Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A new security testing method and its application to the Secure Xenix Kernel
Gligor V., Chandersekaran C., Jiang W., Johri A., Luckenbaugh G., Reich L. IEEE Transactions on Software EngineeringSE-13 (2):169-183,1987.Type:Article
Date Reviewed: Oct 1 1987

This paper describes a set of principles and methods for validating, via testing, security properties of a security kernel. A basic objective is to reduce the number of tests needed by combining the advantages of “black-box” testing and “program-structure-based” testing. An important aspect of the method is the use of an “access check graph” that models the dependencies that exist among the security checks performed by the kernel. An extensive discussion of using the method to test the Secure Xenix Kernel is given.

The presentation is largely descriptive, illustrated with many examples drawn from Xenix. The purpose of the paper, to provide an exposition of the method so that others may adapt it, does suffer somewhat from this very detailed description. However, the difficulty of abstracting the essential ideas may be an inherent problem of this topic. Despite this difficulty, the paper does provide a very comprehensive and complete discussion of the problem of testing for security properties, a very different exercise from that of testing for functional or performance properties.

The paper is intended for a reader who is familiar with both the testing literature and the security literature, and I suggest that it is essential reading for those interested in the practical validation of secure systems that are being built now.

Reviewer:  Glenn H. MacEwen Review #: CR111784
Bookmark and Share
 
Security Kernels (D.4.6 ... )
 
 
Access Controls (D.4.6 ... )
 
 
Design Tools and Techniques (D.2.2 )
 
 
General (D.4.0 )
 
 
Reliability (D.4.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security Kernels": Date
On the Identification of Covert Storage Channels in Secure Systems
Tsai C., Gligor V., Shandersekaran C. IEEE Transactions on Software Engineering 16(6): 569-580, 1990. Type: Article
Sep 1 1991
A guide to kernel exploitation: attacking the core
Perla E., Oldani M., Syngress Publishing, Boston, MA, 2010.  442, Type: Book (978-1-597494-86-1)
Jun 8 2011

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy