Security

Automatic Analysis Method for SELinux Security Policy

Download Now Free registration required

Executive Summary

Configuration of security policies is one of the most important prerequisites for secure and credible running of secure operating systems. Although it is a hard, tedious and complicated task within which errors and bugs are incidental at all time. Accordingly, methods for automatic analysis of SELinux security policies are discussed in this paper. Firstly, security mechanism, security models and policy description language for SELinux are briefly introduced. Then a security analysis model is constructed in order to verify validity and integrity of security policies and all rules for Type Enhancement (TE), Role-Based Access Control (RBAC) are rewritten as formal expressions while all subjects, objects and elements are described as sets and mappings formally. Algorithms for analysis are designed based on such model.

  • Format: PDF
  • Size: 213.18 KB