{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T13:10:09Z","timestamp":1739279409854,"version":"3.37.0"},"reference-count":21,"publisher":"Wiley","issue":"15","license":[{"start":{"date-parts":[[2009,7,27]],"date-time":"2009-07-27T00:00:00Z","timestamp":1248652800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[2009,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Developing a modular system that properly supports a range of security models is challenging. The work presented here details our experiences with the modular<jats:italic>Linux<\/jats:italic>security framework called Linux Security Modules, or LSMs. Throughout our experiences we discovered that the developers of the LSM framework made certain tradeoffs for speed and simplicity during implementation, and consequently leaving the framework incomplete. Our experiences show at which points the theory of the LSM differs from reality, and details how these differences play out when developing and using a custom LSM. Copyright \u00a9 2009 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/spe.933","type":"journal-article","created":{"date-parts":[[2009,7,27]],"date-time":"2009-07-27T07:53:36Z","timestamp":1248681216000},"page":"1235-1251","source":"Crossref","is-referenced-by-count":1,"title":["Reflections on the virtues of modularity: a case study in linux security modules"],"prefix":"10.1002","volume":"39","author":[{"given":"Andrew","family":"Blaich","sequence":"first","affiliation":[]},{"given":"Douglas","family":"Thain","sequence":"additional","affiliation":[]},{"given":"Aaron","family":"Striegel","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2009,7,27]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/3468.650323"},{"key":"e_1_2_1_3_2","unstructured":"BlaichA LiaoQ SullivanB StriegelA ThainD WrightT.Lockdown: Simplifying enterprise network management with local context. Technical Report University of Notre Dame 2007."},{"key":"e_1_2_1_4_2","unstructured":"LiaoQ BlaichA StriegelA ThainD.ENAVis: Enterprise network activities visualization. Proceedings of the 22nd Large Installation System Administration Conference (LISA' 08) San Diego CA 2008;59\u201374."},{"key":"e_1_2_1_5_2","unstructured":"Netfilter. Available at:http:\/\/www.netfilter.org\/[August2008]."},{"key":"e_1_2_1_6_2","unstructured":"GarfinkelT.Traps and pitfalls: Practical problems in system call interposition based security tools. Proceedings of the ISOC Symposium on Network and Distributed Systems Security San Diego CA 2003;163\u2013176."},{"key":"e_1_2_1_7_2","unstructured":"JaegerT SailerR ZhangX.Analyzing integrity protection in the SELinux example policy. Proceedings of the 12th USENIX Security Symposium Washington DC U.S.A. August 2003;5\u20135."},{"key":"e_1_2_1_8_2","unstructured":"SmalleyS VanceC SalamonW.Implementing SELinux as a linux security module. Technical Report 01\u2010043 NAI Labs 2001."},{"key":"e_1_2_1_9_2","article-title":"Networking in NSA security\u2010enhanced linux","author":"Morris J","year":"2005","journal-title":"Linux Journal"},{"key":"e_1_2_1_10_2","unstructured":"NovellA.AppArmor application security for linux. Technical Report Novell 2008;3."},{"key":"e_1_2_1_11_2","unstructured":"SchauflerC.The simplified mandatory access control kernel. Technical Report 2008."},{"key":"e_1_2_1_12_2","unstructured":"N. D. CORPORATION.Tomoyo linux. Technical Report Japan 2008."},{"key":"e_1_2_1_13_2","first-page":"40","article-title":"AppArmor vs SELinux","volume":"69","author":"Leitner A","year":"2006","journal-title":"Linux\u2010Magazine"},{"key":"e_1_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.1992.10016"},{"key":"e_1_2_1_15_2","doi-asserted-by":"crossref","unstructured":"KargerPA SchellRR.Thirty years later: Lessons from the multics security evaluation. ACSAC Las Vegas NV 2002;119.","DOI":"10.1109\/CSAC.2002.1176285"},{"key":"e_1_2_1_16_2","unstructured":"WrightC.Lsm bitkeeper repository.2003."},{"key":"e_1_2_1_17_2","doi-asserted-by":"crossref","unstructured":"WrightC CowanC.Linux security modules: General security support for the linux kernel. Proceedings of the 11th USENIX Security Symposium San Francisco CA 2002;213.","DOI":"10.1109\/FITS.2003.1264934"},{"key":"e_1_2_1_18_2","unstructured":"WrightC CowanC MorrisJ SmalleyS Kroah\u2010HartmanG.Linux security module framework. Ottaw Linux Symposium Ottawa Canada 2002."},{"key":"e_1_2_1_19_2","unstructured":"Linux Kernel Mailing List. Pluggable schedulers vs. pluggable security. Available at:http:\/\/kerneltrap.org\/Linux\/PluggableSchedulersvsPluggableSecurity[September2007]."},{"key":"e_1_2_1_20_2","unstructured":"SalzmanPJ BurianM PomerantzO. The linux kernel module programming guide. Available at:http:\/\/tldp.org\/LDP\/lkmpg\/2.6\/html\/[May2007]."},{"key":"e_1_2_1_21_2","unstructured":"HallynS. Linux LSM stacker. Available at:http:\/\/sourceforge.net\/projects\/lsm\u2010stacker[August2008]."},{"key":"e_1_2_1_22_2","unstructured":"QuaritschM WinklerT.Linux security modules enhancements: Module stacking framework and TCP state transition hooks for state\u2010driven NIDS. Secure Information and Communication 2004;7."}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.933","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T12:43:09Z","timestamp":1739277789000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,27]]},"references-count":21,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["10.1002\/spe.933"],"URL":"https:\/\/doi.org\/10.1002\/spe.933","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"type":"print","value":"0038-0644"},{"type":"electronic","value":"1097-024X"}],"subject":[],"published":{"date-parts":[[2009,7,27]]}}}