• DocumentCode
    2865014
  • Title

    Security Goals Assurance Based on Software Active Monitoring

  • Author

    Zhao, Changzhi ; Dong, Wei ; Leucker, Martin ; Qi, Zhichang

  • Author_Institution
    Dept. of Comput. Sci., Nat. Univ. of Defense Technol., Changsha, China
  • fYear
    2011
  • fDate
    27-29 June 2011
  • Firstpage
    70
  • Lastpage
    79
  • Abstract
    Access control is a vital security mechanism in today´s operating systems, and the security policies dictating the security relevant behaviors is lengthy and complex, for example in Security-Enhanced Linux (SELinux). It is extremely difficult to verify the consistency between the security policies and the security goals desired by applications. In this paper, we present how to predict whether the information flow security goal is violated or not during runtime, how to generate the corresponding control actions on-line when divergence is detected and how to apply these actions in time based on software active monitoring technique. The symbolic security information flow model of SElinux is generated from a formalization of the access control mechanism which can be used to generate the N-step ahead projection of the future behavior. Information flow security goals are expressed in linear temporal logic (LTL) which provides clear description of the objectives desired by applications. Anticipatory monitor is generated from LTL formula automatically. We consider an on-line scheme where after the occurrence of an event, the next control action is determined on the basis of the N-step ahead projection of the future behavior. This procedure is repeated after the occurrence of next security relevant event. Thus, a closed-loop system is generated that all behavior sequences will satisfy the security goals.
  • Keywords
    Linux; authorisation; data flow analysis; formal verification; software reliability; temporal logic; N-step ahead projection; access control; formalization; information flow security goal; linear temporal logic; operating systems; security goal assurance; security policies; security relevant behaviors; security-enhanced Linux; software active monitoring; symbolic security information flow model; Access control; Context; Cost accounting; Monitoring; Semantics; Syntactics;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Secure Software Integration and Reliability Improvement (SSIRI), 2011 Fifth International Conference on
  • Conference_Location
    Jeju Island
  • Print_ISBN
    978-1-4577-0780-3
  • Electronic_ISBN
    978-0-7695-4453-3
  • Type

    conf

  • DOI
    10.1109/SSIRI.2011.34
  • Filename
    5992005