Automatic Security Testing for Linux Enhancement

Automatic Security Testing for Linux Enhancement
Slide Note
Embed
Share

In this paper, methods and technologies for automating security testing of Linux-based systems are discussed. The focus is on enhancing security through the implementation of least privilege mechanisms in the Linux environment. Various security modules and testing frameworks are explored to achieve robust security measures. The architecture, testing platform, and components of automatic security testing are analyzed for optimizing security protocols.

  • Security Testing
  • Linux Enhancement
  • Security Modules
  • Least Privilege
  • Automation

Uploaded on Feb 18, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. IMPLEMENTATION AND AUTOMATIC TESTING FOR SECURITY ENHANCEMENT OF LINUX BASED ON LEAST PRIVILEGE -Nandini BV

  2. CONTENTS/AGENDA Abstract Automatization of Security testing for SOS Security enhancement of Linux based on LPM Automatic security testing of LPM Summary References

  3. ABSTRACT In this paper, methods and technologies about how to test a SOS automatically are discussed. Least privilege is studied and the corresponding modules of security enhancement are added to Linux based on Linux Kernel Modules (LKM). Finally, a prototype of automatic security testing as to such least privilege mechanism is implemented. Results are analysed.

  4. EXTENSIONS OF SECURITY TESTING FOR SOS

  5. FRAMEWORK OF AUTOMATIC TESTING PLATFORM FOR SOS

  6. MODULAR DESIGN FOR SYSTEM CALL TESTERS Basic steps to test a system call Modular structure of a system call tester

  7. SECURITY ENHANCEMENT AS TO LINUX BASED ON LEAST PRIVILEGE The algorithm can be described as follows: pI* = pI | pIadd pE' = ( fP | ( fI & pI*) ) ) & fE & pB & gB pI' = pI* & fI & fB pB' = pB & fB

  8. ARCHITECTURE OF SOS PROTOTYPE

  9. MODULAR PACKAGE STRUCTURE OF SOS

  10. AUTOMATIC SECURITY TESTING OF LEAST PRIVILEGE MECHANISMS Analysis of testing target Design and implementation of automatic security testing platform. Components of automatic testing security platform

  11. ARCHITECTURE OF THE SOS PROTOTYPE

  12. TESTS AND RESULTS TESTS RESULTS Set up testing environment e.g. install SEM Execute Testing on process privileges and process execution before install SEM No error occur for testing before installing SEM and installing itself

  13. Execute testing on installing SEM Expected errors are returned under the condition of exceeding one s authority for access testing Only security manager and system operator execute uninstall operations work successfully. Execute testing on -role privilege -process privilege -SEM uninstalling etc after install SEM.

  14. SUMMARY Automatic security testing methods for SOS put forward in this paper are feasible and effective. They can be improved and extended to be used to build up automatic security testing platform for entire SOS and implement deep security tests in the next step. Automatization of generating test cases based on security requirement and/or security evaluation criteria can be further studied in future.

  15. REFERENCES [1] Gaoshou Zhai, Zeng Jie, Miaoxia Ma, Liang Zhang, Automatization of security testing as to secure operating system , Proceedings of CNCC 2007, Tsinghua university printing house, 2007.(in Chinese) [2] Pihui Wei, Sihan Qing, Jian Huang, "An evaluation system for secure operating system", Computer Engineering,vol.29, no.22, 2003, pp.135-137.(in Chinese) [3] R.S.Sandhu, et al. Role Based Access Control Models , IEEE Computer 29(2): 38-47, IEEE Press, 1996.

  16. THANK YOU!!

More Related Content