Research on Model Checking for SELinux Inter-Process Communication

Article Preview

Abstract:

SELinux (Security Enhanced Linux) inherited the basic design of LINUX, and it is a high secure operating system. It is important to know how to make the IPC (Inter-Process Communication) for this kind of multi-task and multi-user system. In this paper, Finite State Automaton is used to verify the security of IPC mechanisms of SELinux. Finally, IPC mechanisms are verified with SPIN model checker.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3826-3829

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] E. Clarke, O. Grumberg, and D. Peled, Model Checking, MIT Press, (1999).

Google Scholar

[2] Immich, P. K., Bhagavatula, R. S., and Pendse, R, Performance analysis of five Inter-process communication mechanisms across UNIX operating systems, J. Syst. Softw. vol. 68, pp.27-43, (2003).

DOI: 10.1016/s0164-1212(02)00134-6

Google Scholar

[3] Stevens, W. Richard, UNIX Network Programming Volume 2: Inter-process Communications, Prentice Hall, (1999).

Google Scholar

[4] Peter Loscocco, NSA, Stephen Smalley, NAI Labs, Integrating Flexible Support for Security Policies into the Linux Operating System, FREENIX Track: 2001 USENIX Annual Technical Conference. June (2001).

Google Scholar

[5] G.J. Holzmann, Design and Validation of Computer Protocols. Englewood Cliffs, Prentice Hall, (1991).

Google Scholar

[6] A. Pnueli, The Temporal Logic of Programs, Proc. 18th IEEE Symp. Foundations of Computer Science, Providence, R. I, 1977, pp.46-57.

Google Scholar