Algorithms for Automatic Analysis of SELinux Security Policy

被引:0
|
作者
Zhai, Gaoshou [1 ]
Wu, Tong [1 ]
Bai, Jing [1 ]
Guo, Tao [1 ]
Li, Tianyou [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2013年 / 7卷 / 01期
关键词
Validity analysis; Integrity analysis; Security policy; SELinux; Access control; Secure operating systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Configuration of security policies is an important but complicated work for running of secure operating systems. On the one hand, completely correct and consistent configuration is the necessary prerequisite for secure and credible system operation. On the other hand, errors and bugs are incidental anywhere within configuration at all time. Therefore, algorithms for automatic analysis of SELinux security policy are studied in this paper. Based on an improved analysis model similar to SELAC model, both algorithms for validity analysis and integrity analysis are designed. So that any access relations among subjects and objects with specified security contexts can be identified correctly by using the former algorithm. And all rules that could potentially influence integrity of subjects and objects can be detected based on the latter algorithm. Furthermore, a corresponding prototype is implemented in C Language and a security policy configuration as to an application system called Student-Teacher system is designed based on the architecture of reference policy in order to test the prototype. Results are satisfactory and it shows that related algorithms are potential to be used to build an appropriate tool to assist people to perform configuration work and to complete correct and reliable configuration.
引用
收藏
页码:71 / 83
页数:13
相关论文
共 50 条
  • [21] ASPGen: an Automatic Security Policy Generating Framework for AppArmor
    Li, Yun
    Huang, Chenlin
    Yuan, Lu
    Ding, Yan
    Cheng, Hua
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 392 - 400
  • [22] SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation
    Wang, Hanyu
    Yu, Aimin
    Xiao, Lifang
    Li, Jin
    Cao, Xu
    PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 71 - 82
  • [23] Research in Analysis IT Security Policy and Security Solution
    Liao, Kai
    Li, Feng
    2019 2ND INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND ENGINEERING TECHNOLOGY (MEET 2019), 2019, : 180 - 184
  • [24] Security-enhanced darwin: Porting SELinux to Mac OS X
    Vance, Christopher
    Miller, Todd C.
    Dekelbaum, Robert
    Reisse, Andrew
    PROCEEDINGS OF THE THIRD ANNUAL SECURITY ENHANCED LINUX SYMPOSIUM, 2007, : 1 - 8
  • [25] V3SPA: A Visual Analysis, Exploration, and Diffing Tool for SELinux and SEAndroid Security Policies
    Gove, Robert
    2016 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2016,
  • [26] Methods and Algorithms for Automatic Text Analysis
    Yatsko, V. A.
    AUTOMATIC DOCUMENTATION AND MATHEMATICAL LINGUISTICS, 2011, 45 (05) : 224 - 231
  • [27] ANALYSIS OF AUTOMATIC CONTINGENCY SELECTION ALGORITHMS
    HALPIN, TF
    FISCHL, R
    FINK, R
    IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1984, 103 (05): : 938 - 945
  • [28] ALGORITHMS FOR EEG CHANNEL AUTOMATIC ANALYSIS
    GOLDBERG, P
    SAMSONDO.D
    BACHERICH, F
    GREMY, F
    ANNALES DE PHYSIQUE BIOLOGIQUE ET MEDICALE, 1971, 5 (01): : 33 - +
  • [29] Analysis of Security Algorithms in Cloud Computing
    Agrawal, Tanvi
    Singh, S. K.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 106 - 108
  • [30] Automatic visual analysis for transportation security
    Haering, Niels
    Shafique, Khurram
    2007 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY: ENHANCING CRITICAL INFRASTRUCTURE DEPENDABILITY, 2007, : 13 - +