skip to main content
10.1145/1852666.1852746acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

A learning-based approach for SELinux policy optimization with type mining

Published:21 April 2010Publication History

ABSTRACT

One of the major steps towards enhancing the security of the Linux operating system was the introduction of Security Enhanced Linux (SELinux) [1], developed by the U.S. National Security Agency. SELinux is a kernel Linux Security Module (LSM) that adds Mandatory Access Control (MAC) to a regular Linux system with Discretionary Access Control (DAC) [2]. SELinux supports Type Enforcement (TE), Role Based Access Control (RBAC), and Multi-Level Security Levels (MLS).

Skip Supplemental Material Section

Supplemental Material

References

  1. Security Enhanced Linux, "http://www.nsa.gov/research/selinux, (03/10/2010)."Google ScholarGoogle Scholar
  2. SELinux in Ubuntu, "https://wiki.ubuntu.com/selinux, (03/12/2010)."Google ScholarGoogle Scholar
  3. D. Zhang, K. Ramamohanarao, and T. Ebringer, "Role engineering using graph optimisation," in SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, (New York, NY, USA), pp. 139--144, ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Vaidya, V. Atluri, and Q. Guo, "The role mining problem: finding a minimal descriptive set of roles," in SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, (New York, NY, USA), pp. 175--184, ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. Zhai, W. Ma, M. Tian, N. Yang, C. Liu, and H. Yang, "Design and implementation of a tool for analyzing selinux secure policy," in ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences, (New York, NY, USA), pp. 446--451, ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Hicks, S. Rueda, L. St. Clair, T. Jaeger, and P. McDaniel, "A logical specification and analysis for selinux mls policy," in SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, (New York, NY, USA), pp. 91--100, ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Sarna-Starosta and S. D. Stoller, "Policy analysis for security-enhanced linux," in Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS), pp. 1--12, April 2004. Available at http://www.cs.sunysb.edu/~stoller/WITS2004.html.Google ScholarGoogle Scholar
  8. T. Jaeger, R. Sailer, and X. Zhang, "Analyzing integrity protection in the selinux example policy," in SSYM'03: Proceedings of the 12th conference on USENIX Security Symposium, (Berkeley, CA, USA), pp. 5--5, USENIX Association, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. The MITRE Corporation, "Polgen: Guided automated policy development. url http://www.mitre.org/tech/selinux, (03/05/2010)."Google ScholarGoogle Scholar
  10. T. Yokoyama, M. Hanaoka, M. Shimamura, and K. Kono, "Simplifying security policy descriptions for internet servers in secure operating systems," in SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing, (New York, NY, USA), pp. 326--333, ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G.-J. Ahn, W. Xu, and X. Zhang, "Systematic policy analysis for high-assurance services in selinux," in POLICY '08: Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks, (Washington, DC, USA), pp. 3--10, IEEE Computer Society, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A learning-based approach for SELinux policy optimization with type mining

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          CSIIRW '10: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
          April 2010
          257 pages
          ISBN:9781450300179
          DOI:10.1145/1852666

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 April 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader