Micro-Policies: Formally Verified, Tag-Based Security Monitors

Autor: Andrew Tolmach, Benjamin C. Pierce, Antal Spector-Zabusky, Arthur Azevedo de Amorim, Nick Giannarakis, Catalin Hritcu, Maxime Dénès
Přispěvatelé: Department of Computer and Information Science [Pennsylvania] (CIS), University of Pennsylvania [Philadelphia], Programming securely with cryptography (PROSECCO ), Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Langages de programmation, types, compilation et preuves (GALLIUM), Laboratoire Spécification et Vérification [Cachan] (LSV), École normale supérieure - Cachan (ENS Cachan)-Centre National de la Recherche Scientifique (CNRS), National Technical University of Athens [Athens] (NTUA), Department of Computer Science [Portland] (CS), Portland State University [Portland] (PSU), University of Pennsylvania, Programming securely with cryptography (PROSECCO)
Rok vydání: 2015
Předmět:
tagged hardware architecture
reference mon-itors
Computer science
CPU cache
Principle of least privilege
0211 other engineering and technologies
Compartmentalization (information security)
02 engineering and technology
Index Terms-security
computer.software_genre
Security policy
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Software
0202 electrical engineering
electronic engineering
information engineering

Coq
refinement
[INFO]Computer Science [cs]
formal verification
Formal verification
machine-checked proofs
memory safety
021110 strategic
defence & security studies

Programming language
business.industry
dynamic enforcement
metadata
020207 software engineering
compartmentalization
least privilege
Metadata
control-flow integrity
Operating system
low-level code
dynamic sealing
business
isolation
computer
Zdroj: IEEE Symposium on Security and Privacy
2015 IEEE Symposium on Security and Privacy
2015 IEEE Symposium on Security and Privacy, May 2015, San Jose, United States. pp.813-830, ⟨10.1109/SP.2015.55⟩
Popis: International audience ; Recent advances in hardware design have demonstrated mechanisms allowing a wide range of low-level security policies (or micro-policies) to be expressed using rules on metadata tags. We propose a methodology for defining and reasoning about such tag-based reference monitors in terms of a high-level "symbolic machine" and we use this methodology to define and formally verify micro-policies for dynamic sealing, compartmentalization, control-flow integrity, and memory safety, in addition, we show how to use the tagging mechanism to protect its own integrity. For each micro-policy, we prove by refinement that the symbolic machine instantiated with the policy's rules embodies a high-level specification characterizing a useful security property. Last, we show how the symbolic machine itself can be implemented in terms of a hardware rule cache and a software controller.
Databáze: OpenAIRE