A Formal Model for Capability Machines An Illustrative Case Study towards Secure Compilation to CHERI
نویسندگان
چکیده
Vulnerabilities in computer systems arise in part due to programmer’s logical errors, and in part also due to programmer’s false (i.e., over-optimistic) expectations about the guarantees that are given by the abstractions of a programming language. For the latter kind of vulnerabilities, architectures with hardware or instructionlevel support for protection mechanisms can be useful. One trend in computer systems protection is hardware-supported enforcement of security guarantees/policies. Capabilitybased machines are one instance of hardware-based protection mechanisms. CHERI is a recent implementation of a 64-bit MIPS-based capability architecture with bytegranularity memory protection. The goal of this thesis is to provide a paper formal model of the CHERI architecture with the aim of formal reasoning about the security guarantees that can be offered by the features of CHERI. We first give simplified instruction operational semantics, then we prove that capabilities are unforgeable in our model. Second, we show that existing techniques for enforcing control-flow integrity can be adapted to the CHERI ISA. Third, we show that one notion of memory compartmentalization can be achieved with the help of CHERI’s memory protection. We conclude by suggesting other security building blocks that would be helpful to reason about, and laying down a plan for potentially using this work for building a secure compiler, i.e., a compiler that preserves security properties. The outlook and motivation for this work is to highlight the potential of using CHERI as a target architecture for secure compilation.
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملTowards Safe and Secure Organic Computing Applications
In this paper we present our ongoing work on “Organic Computing”. We present an illustrative case study from program automation that uses OC-paradigms to be failure tolerant and to produce effectively. We present a way to build and verify a formal model of a self-adaptive system. We also give further ideas for formal modeling and our ideas of safety analysis of such systems. Another topic is ho...
متن کاملCapability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture
This document describes the rapidly maturing design for the Capability Hardware Enhanced RISC Instructions (CHERI) Instruction-Set Architecture (ISA), which is being developed by SRI International and the University of Cambridge. The document is intended to capture our evolving architecture, as it is being refined, tested, and formally analyzed. We have now reached 70% of the time for our resea...
متن کاملCompilation a Model for Reporting Effectiveness for Stakeholders (Case Study in the Superum Audit Court)
Developing a Reporting Effectiveness Model for Stakeholders (Case Study in the Superum Audit Court) Abstract: The Court of Auditors' reports are an independent and rational assessment of the environment in the public sector and strive to enhance the value of government agencies through legislation and guidance to improve performance. The purpose of the present study is to conceptualize and ext...
متن کاملFormal Validation of Software for Secure Systems
This paper presents the work currently conducted in the \DS 3 " project 1 which is concerned with the integration and formal validation of oo-the-shelf components in secure systems. It explores two alternate approaches: a top-down approach of encapsulating application components into interoperating controlled modules and checks their assembly; and a bottom-up approach which checks the absence o...
متن کامل