Verified Security for the Morello Capability-enhanced Prototype Arm Architecture

نویسندگان

چکیده

Abstract Memory safety bugs continue to be a major source of security vulnerabilities in our critical infrastructure. The CHERI project has proposed extending conventional architectures with hardware-supported capabilities enable fine-grained memory protection and scalable compartmentalisation, allowing historically memory-unsafe C C++ adapted deterministically mitigate large classes vulnerabilities, while requiring only minor changes existing system software sources. Arm is currently designing building Morello, CHERI-enabled prototype architecture, processor, SoC, board, the high-performance Neoverse N1, industrial evaluation pave way for potential mass-market adoption. However, such new security-oriented architecture feature, it important establish high confidence that does provide intended protections, cannot done engineering techniques. In this paper we put Morello on solid mathematical footing from outset. We define fundamental property aims provide, reachable capability monotonicity, prove definition satisfies it. This proof mechanised Isabelle/HOL, applies translation official specification instruction-set (ISA) into Isabelle. main challenge handling complexity scale production architecture: 62,000 lines specification, translated 210,000 do so by factoring via narrow abstraction capturing essential properties arbitrary ISAs, expressed above monadic intra-instruction semantics. also develop model-based test generator, which generates instruction-sequence tests give good coverage, used early testing implementation QEMU development, use Arm’s internal suite validate model. gives us machine-checked proofs whole-ISA full-scale industry at design-time. To best knowledge, first demonstration feasible, significantly increases Morello.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhanced Security Architecture for Cloud Data Security

Cloud computing offers a prominent service for data storage known as cloud storage. The flow and storage of data on the cloud environment in plain text format may be main security threat. So, it is the responsibility of cloud service providers to ensure privacy and security of data on storage as well as network level. The following three parameters confidentiality, integrity and availability de...

متن کامل

A Verified Shared Capability Model

This paper presents a high-level access control model of the seL4 microkernel. We extend an earlier formalisation by Elkaduwe et al with non-determinism, explicit sharing of capability storage, and a delete-operation for entities. We formally prove that this new model can enforce system-global security policies as well as authority confinement. By treating sharing explicitly in the abstract acc...

متن کامل

Monterey Security Enhanced Architecture Project

This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanisms for the protection of distributed multi-domain computing environments from malicious code and other attacks. These security services and mechanisms extend and interoperate with existing workstations, application...

متن کامل

Prototype system for pursuing firm's core capability

Core capabilities are critical abilities that enhance and sustain an organization’s competitive advantage in extremely competitive environments. In today’s complex and dynamic business environment, companies are often prevented from effectively and efficiently evaluating relevant factors necessary for developing their core capability strategic systems. These systems, with inherent human decisio...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2022

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-99336-8_7