2012
DOI: 10.1007/978-3-642-35236-2_60
|View full text |Cite
|
Sign up to set email alerts
|

SPTrack: Visual Analysis of Information Flows within SELinux Policies and Attack Logs

Abstract: International audienceAnalyzing and administrating system security policies is difficult as policies become larger and more complex every day. The paper present work toward analyzing security policies and sessions in terms of security properties. Our intuition was that combining both visualization tools that could benefit from the expert's eyes, and software analysis abilities, should lead to a new interesting way to study and manage security policies as well as users' sessions. Rather than trying to mine larg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…This tool helped users analyze the relationship between objects (e.g., files) and subjects (e.g., processes) of policies using its own clustering algorithm. SPTrack [7] is based on the nodelink diagram, and visualizes the criticality level as colored edges according to interactions (e.g., write, signal) allowed by policies. Xu et al [35], [36] suggested using semantic substrates to visualize the key categories (i.e., user, role, domain, type) of the policy in separate spaces.…”
Section: B Security Policy Visualizationmentioning
confidence: 99%
“…This tool helped users analyze the relationship between objects (e.g., files) and subjects (e.g., processes) of policies using its own clustering algorithm. SPTrack [7] is based on the nodelink diagram, and visualizes the criticality level as colored edges according to interactions (e.g., write, signal) allowed by policies. Xu et al [35], [36] suggested using semantic substrates to visualize the key categories (i.e., user, role, domain, type) of the policy in separate spaces.…”
Section: B Security Policy Visualizationmentioning
confidence: 99%
“…Several visualization-based SELinux policy analysis tools [14][15][16] have been developed to help policy writers to better understand the policies. Gove [14] presents a tool for understanding and comparing SELinux/SEAndroid policies by creating graph representations.…”
Section: Related Workmentioning
confidence: 99%
“…The resulting tool, shrimp, can be used to analyze and find errors in the SELinux Reference Policy. Information visualization techniques have been applied to SELinux policy analysis in (Clemente et al, 2012), also in combination with clustering of policy elements (Marouf and Shehab, 2011). These analysis methods are largely academic, and no practical tools based on them are used by the SELinux community.…”
Section: Selinux Toolsmentioning
confidence: 99%