Algorithms for Automatic Analysis of SELinux Security Policy

被引:0
|
作者
Zhai, Gaoshou [1 ]
Wu, Tong [1 ]
Bai, Jing [1 ]
Guo, Tao [1 ]
Li, Tianyou [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2013年 / 7卷 / 01期
关键词
Validity analysis; Integrity analysis; Security policy; SELinux; Access control; Secure operating systems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Configuration of security policies is an important but complicated work for running of secure operating systems. On the one hand, completely correct and consistent configuration is the necessary prerequisite for secure and credible system operation. On the other hand, errors and bugs are incidental anywhere within configuration at all time. Therefore, algorithms for automatic analysis of SELinux security policy are studied in this paper. Based on an improved analysis model similar to SELAC model, both algorithms for validity analysis and integrity analysis are designed. So that any access relations among subjects and objects with specified security contexts can be identified correctly by using the former algorithm. And all rules that could potentially influence integrity of subjects and objects can be detected based on the latter algorithm. Furthermore, a corresponding prototype is implemented in C Language and a security policy configuration as to an application system called Student-Teacher system is designed based on the architecture of reference policy in order to test the prototype. Results are satisfactory and it shows that related algorithms are potential to be used to build an appropriate tool to assist people to perform configuration work and to complete correct and reliable configuration.
引用
收藏
页码:71 / 83
页数:13
相关论文
共 50 条
  • [31] Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting
    Ziadia, Marwa
    Mejri, Mohamed
    Fattahi, Jaouhar
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2021, 337 : 85 - 98
  • [32] Automatic Verification of Firewall Configurations with respect to Security Policy Requirements
    Matsumoto, Soutaro
    Bouhoula, Adel
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 640 - 647
  • [33] Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements
    Matsumoto, Soutaro
    Bouhoula, Adel
    PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS CISIS 2008, 2009, 53 : 123 - +
  • [34] Formal Modeling of Multi-Level Security and Integrity Control Implemented with SELinux
    Kuliamin, Victor V.
    Khoroshilov, Alexey V.
    Medvedev, Denis L.
    2019 ACTUAL PROBLEMS OF SYSTEMS AND SOFTWARE ENGINEERING (APSSE 2019), 2019, : 131 - 136
  • [36] Automatic Data Model Mapper for Security Policy Translation in Interface to Network Security Functions Framework
    Lingga, Patrick
    Kim, Jeonghyeon
    Bartolome, Jorge David Iranzo
    Jeong, Jaehoon
    12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 882 - 887
  • [37] ANALYSIS OF CROATIAN SECURITY POLICY GOALS
    Zguric, Borna
    Petek, Ana
    CROATIAN AND COMPARATIVE PUBLIC ADMINISTRATION, 2022, 22 (04): : 735 - 764
  • [38] Similarity Analysis on Heterogeneous Security Policy
    Chen, Chen
    Sun, Yuqing
    Pan, Peng
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 682 - 687
  • [39] Image analysis of the future using automatic algorithms
    Weichert, J.
    Rody, A.
    Gembicki, M.
    GYNAKOLOGE, 2020, 53 (03): : 166 - 175
  • [40] PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS FOR CLOUD SECURITY
    Vennela, G. Sai
    Varun, N. Venkata
    Neelima, N.
    Priya, L. Sai
    Yeswanth, J.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 273 - 279