Enforcement of integrated security policy in trusted operating systems

  • Authors:
  • Hyung Chan Kim;R. S. Ramakrishna;Wook Shin;Kouichi Sakurai

  • Affiliations:
  • Department of Information and Communications, Gwangju Institute of Science and Technology, Gwangju, Rep. of Korea;Department of Information and Communications, Gwangju Institute of Science and Technology, Gwangju, Rep. of Korea;Department of Computer Science, University of Illinois at Urbana-Champaign, IL;Faculty of Computer Science and Communication Engineering, Kyushu University, Fukuoka, Japan

  • Venue:
  • IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The main focus of Trusted Operating System (TOS) research these days is on the enhanced access control of reference monitors which, in turn, control the individual operations on a given access instance. However, many real-life runtime attacks involve behavioral semantics. It is desirable, therefore, to enforce an integrated security policy that includes both behavioral security and access control policies. We have proposed an extended reference monitor to support both access and behavior controls. This results in a sequence of operations which is also of concern in security enforcement. This paper presents the design of the extended reference monitor for integrated policy enforcement and describes its implementation in Linux operating systems.