With the widely use of embedded system and rapid development of network technology, security was becoming more and more important to embedded system. Embedded operating system was so important to embedded system that its security was important.The difference between the embedded operating system and the general operating system was pointed out, the structure and the security function and the method of the secure operating system were analyzed in the article. The improvement- enhancement method was used to realize the kernel security of the embedded Linux operating system.The characteristic of the Linux kernel and the main data structure of the Linux were analyzed. The security of the Linux was analyzed, and the characteristic and the necessary of the embedded operating system and the secure operating system were considered. The mandatory access control mechanism in the Linux kernel according to the security criterion was completed, which was to enhance the security of the embedded operating system. The mandatory access control mechanism was mainly used to protect the computer system against the attacking and the destruction from the Trojan horse.The audit mechanism was realized in the kernel. The audit mechanism that was realized at application procedure level in the Linux original was completed at the kernel. That was to avoid some vicious code that could escape from the original audit mechanism attacking the system, and made a record of the attacking. |