Specifying and Verifying Information Flow Control in SELinux Configurations

被引:0
|
作者
Ceragioli, Lorenzo [1 ]
Galletta, Letterio [1 ]
Degano, Pierpaolo [1 ,2 ]
Basin, David [3 ]
机构
[1] IMT Sch Adv Studies Lucca, Lucca, Italy
[2] Univ Pisa, Pisa, Italy
[3] Swiss Fed Inst Technol, Zurich, Switzerland
关键词
Access control; information flow control; MODEL;
D O I
10.1145/3690636
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security Enhanced Linux (SELinux) is a security architecture for Linux implementing Mandatory Access Control. It has been used in numerous security-critical contexts ranging from servers to mobile devices. However, its application is challenging as SELinux security policies are difficult to write, understand, and maintain. Recently, the intermediate language CIL was introduced to foster the development of high-level policy languages and to write structured configurations. Despite CIL's high level features, CIL configurations are hard to understand as different constructs interact in non-trivial ways. Moreover, there is no mechanism to ensure that a given configuration obeys desired information flow policies. To remedy this, we enrich CIL with a formal semantics, and we propose IFCIL, a backward compatible extension of CIL for specifying fine-grained information flow requirements. Using IFCIL, administrators can express confidentiality, integrity, and noninterference properties. We also provide a tool to statically verify these requirements and we experimentally assess it on ten real-world policies.
引用
收藏
页数:35
相关论文
共 50 条
  • [21] Verifying Secure Information Flow in Federated Clouds
    Zeng, Wen
    Koutny, Maciej
    Watson, Paul
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 78 - 85
  • [22] Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux
    Georget, Laurent
    Jaume, Mathieu
    Piolle, Guillaume
    Tronel, Frederic
    Tong, Valerie Viet Triem
    2017 IEEE/ACM 5TH INTERNATIONAL FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING (FORMALISE) PROCEEDINGS, 2017, : 10 - 16
  • [23] Specifying and verifying PLC systems with TLA+
    Zhang, Hehua
    Merz, Stephan
    Gu, Ming
    THIRD INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, PROCEEDINGS, 2009, : 293 - +
  • [24] Specifying and Verifying Concurrent Algorithms with Histories and Subjectivity
    Sergey, Ilya
    Nanevski, Aleksandar
    Banerjee, Anindya
    PROGRAMMING LANGUAGES AND SYSTEMS, 2015, 9032 : 333 - 358
  • [25] Specifying and Verifying the Correctness of Dynamic Software Updates
    Hayden, Christopher M.
    Magill, Stephen
    Hicks, Michael
    Foster, Nate
    Foster, Jeffrey S.
    VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 278 - +
  • [26] Formal methods for specifying, validating, and verifying requirements
    Heitmeyer, Constance L.
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2007, 13 (05) : 607 - 618
  • [27] A framework for specifying and verifying the behaviour of open systems
    Bracciali, A
    Brogi, A
    Turini, F
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2005, 63 (02): : 215 - 240
  • [28] Towards Formally Specifying and Verifying Transactional Memory
    Doherty, Simon
    Groves, Lindsay
    Luchangco, Victor
    Moir, Mark
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 259 : 245 - 261
  • [29] Specifying and Verifying Business Processes Using PPML
    Regis, German
    Aguirre, Nazareno
    Maibaum, Tom
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 5885 : 737 - +
  • [30] Modelling, specifying, and verifying message passing systems
    Bollig, B
    Leucker, M
    EIGHTH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2001, : 240 - 247