期刊文献+

基于静态分析的XSM正确性验证

STATIC ANALYSIS-BASED CORRECTNESS VERIFICATION FOR XEN SECURITY MODULES
在线阅读 下载PDF
导出
摘要 XSM(Xen Security Module)是虚拟机Xen的安全模型框架,对系统的安全性具有决定性的作用。目前,对类似的强制访问框架的正确性验证研究主要集中于对钩子函数放置的验证。现有检测方法通常路径覆盖不够完整,或者有较高的误报率。对XSM框架的正确性验证问题进行分析,提出一种过程间流敏感、过程内路径敏感的,适用于XSM框架的静态分析方法。该方法通过扩展静态分析工具Saturn,实现了对XSM框架的钩子函数设置的正确性和完备性的验证。经实验验证,该方法具有完全的路径覆盖性,并且具有较高的精确度。 XSM is the security module framework of Xen Virtual Machine, it has crucial role on the security of system. Current researches on correctness verification for mandatory access control framework mainly focus on authorisation of hooks placement verification. All the exist-ing methods either don' t cover all paths, or have high false positive rate. In this paper we analyse the correctness verification issue for Xen Secunty Module framework, and present an inter-procedure flow-sensitive and intra-procedure path-sensitive based static analysis approach for the framework. This approach verifies the accuracy and completeness of hooks placement of the Xen Security Module framework through exten-ding the static analysis tool Saturn. It has been attested by the experiment that this approach achieves full path cover and has quite high accu-racy.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第9期1-5,22,共6页 Computer Applications and Software
基金 国家自然科学基金项目(90818012) "核高基"国家科技重大专项(2010ZX01036-001-002) 中国科学院知识创新工程重要方向项目(KGCX2-YW-125)
关键词 静态分析 正确性验证 XSM 钩子函数 SATURN Static analysis Correctness verification XSM Hooks Saturn
  • 相关文献

参考文献14

  • 1George Coker. XSM(Xen Security Module) [ CP/S]. National Infor- mation Assurance Research Lab, National Security Agency (NSA).
  • 2Paul Barham, Boris Dragovic, Keir Fraser, et al. Xen and the Art of Virtualization[ C]//SOSP03, October 19, 2003,22.
  • 3Derek G Murray, Grzegorz Milos, Steven Hand. Improving Xen Secur- ity through Disaggregation[ C]//Proceedings of the fourth ACM SIGP- LAN/SIGOPS international conference on Virtual execution environ- ments, ACM Request Permissions,2008.
  • 4Diwaker Gupta, Ludinila Cherkasova, Rob Gardner,et al. Enforcing Per- formance Isolation Across Virtual Machines in Xen[ C ]//Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware, Springer-Verlag New York, Inc ,2006.
  • 5Ray Spencer, Stephen Smalley, Peter Loscocco,et al. The Flask Secu- rity Architecture System Support for Diverse Security Policies [M]. 1999.
  • 6Sailer R. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems[ M]. IBM T.J. Watson Research Center, 2005.
  • 7Zhang Xiaolan, Antony Edwards , Trent Jaeger. Using CQUAL for Static Analysis of Authorization Hook Placement [ C ]//Proceedings of the 1 lth USENIX Security Symposium, USENIX Association,2002.
  • 8Foster J S, Ahndrich M F, Aiken A. A theory of type qualifiers [ J ]. PLDI, 1999:192 -203.
  • 9吴新松,周洲仪,贺也平,梁洪亮,袁春阳.基于静态分析的强制访问控制框架的正确性验证[J].计算机学报,2009,32(4):730-739. 被引量:4
  • 10Xie Y, Aiken A. Saturn: A scalable framework for error detection using boolean satisfiability[J]ACM Trans. Program. Lang. Syst., 2007,29(3).

二级参考文献16

  • 1Bell David E, LaPadula Leonard J. Secure computer system: Unified exposition and MULTICS interpretation. The MITRE Corporation, Bedford, MA, USA: MTR-2997 Rev. 1, 1976
  • 2Biba K J. Integrity considerations for secure computer systems. Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Bedford, MA, USA: ESDTR-76-372, 1977
  • 3Fraser Timothy. LOMAC: Low water-mark integrity protection for COTS environments. NAI Labs Report 0775, 2000
  • 4Wright C, Cowan C, Morris J, Smalley S, Kroah-Hartman G. Linux security modules: General security support for the Linux kernel//Proceedings of the Usenix Security Symposium. Usenix Assoc. , 2002:17-31
  • 5Watson R, Morrison W, Vance C, Feldman B. The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0//Proceedings of the USENIX Annual Technical Conference. San Antonio, TX, 2003:285-296
  • 6Zhang Xiao-Lan, Edwards Antony, Jaeger Trent. Using CQUAL for static analysis of authorization hook placement// Proceedings of the 11th Usenix Security Symposium. San Francisco, California, 2002: 33-48
  • 7Edwards Antony, Jaeger Trent, Zhang Xiao-Lan. Runtime verification of authorization hook placement for the Linux security modules framework//Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC, USA, 2002: 225-234
  • 8Foster Jeffrey S, Fahndrich Manuel, Aiken Alexander. A theory of type qualifiers//Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'99). Atlanta, Georgia, 1999: 192-203
  • 9DoD 5200.28-STD, Department of defense standard. Department of Defense Trusted Computer System Evaluation Criteria. National Computer Security Center, Ft. Meade, MD, USA, 1985
  • 10Volansehi Nie. A portable compiler-integrated approach to permanent checking//Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering. Tokyo, Japan, 2006:103-112

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部