On the verification of system-level information flow properties for virtualized execution platforms

被引:4
作者
Baumann, Christoph [1 ]
Schwarz, Oliver [2 ]
Dam, Mads [3 ]
机构
[1] Ericsson Res Secur, Kista, Sweden
[2] RISE SICS, Kista, Sweden
[3] KTH Royal Inst Technol, Stockholm, Sweden
关键词
Decomposition; SoC; Information flow security; Formal verification; Hypervisor; ARMv8;
D O I
10.1007/s13389-019-00216-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The security of embedded systems can be dramatically improved through the use of formally verified isolation mechanisms such as separation kernels, hypervisors, or microkernels. For trustworthiness, particularly for system-level behavior, the verifications need precise models of the underlying hardware. Such models are hard to attain, highly complex, and proofs of their security properties may not easily apply to similar but different platforms. This may render verification economically infeasible. To address these issues, we propose a compositional top-down approach to embedded system specification and verification, where the system-on-chip ismodeled as a network of distributed automata communicating via paired synchronous message passing. Using abstract specifications for each component allows to delay the development of detailed models for cores, devices, etc., while still being able to verify high-level security properties like integrity and confidentiality, and soundly refine the result for different instantiations of the abstract components at a later stage. As a case study, we apply this methodology to the verification of information flow security for an industry-scale security-oriented hypervisor on the ARMv8-A platform and report on the complete verification of guest mode security properties in the HOL4 theorem prover.
引用
收藏
页码:243 / 261
页数:19
相关论文
共 56 条
  • [1] AN OLD-FASHIONED RECIPE FOR REAL-TIME
    ABADI, M
    LAMPORT, L
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1994, 16 (05): : 1543 - 1571
  • [2] Alglave J., EUR S PROGR, P512
  • [3] Herding Cats: Modelling, Simulation, Testing, and Data Mining for Weak Memory
    Alglave, Jade
    Maranget, Luc
    Tautschnig, Michael
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2014, 36 (02):
  • [4] Alkassar E, 2010, LECT NOTES COMPUT SC, V6217, P40, DOI 10.1007/978-3-642-15057-9_3
  • [5] Alur R., 2001, Embedded Software, V2211, P14
  • [6] [Anonymous], 2014, BadUSB-On accessories that turn evil
  • [7] Barthe Gilles, 2011, FM 2011: Formal Methods. Proceedings 17th International Symposium on Formal Methods, P231, DOI 10.1007/978-3-642-21437-0_19
  • [8] Cache-leakage resilient OS isolation in an idealized model of virtualization
    Barthe, Gilles
    Betarte, Gustavo
    Campo, Juan Diego
    Luna, Carlos
    [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 186 - 197
  • [9] Baumann C, 2016, 2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), P210, DOI 10.1109/EuCNC.2016.7561034
  • [10] Baumann F, 2019, POSITIF, P23