Font Size: a A A

The Security Enhancement Study Of Embedded Linux Operating System

Posted on:2009-04-09Degree:MasterType:Thesis
Country:ChinaCandidate:Z H SunFull Text:PDF
GTID:2178360272977170Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Embedded computing is widely used and continuously developing. The security of it is becoming one of the issues which is urgent to be solved. Operat- ing system is a core component in embedded system. If operating system is weak in security, the security of network communication and application softwares will be affected and the security of the whole embedded system will not be guaranteed. Embedded linux operating system is widely used in embedded application, so the security enhancement research of it is significant. This paper researches in enhancing security of embedded linux operating system.The security drawback of embedded linux operating system is researched and analysed in this paper. For enhancing the security of it we research in mandatory access control and security audit. In mandatory access control aspect, we analyse several existing and typical security models. We propose a planar and memorial model(MPMLS). The aim of the model is confidentiality,integrality and usability. Formal description and analysis of the model are presented in this paper. In security audit aspect, this paper analyses the difficult problems of the security audit in embedded linux and presents the countermeasures to resolve these problems. Then this paper designs a universal kernel level audit framewo- rk(LKAM). We implement and test this framework. The test results are analysed.At last with the MPMLS security model we design and partly implement the mandatory access control module which is based on Linux Security Module. And we design and implement the enhanced security audit system of the embedded linux. We test the mandatory access control module and the enhanced security audit system, the test results are analysed.
Keywords/Search Tags:Embedded Linux, Mandatory Access Control, Security Model, BLP Model, Biba Model, Security Audit
PDF Full Text Request
Related items