A Comparative Analysis of Linux Mandatory Access Control Policy Enforcement Mechanisms

3Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

Unix—and by extension, Linux—traditionally uses a discretionary access control (DAC) paradigm. DAC mechanisms are decentralized by design, which makes it difficult to audit the security of a computer system. Furthermore, Unix systems have the concept of a root user who can bypass any DAC policies in place. These issues led to the development of mandatory access control (MAC) mechanisms, such as AppArmor, Security-Enhanced Linux (SELinux), and eBPF. We compare and contrast the performance differences between two popular MAC mechanisms for the Linux kernel: SELinux and Berkeley Packet Filter (BPF)/kernel runtime security implementation (KRSI). We demonstrate that BPF policies offer superior performance, have greater expressive power, and are easier to implement than comparable SELinux policies. Our results suggest that BPF/KRSI is the leading MAC mechanism for Linux systems.

Cite

CITATION STYLE

APA

Brimhall, B., De La Garza, C., Garrard, J., & Coffman, J. (2023). A Comparative Analysis of Linux Mandatory Access Control Policy Enforcement Mechanisms. In EUROSEC 2023 - Proceedings of the 2023 European Workshop on System Security (pp. 1–7). Association for Computing Machinery, Inc. https://doi.org/10.1145/3578357.3589454

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free