SPLinux*: An Information Flow Secure Linux

被引:1
|
作者
Vyas, Parjanya [1 ]
Shyamasundar, Rk [1 ]
Patil, Bhagyesh [1 ]
Borse, Snehal [1 ]
Sen, Satyaki [1 ]
机构
[1] Indian Inst Technol, Mumbai, Maharashtra, India
关键词
Information Flow Control; Secure OS;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00214
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Enforcement of information flow control (IFC) policies for OS to realize a sufficiently secure OS has been a challenging area of research. In this paper, our primary objective has been to present a fully information flow (IF) secure Linux that is usable with a minimal overhead without losing any of the existing functionalities. Towards such a goal, we describe the design, implementation and evaluation of a fully information flow secure Linux operating system called 'SP Linux' through complete mediation. Our approach first derives a labeled system (with initial inputs from the user in terms of the given Linux DAC policy) and manages further the labels automatically without users' intervention. It realizes complete mediation by interception of system calls and enforces IFC policy by implementing a recent decentralized security model that supports dynamic labelling and robust declassification. One of the distinct characteristics of the work is that the user has at his disposal all the features of Linux. We describe our experimental evaluation of SP Linux, its assessment of usability and performance evaluation with respect to other secure OS efforts. Results are quite encouraging in terms of performance, expressiveness, and usability.
引用
收藏
页码:1603 / 1612
页数:10
相关论文
共 50 条
  • [1] Secure information flow connections
    Bhardwaj, Chandrika
    Prasad, Sanjiva
    [J]. JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2022, 127
  • [2] Arrows for secure information flow
    Li, Peng
    Zdancewic, Steve
    [J]. THEORETICAL COMPUTER SCIENCE, 2010, 411 (19) : 1974 - 1994
  • [3] Information flow in secure contexts
    Bossi, Annalisa
    Macedonio, Damiano
    Piazza, Carla
    Rossi, Sabina
    [J]. JOURNAL OF COMPUTER SECURITY, 2005, 13 (03) : 391 - 422
  • [4] Information Flow Secure CAmkES
    Goyal, Amit
    Garg, Akshat
    Gour, Digvijaysingh
    Shyamasundar, R. K.
    Sivakumar, G.
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2021, : 237 - 244
  • [5] Secure information flow and CPS
    Zdancewic, S
    Myers, AC
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 46 - 61
  • [6] Compositionality of Secure Information Flow
    Palamidessi, Catuscia
    [J]. MATHEMATICS OF PROGRAM CONSTRUCTION, PROCEEDINGS, 2010, 6120 : 19 - 19
  • [7] Principles of secure information flow analysis
    Smith, Geoffrey
    [J]. Malware Detection, 2007, : 291 - 307
  • [8] Array operations for secure information flow
    Yao, JB
    Li, JS
    [J]. PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3884 - 3892
  • [9] Secure Information Flow as a Safety Property
    Boudol, Gerard
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 20 - 34
  • [10] Mediating secure information flow policies
    Zhang, Guo-Qiang
    [J]. INFORMATION AND COMPUTATION, 2007, 205 (09) : 1413 - 1425