Skip to main content
Erschienen in:
Buchtitelbild

2017 | OriginalPaper | Buchkapitel

Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory

verfasst von : Laurent Georget, Mathieu Jaume, Guillaume Piolle, Frédéric Tronel, Valérie Viet Triem Tong

Erschienen in: Software Engineering and Formal Methods

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Information flow control can be used at the Operating System level to enforce restrictions on the diffusion of security-sensitive data. In Linux, information flow trackers are often implemented as Linux Security Modules. They can fail to monitor some indirect flows when flows occur concurrently and affect the same containers of information. Furthermore, they are not able to monitor the flows due to file mappings in memory and shared memory between processes. We first present two attacks to evade state-of-the-art LSM-based trackers. We then describe an approach, formally proved with Coq [12] to perform information flow tracking able to cope with concurrency and in-memory flows. We demonstrate its implementability and usefulness in Rfblare, a race condition-free version of the flow tracking done by KBlare [4].

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
\(f[x \leftarrow a]\) is the function such that \(f[x \leftarrow a](y) = \left\{ \begin{aligned}&a&\text {if}\,\, x = y\quad \,\\&f(y)&\text {otherwise.}\\ \end{aligned} \right. \)
 
2
Given two relations \(R_1 \subseteq E \times F\) and \(R_2 \subseteq F \times G\), the relation \(R_1 \centerdot R_2 \subseteq E \times G\) is defined by \((x,y) \in R_1 \centerdot R_2\) iff there exists \(z \in F\) such that \((x,z) \in R_1\) and \((z,y) \in R_2\).
 
Literatur
1.
Zurück zum Zitat Cristiá, M., Mata, P.E.: Runtime enforcement of noninterference by duplicating processes and their memories. In: Workshop de Seguridad Informática WSEGI, vol. 2009 (2009) Cristiá, M., Mata, P.E.: Runtime enforcement of noninterference by duplicating processes and their memories. In: Workshop de Seguridad Informática WSEGI, vol. 2009 (2009)
3.
Zurück zum Zitat Georget, L., Jaume, M., Piolle, G., Tronel, F., Viet Triem Tong, V.: Verifying the reliability of operating system-level information flow control systems in Linux. In: FormaliSE: FME Workshop on Formal Methods in Software Engineering. IEEE, Buenos Aires, May 2017 Georget, L., Jaume, M., Piolle, G., Tronel, F., Viet Triem Tong, V.: Verifying the reliability of operating system-level information flow control systems in Linux. In: FormaliSE: FME Workshop on Formal Methods in Software Engineering. IEEE, Buenos Aires, May 2017
4.
Zurück zum Zitat Hauser, C.: Détection d’intrusion dans les systémes distribués par propagation de teinte au niveau noyau. Ph.D. thesis, University of Rennes 1, France., June 2013 Hauser, C.: Détection d’intrusion dans les systémes distribués par propagation de teinte au niveau noyau. Ph.D. thesis, University of Rennes 1, France., June 2013
5.
Zurück zum Zitat Jaume, M., Andriatsimandefitra, R., Tong, V.V.T., Mé, L.: Secure states versus secure executions. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 148–162. Springer, Heidelberg (2013). doi:10.1007/978-3-642-45204-8_11CrossRef Jaume, M., Andriatsimandefitra, R., Tong, V.V.T., Mé, L.: Secure states versus secure executions. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 148–162. Springer, Heidelberg (2013). doi:10.​1007/​978-3-642-45204-8_​11CrossRef
6.
Zurück zum Zitat Krohn, M., Tromer, E.: Noninterference for a practical DIFC-based operating system. In: IEEE Symposium on Security and Privacy, pp. 61–76. IEEE Computer Society, Washington, DC (2009) Krohn, M., Tromer, E.: Noninterference for a practical DIFC-based operating system. In: IEEE Symposium on Security and Privacy, pp. 61–76. IEEE Computer Society, Washington, DC (2009)
7.
Zurück zum Zitat Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Kaashoek, M.F., Kohler, E., Morris, R.: Information flow control for standard OS abstractions. In: ACM SIGOPS Symposium on Operating Systems Principles, pp. 321–334. ACM, Stevenson, October 2007 Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Kaashoek, M.F., Kohler, E., Morris, R.: Information flow control for standard OS abstractions. In: ACM SIGOPS Symposium on Operating Systems Principles, pp. 321–334. ACM, Stevenson, October 2007
8.
Zurück zum Zitat Nadkarni, A., Andow, B., Enck, W., Jha, S.: Practical DIFC enforcement on Android. In: 25th USENIX Security Symposium, USENIX Security 2016, pp. 1119–1136. USENIX Association, Austin, August 2016 Nadkarni, A., Andow, B., Enck, W., Jha, S.: Practical DIFC enforcement on Android. In: 25th USENIX Security Symposium, USENIX Security 2016, pp. 1119–1136. USENIX Association, Austin, August 2016
9.
Zurück zum Zitat Porter, D.E., Bond, M.D., Roy, I., Mckinley, K.S., Witchel, E.: Practical fine-grained information flow control using laminar. ACM Trans. Program. Lang. Syst. 37(1), 1–51 (2014)CrossRef Porter, D.E., Bond, M.D., Roy, I., Mckinley, K.S., Witchel, E.: Practical fine-grained information flow control using laminar. ACM Trans. Program. Lang. Syst. 37(1), 1–51 (2014)CrossRef
11.
Zurück zum Zitat Roy, I., Porter, D.E., Bond, M.D., McKinley, K.S., Witchel, E.: Laminar: practical fine-grained decentralized information flow control. In: Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 63–74. ACM, Dublin, June 2009 Roy, I., Porter, D.E., Bond, M.D., McKinley, K.S., Witchel, E.: Laminar: practical fine-grained decentralized information flow control. In: Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 63–74. ACM, Dublin, June 2009
12.
Zurück zum Zitat The Coq Development Team: The Coq Proof Assistant Reference Manual. Technical report, Inria, December 2016 The Coq Development Team: The Coq Proof Assistant Reference Manual. Technical report, Inria, December 2016
13.
Zurück zum Zitat VanDeBogart, S., Efstathopoulos, P., Kohler, E., Krohn, M., Frey, C., Ziegler, D., Kaashoek, F., Morris, R., Maziéres, D.: Labels and event processes in the asbestos operating system. ACM Trans. Comput. Syst. 25(4), December 2007. Article No. 11. https://dl.acm.org/citation.cfm?id=1314302 VanDeBogart, S., Efstathopoulos, P., Kohler, E., Krohn, M., Frey, C., Ziegler, D., Kaashoek, F., Morris, R., Maziéres, D.: Labels and event processes in the asbestos operating system. ACM Trans. Comput. Syst. 25(4), December 2007. Article No. 11. https://​dl.​acm.​org/​citation.​cfm?​id=​1314302
14.
Zurück zum Zitat Wright, C., Cowan, C., Smalley, S., Morris, J., Kroah-Hartman, G.: Linux security modules: general security support for the Linux kernel. In: USENIX Security Symposium, pp. 17–31. USENIX Association, San Francisco (2002) Wright, C., Cowan, C., Smalley, S., Morris, J., Kroah-Hartman, G.: Linux security modules: general security support for the Linux kernel. In: USENIX Security Symposium, pp. 17–31. USENIX Association, San Francisco (2002)
15.
Zurück zum Zitat Zimmermann, J., Mé, L., Bidan, C.: Experimenting with a policy-based HIDS based on an information flow control model. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), December 2003 Zimmermann, J., Mé, L., Bidan, C.: Experimenting with a policy-based HIDS based on an information flow control model. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), December 2003
Metadaten
Titel
Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory
verfasst von
Laurent Georget
Mathieu Jaume
Guillaume Piolle
Frédéric Tronel
Valérie Viet Triem Tong
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-66197-1_1

Premium Partner