Specifying and Verifying Information Flow Control in SELinux Configurations

被引:0
|
作者
Ceragioli, Lorenzo [1 ]
Galletta, Letterio [1 ]
Degano, Pierpaolo [1 ,2 ]
Basin, David [3 ]
机构
[1] IMT Sch Adv Studies Lucca, Lucca, Italy
[2] Univ Pisa, Pisa, Italy
[3] Swiss Fed Inst Technol, Zurich, Switzerland
关键词
Access control; information flow control; MODEL;
D O I
10.1145/3690636
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security Enhanced Linux (SELinux) is a security architecture for Linux implementing Mandatory Access Control. It has been used in numerous security-critical contexts ranging from servers to mobile devices. However, its application is challenging as SELinux security policies are difficult to write, understand, and maintain. Recently, the intermediate language CIL was introduced to foster the development of high-level policy languages and to write structured configurations. Despite CIL's high level features, CIL configurations are hard to understand as different constructs interact in non-trivial ways. Moreover, there is no mechanism to ensure that a given configuration obeys desired information flow policies. To remedy this, we enrich CIL with a formal semantics, and we propose IFCIL, a backward compatible extension of CIL for specifying fine-grained information flow requirements. Using IFCIL, administrators can express confidentiality, integrity, and noninterference properties. We also provide a tool to statically verify these requirements and we experimentally assess it on ten real-world policies.
引用
收藏
页数:35
相关论文
共 50 条
  • [1] Specifying and Verifying Advanced Control Features
    Leavens, Gary T.
    Naumann, David
    Rajan, Hridesh
    Aotani, Tomoyuki
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: DISCUSSION, DISSEMINATION, APPLICATIONS, ISOLA 2016, PT II, 2016, 9953 : 80 - 96
  • [2] Verifying Information Flow Control over Unbounded Processes
    Harris, William R.
    Kidd, Nicholas A.
    Chaki, Sagar
    Jha, Somesh
    Reps, Thomas
    FM 2009: FORMAL METHODS, PROCEEDINGS, 2009, 5850 : 773 - +
  • [3] IFCIL: An Information Flow Configuration Language for SELinux
    Ceragioli, Lorenzo
    Galletta, Letterio
    Degano, Pierpaolo
    Basin, David
    2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022), 2022, : 243 - 259
  • [4] Specifying and verifying usage control models and policies in TLA+
    Grompanopoulos, Christos
    Gouglidis, Antonios
    Mavridou, Anastasia
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (05) : 685 - 700
  • [5] Specifying and verifying web transactions
    Li, Jing
    Zhu, Huibiao
    He, Jifeng
    FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2008, 2008, 5048 : 149 - 168
  • [6] Specifying and verifying programs in Spec
    Rustan, K.
    Leino, M.
    PERSPECTIVES OF SYSTEMS INFORMATICS, 2007, 4378 : 20 - 20
  • [7] Specifying and Verifying Persistent Libraries
    Stefanesco, Leo
    Raad, Azalea
    Vafeiadis, Viktor
    PROGRAMMING LANGUAGES AND SYSTEMS, PT II, ESOP 2024, 2024, 14577 : 185 - 211
  • [8] Specifying and verifying parametric processes
    Pawlowski, W
    Paczkowski, P
    Sokolowski, S
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 1996, 1996, 1113 : 469 - 481
  • [9] Specifying information-flow controls
    Chivers, H
    Jacob, J
    25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 114 - 120
  • [10] Verifying a secure information flow analyzer
    Naumann, DA
    THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 2005, 3603 : 211 - 226