i mplementation and a utomatic t esting for s ecurity e nhancement of l inux b ased on l east p...

16
IMPLEMENTATION AND AUTOMATIC TESTING FOR SECURITY ENHANCEMENT OF LINUX BASED ON LEAST PRIVILEGE -Nandini BV

Upload: sophia-daniel

Post on 13-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

IMPLEMENTATION AND AUTOMATIC TESTING FOR SECURITY ENHANCEMENT OF LINUXBASED ON LEAST PRIVILEGE -Nandini BV

Page 2: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

CONTENTS/AGENDA

Abstract Automatization of Security testing for SOS Security enhancement of Linux based on LPM Automatic security testing of LPM Summary References

Page 3: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

ABSTRACT

In this paper, methods and technologies about how to test a SOS automatically are discussed.

Least privilege is studied and the corresponding modules of security enhancement are added to Linux based on Linux Kernel Modules (LKM).

Finally, a prototype of automatic security testing as to such least privilege mechanism is implemented.

Results are analysed.

Page 4: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

EXTENSIONS OF SECURITY TESTING FOR SOS

Page 5: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

FRAMEWORK OF AUTOMATIC TESTING PLATFORM FOR SOS

Page 6: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

MODULAR DESIGN FOR SYSTEM CALL TESTERS

Basic steps to test a system call

Modular structure of a system call tester

Page 7: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

SECURITY ENHANCEMENT AS TO LINUX BASED ON LEAST PRIVILEGE

The algorithm can be described as follows: pI* = pI | pIadd pE' = ( fP | ( fI & pI*) ) ) & fE & pB & gB pI' = pI* & fI & fB pB' = pB & fB

Page 8: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

ARCHITECTURE OF SOS PROTOTYPE

Page 9: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

MODULAR PACKAGE STRUCTURE OF SOS

Page 10: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

AUTOMATIC SECURITY TESTING OF LEASTPRIVILEGE MECHANISMS

Analysis of testing target Design and implementation of automatic

security testing platform. Components of automatic testing security

platform

Page 11: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

ARCHITECTURE OF THE SOS PROTOTYPE

Page 12: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

TESTS AND RESULTS

Set up testing environment e.g. install SEM

Execute Testing on process privileges and process execution before install SEM

No error occur for

testing before installing SEM and installing itself

TESTS RESULTS

Page 13: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

Execute testing on installing SEM

Execute testing on -role privilege -process privilege -SEM uninstalling etc after install SEM.

Expected errors are returned under the condition of exceeding one’s authority for access testing

Only security manager and system operator execute uninstall operations work successfully.

Page 14: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

SUMMARY

Automatic security testing methods for SOS put forward in this paper are feasible and effective.

They can be improved and extended to be used to build up automatic security testing platform for entire SOS and implement deep security tests in the next step.

Automatization of generating test cases based on security requirement and/or security evaluation criteria can be further studied in future.

Page 15: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

REFERENCES

[1] Gaoshou Zhai, Zeng Jie, Miaoxia Ma, Liang Zhang,“Automatization of security testing as to secure operating system”, Proceedings of CNCC 2007, Tsinghua university printing house, 2007.(in Chinese)

[2] Pihui Wei, Sihan Qing, Jian Huang, "An evaluation system for secure operating system", Computer Engineering,vol.29, no.22, 2003, pp.135-137.(in Chinese)

[3] R.S.Sandhu, et al. “Role Based Access Control Models”, IEEE Computer 29(2): 38-47, IEEE Press, 1996.

Page 16: I MPLEMENTATION AND A UTOMATIC T ESTING FOR S ECURITY E NHANCEMENT OF L INUX B ASED ON L EAST P RIVILEGE -Nandini BV

THANK YOU!!