DocumentCode
2865014
Title
Security Goals Assurance Based on Software Active Monitoring
Author
Zhao, Changzhi ; Dong, Wei ; Leucker, Martin ; Qi, Zhichang
Author_Institution
Dept. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
fYear
2011
fDate
27-29 June 2011
Firstpage
70
Lastpage
79
Abstract
Access control is a vital security mechanism in today´s operating systems, and the security policies dictating the security relevant behaviors is lengthy and complex, for example in Security-Enhanced Linux (SELinux). It is extremely difficult to verify the consistency between the security policies and the security goals desired by applications. In this paper, we present how to predict whether the information flow security goal is violated or not during runtime, how to generate the corresponding control actions on-line when divergence is detected and how to apply these actions in time based on software active monitoring technique. The symbolic security information flow model of SElinux is generated from a formalization of the access control mechanism which can be used to generate the N-step ahead projection of the future behavior. Information flow security goals are expressed in linear temporal logic (LTL) which provides clear description of the objectives desired by applications. Anticipatory monitor is generated from LTL formula automatically. We consider an on-line scheme where after the occurrence of an event, the next control action is determined on the basis of the N-step ahead projection of the future behavior. This procedure is repeated after the occurrence of next security relevant event. Thus, a closed-loop system is generated that all behavior sequences will satisfy the security goals.
Keywords
Linux; authorisation; data flow analysis; formal verification; software reliability; temporal logic; N-step ahead projection; access control; formalization; information flow security goal; linear temporal logic; operating systems; security goal assurance; security policies; security relevant behaviors; security-enhanced Linux; software active monitoring; symbolic security information flow model; Access control; Context; Cost accounting; Monitoring; Semantics; Syntactics;
fLanguage
English
Publisher
ieee
Conference_Titel
Secure Software Integration and Reliability Improvement (SSIRI), 2011 Fifth International Conference on
Conference_Location
Jeju Island
Print_ISBN
978-1-4577-0780-3
Electronic_ISBN
978-0-7695-4453-3
Type
conf
DOI
10.1109/SSIRI.2011.34
Filename
5992005
Link To Document