Design and implementation of an extended reference monitor for trusted operating systems

Hyung Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Conventional access control schemes have supported confidentiality and integrity acknowledging the necessary organizational security policy in operating systems. However, many runtime attacks in operating systems involve behavioral semantics, indicating that attacks should be seen as a sequence of access operations. Ironically these attacks are legitimate under any access control policy. This is due to the lack of behavioral dimension in security enforcement. We propose an extended reference monitor to include this dimension. Our method is based on safety property specification on system call sequences. The reference monitor checks the trace at runtime for behavior control in Linux operating system.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings
PublisherSpringer Verlag
Pages235-247
Number of pages13
ISBN (Print)3540330526, 9783540330523
DOIs
Publication statusPublished - 2006
Event2nd International Conference on Information Security Practice and Experience, ISPEC 2006 - Hangzhou, China
Duration: Apr 11 2006Apr 14 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3903 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd International Conference on Information Security Practice and Experience, ISPEC 2006
Country/TerritoryChina
CityHangzhou
Period4/11/064/14/06

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Design and implementation of an extended reference monitor for trusted operating systems'. Together they form a unique fingerprint.

Cite this