Symbolic Safety
نویسنده
چکیده
One of the biggest challenges in operating systems, distributed systems, and mobile code is how to ensure safety of untrusted code. Two recent proposals are Software Fault Isolation (SFI) and Proof-Carrying Code (PCC). A diicult challenge is how to deal with memory accesses within loops. SFI generates run-time bounds checks at every access, which incurs non-negligible overhead in tight loops, while PCC currently requires that the loop be pre-annotated with invariants that specify these bounds. I present a static analysis for automatically determining the bounds of the memory accesses within a loop. Given a loop in either source code (e.g., C) or executable binary, the analysis attempts to generate a symbolic expression for each memory access in the loop that describes its range in terms of the context (e.g., values of variables) before the loop. An operating system can use the results of the analysis in one of two ways: 1] to prove statically that the surrounding context guarantees that these ranges are in safe bounds and then execute the unmodiied code (as in PCC, but now fully automatic); or 2] to insert a guard before the loop entry that will guarantee at run-time that the ranges are in safe bounds (as in SFI, but hoisted outside the loop). The analysis uses symbolic composition of transfer relations and does not require a xed-point calculation. I demonstrate my analysis on DEC Alpha assembly code for Internet Checksum and Standard ML code for TCP/IP byte copy.
منابع مشابه
Compositional abstraction and safety synthesis using overlapping symbolic models
In this paper, we develop a compositional approach to abstraction and safety synthesis for a general class of discrete time nonlinear systems. Our approach makes it possible to define a symbolic abstraction by composing a set of symbolic subsystems that are overlapping in the sense that they can share some common state variables. We develop compositional safety synthesis techniques using such o...
متن کاملSymbolic simulation: theory and application to protocol modeling and validation
We present a novel technique called symbolic simulation , and its application to protocol modeling and validation. Whereas simulation produces a trace of the behavior of a system for certain xed parameter values, symbolic simulation allows one to simulate the behavior of a system for entire ranges of parameter values. This in turn allows veriication of certain properties of the system behavior ...
متن کاملRunning head: INFERRED THREAT AND SAFETY Inferred Threat and Safety: Symbolic Generalization of Human Avoidance Learning
Symbolic generalization of avoidance may underlie the etiology and maintenance of anxiety disorders. The aim of the present study was to demonstrate inferred threat-avoidance and safety (non-avoidance) behaviours that occur in the presence of stimuli indirectly related to learned threat and safety cues. A laboratory experiment was conducted involving two symbolic stimulus equivalence relations ...
متن کاملSymbolic Model Checking of Finite Precision Timed Automata
Introduction Correctness of safety-critical real-time systems Formalizing the real-time system and its properties Verifying the properties of the system Safety properties Bounded liveness properties. .. the model of the system the formula of the property Model Checker Symbolic Model Checking of Finite Precision Timed Automata – p. 3/2
متن کاملPoster: Symbolic Control of Monotone Systems Application to Ventilation Regulation in Buildings
We describe an application of symbolic control to ventilation regulation in buildings. The monotonicity property of a nonlinear control system subject to disturbances, modeling the process, is exploited to obtain symbolic abstractions, in the sense of alternating simulation. The resulting abstractions consist of non-deterministic finite transition systems, for which we can synthesize supervisor...
متن کاملInferred threat and safety: symbolic generalization of human avoidance learning.
Symbolic generalization of avoidance may underlie the aetiology and maintenance of anxiety disorders. The aim of the present study was to demonstrate inferred threat-avoidance and safety (non-avoidance) behaviours that occur in the presence of stimuli indirectly related to learned threat and safety cues. A laboratory experiment was conducted involving two symbolic stimulus equivalence relations...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997