Proceedings of the 12th ACM Symposium on Access Control Models and Technologies 2007
DOI: 10.1145/1266840.1266854
|View full text |Cite
|
Sign up to set email alerts
|

A logical specification and analysis for SELinux MLS policy

Abstract: The SELinux mandatory access control (MAC) policy has recently added a multilevel security (MLS) model which is able to express a fine granularity of control over a subject's access rights. The problem is that the richness of the SELinux MLS model makes it impractical to manually evaluate that a given policy meets certain specific properties. To address this issue, we have modeled the SELinux MLS model, using a logical specification and implemented that specification in the Prolog language. Furthermore, we hav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0
1

Year Published

2008
2008
2014
2014

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 11 publications
0
15
0
1
Order By: Relevance
“…In a policy compliance problem, a policy is said to comply with a goal if all the operations authorized by the policy satisfy the constraints of the goal [25,11,24,15]. The problem is that MAC policies often fail to comply with integrity requirements, as discussed above, so we must repair non-compliant cases.…”
Section: Related Workmentioning
confidence: 99%
“…In a policy compliance problem, a policy is said to comply with a goal if all the operations authorized by the policy satisfy the constraints of the goal [25,11,24,15]. The problem is that MAC policies often fail to comply with integrity requirements, as discussed above, so we must repair non-compliant cases.…”
Section: Related Workmentioning
confidence: 99%
“…SELinux uses type enforcement to label process so we identified a set of subject types that represent the target system TCB. We used PALMS [14] to find this set. PALMS is a tool written in XSB Prolog [37] that verifies the integrity of a TCB by querying an SELinux policy with an initial TCB set.…”
Section: Evaluation Of Enforcementmentioning
confidence: 99%
“…We encoded the model in Prolog, using the XSB Prolog implementation [6]. XSB has multiple advantages; it uses tabled resolution to improve performance, the encoding of the operators defined in the model is trivial in most cases, Prolog is ideal for implementing search algorithms, and to extend the implemented interface is easier than it would be with any other language, although it does require skills to program in prolog [21,10,6]. To evaluate our approach and its implementation, we check whether a VM-system running SELinux in the VMs, and XSM/Flask on the Xen hypervisor, meets a specific security goal.…”
Section: Implementation and Evaluationmentioning
confidence: 99%
“…We define an approach for constructing such graphs automatically by identifying the information flow mapping that is required between VM and VMM labels. Using our previously-defined compliance analysis [10], we show that performing an inter-VM analysis and VM-local analyses for certain VMs is sufficient to prove compliance for the composite of these policies. We have implemented our approach in a Prolog-based tool.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation