Managing the risk of covert information flows in virtual machine systems
- 20 June 2007
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
Flexible mandatory access control (MAC) enforcement is now available for virtual machine systems. For example, the sHype MAC system for the Xen virtual machine monitor is part of the mainline Xen distribution. Such systems offer the isolation of VM systems with the flexible security of MAC enforcement. A problem is that such MAC VM systems will only be assured at modest levels (e.g., Common Criteria EAL4), so they may contain covert channels. Covert channels are often difficult to identify and harder to remove, so we propose an approach to manage possible covert leakage to enable verification of security guarantees. Typically, covert channels are outside of access control policies, but we propose an approach that includes both overt flows and covert flows to assess the possible risk of information leakage due to their combination. We define the concept of a risk flow policy that describes the authorized risks due to covert flows. In this paper, we evaluate the ability of four policy models to express risk flow policies. Further, we examine how such policies will be enforced in VM systems. We find that variants of the Chinese Wall model and Bell-LaPadula model have features necessary to express risk flow policies. Further, we find that such policies can be enforced in the context of sHype's Type Enforcement model.Keywords
This publication has 16 references indexed in Scilit:
- Edit automata: enforcement mechanisms for run-time security policiesInternational Journal of Information Security, 2005
- Resolving constraint conflictsPublished by Association for Computing Machinery (ACM) ,2004
- Consistency analysis of authorization hook placement in the Linux security modules frameworkACM Transactions on Information and System Security, 2004
- Xen and the art of virtualizationPublished by Association for Computing Machinery (ACM) ,2003
- Policy management using access control spacesACM Transactions on Information and System Security, 2003
- The Chinese Wall security policyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Reducing timing channels with fuzzy timePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Enforceable security policiesACM Transactions on Information and System Security, 2000
- Lattice-based enforcement of Chinese WallsComputers & Security, 1992
- A note on the confinement problemCommunications of the ACM, 1973