, D
    Surendran, AV
    Martin, DM
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 12 - 26
  • [12] A System for Distributed SELinux Policy Management
    Chavez Lugo, Pedro
    Garcia Garcia, Juan Manuel
    Flores, Juan J.
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 254 - 261
  • [13] Visualization-based policy analysis for SELinux: framework and user study
    Xu, Wenjuan
    Shehab, Mohamed
    Ahn, Gail-Joon
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (03) : 155 - 171
  • [14] Analyzing integrity protection in the SELinux example policy
    Jaeger, T
    Sailer, R
    Zhang, XL
    USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 59 - 74
  • [15] Automatic conflict analysis and resolution of traffic filtering policy for firewall and Security Gateway
    Ferraresi, Simone
    Pesic, Stefano
    Trazza, Livia
    Baiocchi, Andrea
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1304 - +
  • [16] SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization
    Ding, Yan
    Dong, Pan
    Li, Zhipeng
    Tan, Yusong
    Huang, Chenlin
    Wei, Lifeng
    Zuo, Yudan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [17] Automatic security policy enforcement in computer systems
    Adi, Kamel
    Hamza, Lamia
    Pene, Liviu
    COMPUTERS & SECURITY, 2018, 73 : 156 - 171
  • [18] Automated process classification framework using SELinux security context
    Shinde, Pravin
    Sharma, Priyanka
    Guntupalli, Srinivas
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 592 - +
  • [19] Automatic Security Analysis Using Security Metrics
    Sun, Kun
    Jajodia, Sushil
    Li, Jason
    Cheng, Yi
    Tang, Wei
    Singhal, Anoop
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1207 - 1212
  • [20] Security architecture for a systematic administration of SELinux policies in distributed environments
    Chavez Lugo, Pedro
    Flores, Juan J.
    Garcia Garcia, Juan Manuel
    PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON DATA NETWORKS, COMMUNICATIONS, COMPUTERS (DNCOCO '08): RECENT ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS, 2008, : 136 - +