Unix—and by extension, Linux—traditionally uses a discretionary access control (DAC) paradigm. DAC mechanisms are decentralized by design, which makes it difficult to audit the security of a computer system. Furthermore, Unix systems have the concept of a root user who can bypass any DAC policies in place. These issues led to the development of mandatory access control (MAC) mechanisms, such as AppArmor, Security-Enhanced Linux (SELinux), and eBPF. We compare and contrast the performance differences between two popular MAC mechanisms for the Linux kernel: SELinux and Berkeley Packet Filter (BPF)/kernel runtime security implementation (KRSI). We demonstrate that BPF policies offer superior performance, have greater expressive power, and are easier to implement than comparable SELinux policies. Our results suggest that BPF/KRSI is the leading MAC mechanism for Linux systems.
CITATION STYLE
Brimhall, B., De La Garza, C., Garrard, J., & Coffman, J. (2023). A Comparative Analysis of Linux Mandatory Access Control Policy Enforcement Mechanisms. In EUROSEC 2023 - Proceedings of the 2023 European Workshop on System Security (pp. 1–7). Association for Computing Machinery, Inc. https://doi.org/10.1145/3578357.3589454
Mendeley helps you to discover research relevant for your work.