6 DISCUSSION
While our evaluation showed that SELint is consid-
ered a valuable tool for analyzing SEAndroid poli-
cies, there are many areas for future work and im-
provements. The initial setup of SELint would benefit
from an interactive procedure, allowing users to au-
tomatically detect and solve the possible mismatches
between the installed libraries and policy versions.
The parametrized macro plugin could provide an
implementation based on a heuristic solution for the
knapsack problem allowing users to obtain a partial
solution, in order to save time and enable this plugin
to be run as part of a CI infrastructure. More work
is needed in order to polish the default configuration
offered by the risky rules plugin, and to provide
a way for OEMs to easily, and maybe interactively,
add scores for their own domains and types. We also
need to conduct a study on how easy it is for SEAn-
droid experts to write new SELint plugins. Another
future research direction is to investigate the possibil-
ity of using SELint together with a policy decompiler,
in order to analyze OEM policies from available An-
droid devices. This would provide additional input for
SELint evaluation.
We continue to gather feedback from SELint users
and SEAndroid experts to adjust SELint to their needs
and requirements. Since SELint is open source soft-
ware, and builds on existing official SEAndroid tools,
we are planning to work with Google to include
SELint in the set of SEAndroid tools provided with
the AOSP tree.
REFERENCES
Amthor, P., Kuhnhauser, W., and Polck, A. (2011). Model-
based safety analysis of SELinux security policies. In
NSS, pages 208–215. IEEE.
Badger, L., Sterne, D., Sherman, D., Walker, K., , et al.
(1995). Practical domain and type enforcement for
UNIX. In Security and Privacy, pages 66–77. IEEE.
Bauer, M. (2006). Paranoid penguin: an introduction to
Novell AppArmor. Linux Journal, (148):13.
Chu, P. C. and Beasley, J. E. (1998). A genetic algorithm for
the multidimensional knapsack problem. J heuristics,
4(1):63–86.
Clemente, P., Kaba, B., et al. (2012). Sptrack: Visual anal-
ysis of information flows within selinux policies and
attack logs. In AMT, pages 596–605. Springer.
Fowler, M. (2010). Domain-specific languages. Pearson
Education.
Guttman, J. D., Herzog, A. L., Ramsdell, J. D., and Sko-
rupka, C. W. (2005). Verifying information flow goals
in security-enhanced Linux. JCS, 13(1):115–134.
Hanafi, S. and Freville, A. (1998). An efficient tabu
search approach for the 0–1 multidimensional knap-
sack problem. EJOR, 106(2):659–675.
Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1976).
Protection in Operating Systems. CACM, 19(8).
Hurd, J., Carlsson, M., Finne, S., Letner, B., Stanley, J., and
White, P. (2009). Policy DSL: High-level Specifica-
tions of Information Flows for Security Policies.
Jaeger, T., Sailer, R., and Zhang, X. (2003). Analyzing in-
tegrity protection in the SELinux example policy. In
USENIX Security, page 5.
Kellerer, H., Pferschy, U., and Pisinger, D. (2004). Knap-
sack problems. Springer, Berlin.
Magazine, M. J. and Chern, M.-S. (1984). A note on ap-
proximation schemes for multidimensional knapsack
problems. MOR, 9(2):244–247.
Marouf, S. and Shehab, M. (2011). SEGrapher:
Visualization-based SELinux policy analysis. In
SAFECONFIG, pages 1–8. IEEE.
Reshetova, E., Bonazzi, F., Nyman, T., Borgaonkar, R., and
Asokan, N. (2016). Characterizing SEAndroid Poli-
cies in the Wild. In ICISSP.
Schaufler, C. (2008). Smack in embedded computing. In
Ottawa Linux Symposium.
SELinux (2014). Userspace tools. github.com/ SELinux-
Project/selinux. Accessed: 29/09/15.
Smalley, S. and Craig, R. (2013). Security Enhanced (SE)
Android: Bringing flexible MAC to Android. In
NDSS, volume 310, pages 20–38.
Smalley, S., Vance, C., and Salamon, W. (2001). Imple-
menting SELinux as a Linux security module. NAI
Labs Report, 1(43):139.
Sniffen, B. T., Harris, D. R., and Ramsdell, J. D. (2006).
Guided policy generation for application authors. In
SELinux Symposium.
Tresys (2016). SETools project page. github.com/Tresys
Technology/setools. Accessed: 18/05/16.
Wang, R. (2016). Automatic Generation, Refinement
and Analysis of Security Policies. repository.
lib.ncsu.edu/handle/1840.16/11139.
Wang, R., Enck, W., Reeves, D., et al. (2015). EASE-
Android: Automatic Policy Analysis and Refinement
for Security Enhanced Android via Large-Scale Semi-
Supervised Learning. In USENIX Security.
Zhou, Y. and Jiang, X. (2012). Dissecting android mal-
ware: Characterization and evolution. In Security and
Privacy, pages 95–109. IEEE.
ICISSP 2017 - 3rd International Conference on Information Systems Security and Privacy
58