Runtime Verification of Linux Kernel Security Module

01/06/2020
by   Denis Efremov, et al.
0

The Linux kernel is one of the most important Free/Libre Open Source Software (FLOSS) projects. It is installed on billions of devices all over the world, which process various sensitive, confidential or simply private data. It is crucial to establish and prove its security properties. This work-in-progress paper presents a method to verify the Linux kernel for conformance with an abstract security policy model written in the Event-B specification language. The method is based on system call tracing and aims at checking that the results of system call execution do not lead to accesses that violate security policy requirements. As a basis for it, we use an additional Event-B specification of the Linux system call interface that is formally proved to satisfy all the requirements of the security policy model. In order to perform the conformance checks we use it to reproduce intercepted system calls and verify accesses.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/03/2022

Verifying RISC-V Physical Memory Protection

We formally verify an open-source hardware implementation of physical me...
research
08/15/2022

Comments on SPD-41 software licensing requirements

The proposed changes to Science Missions Directorate (SMD) Policy Docume...
research
07/30/2018

The REquirements TRacing On target (RETRO).NET Dataset

This paper presents the REquirements TRacing On target (RETRO).NET datas...
research
11/30/2020

No Crash, No Exploit: Automated Verification of Embedded Kernels

The kernel is the most safety- and security-critical component of many c...
research
08/16/2021

OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

Users interacting with a system through UI are typically obliged to perf...
research
07/31/2019

Aquarium Technical Report Preprint

In this technical report, we present the core calculi for two of the dom...
research
07/23/2022

Kellect: a Kernel-Based Efficient and Lossless Event Log Collector

As an essential element for log analysis, the system kernel-based event ...

Please sign up or login with your details

Forgot password? Click here to reset