Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleJanuary 2022
Union Filesystem Source Directory Protect Architecture
International Journal of Software Innovation (IJSI), Volume 10, Issue 2Pages 1–13https://doi.org/10.4018/IJSI.289596Union filesystem has the advantage of providing a single integrated view of files on the same path by eliminating duplication of files on the same path at the mount point. A directory mounted by union filesystem should not be able to have access to ...
- research-articleJanuary 2020
Towards a secure and lightweight network function virtualisation environment
International Journal of Grid and Utility Computing (IJGUC), Volume 11, Issue 2Pages 243–252https://doi.org/10.1504/ijguc.2020.105539Cloud computing has deeply affected the structure of modern ICT infrastructures. It represents an enabling technology for novel paradigms such as Network Function Virtualisation (NFV), which proposes the virtualisation of network functions to enhance the ...
- research-articleDecember 2018
An Historical Analysis of the SEAndroid Policy Evolution
ACSAC '18: Proceedings of the 34th Annual Computer Security Applications ConferencePages 629–640https://doi.org/10.1145/3274694.3274709Android adopted SELinux's mandatory access control (MAC) mechanisms in 2013. Since then, billions of Android devices have benefited from mandatory access control security policies. These policies are expressed in a variety of rules, maintained by Google ...
- posterJune 2018
Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies
WiSec '18: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile NetworksPages 289–290https://doi.org/10.1145/3212480.3226106Smartphones are a critical device in modern society. With the amount of personal data present on many smartphones, protecting their integrity is crucial. The Android operating system employs multiple layers of security to ensure that the system is ...
- ArticleDecember 2014
SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs
INTRUST 2014: Revised Selected Papers of the 6th International Conference on Trusted Systems - Volume 9473Pages 294–309https://doi.org/10.1007/978-3-319-27998-5_19Although security policies configuration is crucial for operating systems to constrain applications' operations and to protect the confidentiality and integrity of sensitive resources inside the systems, it is an intractable work for security ...
-
- research-articleSeptember 2013
Secure RPC in embedded systems: evaluation of some GlobalPlatform implementation alternatives
WESS '13: Proceedings of the Workshop on Embedded Systems SecurityArticle No.: 4, Pages 1–7https://doi.org/10.1145/2527317.2527321In secure computing systems, isolation between different components is normally the basis for security. However, absolute isolation is seldom desired nor practical. Often for the system to function, a secure communication channel between otherwise ...
- articleJune 2013
Visualization-based policy analysis for SELinux: framework and user study
International Journal of Information Security (IJOIS), Volume 12, Issue 3Pages 155–171https://doi.org/10.1007/s10207-012-0180-7In this paper, we propose a visualization-based policy analysis framework that enables system administrators to query and visualize security policies and to easily identify the policy violations, especially focused on SELinux. Furthermore, we propose a ...
- research-articleSeptember 2011
Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM
ACM Transactions on Information and System Security (TISSEC), Volume 14, Issue 2Article No.: 19, Pages 1–28https://doi.org/10.1145/2019599.2019604Protecting end users from security threats is an extremely difficult, but increasingly critical, problem. Traditional security models that focused on separating users from each other have proven ineffective in an environment of widespread software ...
- ArticleJanuary 2011
Enhancing MAC Security Model with Meta-policy Approach Using an Intelligent Anomaly Based HIDS
ISMS '11: Proceedings of the 2011 Second International Conference on Intelligent Systems, Modelling and SimulationPages 40–43https://doi.org/10.1109/ISMS.2011.17This paper exhibits a new structure based on a meta-policy approach using an intelligent anomaly based host based intrusion detection system, These access control decisions are decided in agreement with a meta-policy. The combination of policy and host ...
- research-articleOctober 2010
Hardware-assisted security enhanced Linux in embedded systems: a proposal
WESS '10: Proceedings of the 5th Workshop on Embedded Systems SecurityArticle No.: 3, Pages 1–7https://doi.org/10.1145/1873548.1873551As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. This is especially true for embedded systems, often operating in non-secure environments, ...
- research-articleJuly 2010
A logical specification and analysis for SELinux MLS policy
ACM Transactions on Information and System Security (TISSEC), Volume 13, Issue 3Article No.: 26, Pages 1–31https://doi.org/10.1145/1805974.1805982The SELinux mandatory access control (MAC) policy has recently added a multilevel security (MLS) model which is able to express a fine granularity of control over a subject's access rights. The problem is that the richness of the SELinux MLS model makes ...
- ArticleMay 2010
Malware Detection on Mobile Devices
MDM '10: Proceedings of the 2010 Eleventh International Conference on Mobile Data ManagementPages 289–290https://doi.org/10.1109/MDM.2010.28We present various approaches for mitigating malware on mobile devices which we have implemented and evaluated on Google Android. Our work is divided into the following three segments: a host-based intrusion detection framework; an implementation of ...
- research-articleMay 2010
Securing Android-Powered Mobile Devices Using SELinux
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 8, Issue 3Pages 36–44https://doi.org/10.1109/MSP.2009.144Google's Android framework incorporates an operating system and software stack for mobile devices. Using a general-purpose operating system such as Linux in mobile devices has advantages but also security risks. Security-Enhanced Linux (SELinux) can ...
- research-articleNovember 2009
Design and implementation of a tool for analyzing SELinux secure policy
ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and HumanPages 446–451https://doi.org/10.1145/1655925.1656007SELinux can enforce a policy based on mandatory access control (MAC) for Linux so as to fulfill the security requirements of more strict access control for those hierarchical and classified management organizations or situations. But security policy ...
- ArticleOctober 2009
A System for Distributed SELinux Policy Management
NSS '09: Proceedings of the 2009 Third International Conference on Network and System SecurityPages 254–261https://doi.org/10.1109/NSS.2009.91Access control in SELinux is designed for a mono- lithic operating system. In order to apply SELinux in distributed environments it is necessary to extend the policy specification language to include the no- tion of location. This paper presents a ...
- research-articleApril 2009
A pipeline development toolkit in support of secure information flow goals
CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and StrategiesArticle No.: 66, Pages 1–4https://doi.org/10.1145/1558607.1558683The rapid spread of viruses, worms and undesired software in commercial and private networks has been a driving factor behind computer security research. The subject of preventing rogue software and rogue network traffic has been the focus of a number ...
- research-articleMarch 2009
Simplifying security policy descriptions for internet servers in secure operating systems
SAC '09: Proceedings of the 2009 ACM symposium on Applied ComputingPages 326–333https://doi.org/10.1145/1529282.1529352Secure operating systems (secure OSes) are widely used to limit the damage caused by unauthorized access to Internet servers. However, writing a security policy based on the principle of least privilege for a secure OS is a challenge for an ...
- research-articleJanuary 2009
FIDES: An advanced chip multiprocessor platform for secure next generation mobile terminals
ACM Transactions on Embedded Computing Systems (TECS), Volume 8, Issue 1Article No.: 1, Pages 1–16https://doi.org/10.1145/1457246.1457247We propose a secure platform on a chip multiprocessor, FIDES, in order to enable next generation mobile terminals to execute downloaded native applications for Linux. Its most important feature is the higher security based on multigrained separation ...
- ArticleDecember 2008
Analysis and Study of Security Mechanisms inside Linux Kernel
SECTECH '08: Proceedings of the 2008 International Conference on Security TechnologyPages 58–61https://doi.org/10.1109/SecTech.2008.17It's very important to analyze and study security mechanisms provided by an operating system. Currently, Linux is becoming one of the most popular operating systems because of its excellent performance and open source philosophy. Since lots of ...
- research-articleJune 2008
Measuring integrity on mobile phone systems
SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologiesPages 155–164https://doi.org/10.1145/1377836.1377862Mobile phone security is a relatively new field that is gathering momentum in the wake of rapid advancements in phone system technology. Mobile phones are now becoming sophisticated smart phones that provide services beyond basic telephony, such as ...