Design of secure operating systems with high security levels

被引:0
|
作者
QING SiHan1
2 School of Software and Microelectronics
3 Institute of Computing Technology
机构
基金
中国国家自然科学基金;
关键词
secure operating systems with high security levels; architecture; security model; covert channel analysis;
D O I
暂无
中图分类号
TP316 [操作系统]; TP309 [安全保密];
学科分类号
081201 ; 081202 ; 0835 ; 0839 ; 1402 ;
摘要
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: se- curity architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process.
引用
收藏
页码:399 / 418
页数:20
相关论文
共 50 条
  • [31] Security Considerations for the Development of Secure Software Systems
    Ruggieri, Maxwell
    Hsu, Tzu-Tang
    Ali, Md Liakat
    [J]. 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 1187 - 1193
  • [32] DEVELOPING SECURE SOFTWARE AND SECURITY GUIDELINES FOR IT SYSTEMS
    STOCKER, E
    STOBBE, C
    HACKENBERG, G
    [J]. SIEMENS REVIEW, 1990, 57 (02): : 28 - 33
  • [33] Security metrics and synthesis of secure control systems
    Murguia, Carlos
    Shames, Iman
    Ruths, Justin
    Nesic, Dragan
    [J]. AUTOMATICA, 2020, 115
  • [34] Secure systems design technology
    Zegzhda, PD
    Zegzhda, DP
    [J]. INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 63 - 71
  • [35] Can we make operating systems reliable and secure?
    Tanenbaum, AS
    Herder, JN
    Bos, H
    [J]. COMPUTER, 2006, 39 (05) : 44 - +
  • [36] An operating system design for the security architecture for microprocessors
    Platte, Joerg
    Diaz, Raul Duran
    Naroska, Edwin
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 174 - +
  • [37] Design and implementation MAC in security operating system
    Cai, Y
    Zheng, ZR
    Shen, CX
    [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 216 - 219
  • [38] A research on secure methodology considering assurances and processes for developing high reliable security systems
    Choi, M
    Choi, H
    Kim, CS
    Kim, S
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 29 - 32
  • [39] Support for Secure Code Execution in Server Operating Systems
    Bhuse, Vijay
    Hekhuis, Kyle
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 21 - 30
  • [40] A New Methodology for the Development of Secure and Paranoid Operating Systems
    Mateus-Coelho, Nuno
    [J]. INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS / INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT / INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES 2020 (CENTERIS/PROJMAN/HCIST 2020), 2021, 181 : 1207 - 1215