SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization

Joint Authors

Wei, Lifeng
Huang, Chenlin
Li, Zhipeng
Ding, Yan
Dong, Pan
Tan, Yusong
Zuo, Yudan

Source

Wireless Communications and Mobile Computing

Issue

Vol. 2020, Issue 2020 (31 Dec. 2020), pp.1-12, 12 p.

Publisher

Hindawi Publishing Corporation

Publication Date

2020-10-26

Country of Publication

Egypt

No. of Pages

12

Main Subjects

Information Technology and Computer Science

Abstract EN

The root privilege escalation attack is extremely destructive to the security of the Android system.

SEAndroid implements mandatory access control to the system through the SELinux security policy at the kernel mode, making the general root privilege escalation attacks unenforceable.

However, malicious attackers can exploit the Linux kernel vulnerability of privilege escalation to modify the SELinux security labels of the process arbitrarily to obtain the desired permissions and undermine system security.

Therefore, investigating the protection method of the security labels in the SELinux kernel is urgent.

And the impact on the existing security configuration of the system must also be reduced.

This paper proposes an optimization scheme of the SELinux mechanism based on security label randomization to solve the aforementioned problem.

At the system runtime, the system randomizes the mapping of the security labels inside and outside the kernel to protect the privileged security labels of the system from illegal obtainment and tampering by attackers.

This method is transparent to users; therefore, users do not need to modify the existing system security configuration.

A tamper-proof detection method of SELinux security label is also proposed to further improve the security of the method.

It detects and corrects the malicious tampering behaviors of the security label in the critical process of the system timely.

The above methods are implemented in the Linux system, and the effectiveness of security defense is proven through theoretical analysis and experimental verification.

Numerous experiments show that the effect of this method on system performance is less than 1%, and the success probability of root privilege escalation attack is less than 10−9.

American Psychological Association (APA)

Ding, Yan& Dong, Pan& Li, Zhipeng& Tan, Yusong& Huang, Chenlin& Wei, Lifeng…[et al.]. 2020. SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization. Wireless Communications and Mobile Computing،Vol. 2020, no. 2020, pp.1-12.
https://search.emarefa.net/detail/BIM-1214800

Modern Language Association (MLA)

Ding, Yan…[et al.]. SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization. Wireless Communications and Mobile Computing No. 2020 (2020), pp.1-12.
https://search.emarefa.net/detail/BIM-1214800

American Medical Association (AMA)

Ding, Yan& Dong, Pan& Li, Zhipeng& Tan, Yusong& Huang, Chenlin& Wei, Lifeng…[et al.]. SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization. Wireless Communications and Mobile Computing. 2020. Vol. 2020, no. 2020, pp.1-12.
https://search.emarefa.net/detail/BIM-1214800

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references

Record ID

BIM-1214800