Verifying information flow goals in Security-Enhanced Linux

被引:44
作者
Guttman, Joshua [1 ]
Herzog, Amy [1 ]
Ramsdell, John [1 ]
Skorupka, Clement [1 ]
机构
[1] Mitre Corp, Burlington Rd, Bedford, MA 01730 USA
关键词
Operating system security; information flow; Security-Enhanced Linux; temporal logic; model checking;
D O I
10.3233/JCS-2005-13105
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a systematic way to determine the information flow security goals achieved by systems running a secure O/S, specifically systems running Security-Enhanced Linux. A formalization of the access control mechanism of the SELinux security server, together with a labeled transition system representing an SELinux configuration, provides our framework. Information flow security goal statements expressed in linear temporal logic provide a clear description of the objectives that SELinux is intended to achieve. We use model checking to determine whether security goals hold in a given system. These formal models combined with appropriate algorithms have led to automated tools for the verification of security properties in an SELinux system. Our approach has been used in other security management contexts over the past decade, under the name rigorous automated security management.
引用
收藏
页码:115 / 134
页数:20
相关论文
共 14 条
[1]  
[Anonymous], 1985, 520028STD DOD
[2]  
Bell D.E., 1975, 75306 ESD
[3]  
Guttman J. D., 2001, LNCS, V2171, P197
[4]  
Guttman J.D., 2004, INT J INFOR IN PRESS
[5]   Filtering postures: Local enforcement for global policies [J].
Guttman, JD .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :120-129
[6]  
GUTTMAN JD, 2000, LNCS, V1895
[7]  
LEROY X, 2000, OBJECTIVE CAML SYSTE
[8]  
LOSCOCCO PA, 2001, P 2001 OTT LIN S
[9]  
Loscocco PA, 1998, P 21 NAT INF SYST SE, P303
[10]  
Loscocco Peter, 2001, P FREENIX TRACK 2001