Runtime verification of authorization hook placement for the linux security modules framework

@inproceedings{Edwards2002RuntimeVO,
  title={Runtime verification of authorization hook placement for the linux security modules framework},
  author={Antony Edwards and Trent Jaeger and Xiaolan Zhang},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2002}
}
We present runtime tools to assist the Linux community in verifying the correctness of the Linux Security Modules (LSM) framework. The LSM framework consists of a set of authorization hooks inserted into the Linux kernel to enable additional authorizations to be performed (e.g., for mandatory access control). When compared to system call interposition, authorization within the kernel has both security and performance advantages, but it is more difficult to verify that placement of the LSM hooks… CONTINUE READING

6 Figures & Tables

Topics

Statistics

0510'04'06'08'10'12'14'16'18
Citations per Year

54 Citations

Semantic Scholar estimates that this publication has 54 citations based on the available data.

See our FAQ for additional information.