TY - JOUR
T1 - A logical specification and analysis for SELinux MLS policy
AU - Hicks, Boniface
AU - Rueda, Sandra
AU - St.Clair, Luke
AU - Jaeger, Trent
AU - Mcdaniel, Patrick
PY - 2010/7/1
Y1 - 2010/7/1
N2 - The SELinux mandatory access control (MAC) policy has recently added a multilevel security (MLS)model which is able to express a fine granularity of control over a subject's access rights. The problem is that the richness of the SELinux MLS model makes it impractical to manually evaluate that a given policy meets certain specific properties. To address this issue, we have modeled the SELinux MLS model, using a logical specification and implemented that specification in the Prolog language. Furthermore, we have developed some analyses for testing information flow properties of a given policy as well as an algorithm to determine whether one policy is compliant with another. We have implemented these analyses in Prolog and compiled our implementation into a tool for SELinux MLS policy analysis, called PALMS.Using PALMS, we verified some important properties of the SELinux MLS reference policy, namely that it satisfies the simple security condition and property defined by Bell and LaPadula. We also evaluated whether the policy associated to a given application is compliant with the policy of the SELinux system in which it would be deployed.
AB - The SELinux mandatory access control (MAC) policy has recently added a multilevel security (MLS)model which is able to express a fine granularity of control over a subject's access rights. The problem is that the richness of the SELinux MLS model makes it impractical to manually evaluate that a given policy meets certain specific properties. To address this issue, we have modeled the SELinux MLS model, using a logical specification and implemented that specification in the Prolog language. Furthermore, we have developed some analyses for testing information flow properties of a given policy as well as an algorithm to determine whether one policy is compliant with another. We have implemented these analyses in Prolog and compiled our implementation into a tool for SELinux MLS policy analysis, called PALMS.Using PALMS, we verified some important properties of the SELinux MLS reference policy, namely that it satisfies the simple security condition and property defined by Bell and LaPadula. We also evaluated whether the policy associated to a given application is compliant with the policy of the SELinux system in which it would be deployed.
UR - http://www.scopus.com/inward/record.url?scp=77955220788&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77955220788&partnerID=8YFLogxK
U2 - 10.1145/1805974.1805982
DO - 10.1145/1805974.1805982
M3 - Article
AN - SCOPUS:77955220788
SN - 1094-9224
VL - 13
JO - ACM Transactions on Information and System Security
JF - ACM Transactions on Information and System Security
IS - 3
M1 - 26
ER -