CYBERSEC 2021 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

May 4-6 at Taipei Nangang Exhibition Center, Hall 2

Yu-Hsuan Wang

Yu-Hsuan Wang

Deputy Technical Manager, ITRI ICL

Work in ITRI ICL, Division for Cyber and Data Security as Associate Engineer. Hope to bring the Confidentiality, Integrity and Availability to the system via access control.

Taiwan's Cybersecurity Researchers
  • May 6th (Thu)
  • 14:45 - 15:15
  • 7F 701G

Security Policy Made Easy?! Yes, with Cost.
Chinese Onsite

SELinux is famous for its thorough access control over the whole Linux box, but also notorious for the steep learning curve. The bundled open-source Reference Policy provides detailed security rules for a common Linux system, using the SELinux mechanism. However, system administrators usually have to tinker for the particular needs, on top of the Policy. 

 

In the meantime, due to the rise of cybersecurity attacks, people today pay much more attention to the light-weight solutions like whitelisting. In short, it is allowing or denying the program (or any subject) at the time of invocation. Its simplicity brings the popularity. To support the thinking, we made an experiment throwing away the Reference Policy and craft a so-called WhiteList Policy using the SELinux framework from scratch. It is intended to show 1) the loaded policy determines easy-to-use or not, not SELinux mechanism; 2) solution to security issues is a trade-off between many aspects, convenience and completeness especially; 3) there is always a gap between the theory and the practice on all security solutions , even the one simple as whitelist.

Access ControlApplication SecurityEndpoint Security
Read More