Authors
Toby Murray, Daniel Matichuk, Matthew Brassil, Peter Gammie, Timothy Bourke, Sean Seefried, Corey Lewis, Xin Gao, Gerwin Klein
Publication date
2013/5/19
Conference
2013 IEEE Symposium on Security and Privacy
Pages
415-429
Publisher
IEEE
Description
In contrast to testing, mathematical reasoning and formal verification can show the absence of whole classes of security vulnerabilities. We present the, to our knowledge, first complete, formal, machine-checked verification of information flow security for the implementation of a general-purpose microkernel; namely seL4. Unlike previous proofs of information flow security for operating system kernels, ours applies to the actual 8, 830 lines of C code that implement seL4, and so rules out the possibility of invalidation by implementation errors in this code. We assume correctness of compiler, assembly code, hardware, and boot code. We prove everything else. This proof is strong evidence of seL4's utility as a separation kernel, and describes precisely how the general purpose kernel should be configured to enforce isolation and mandatory information flow control. We describe the information flow security statement we …
Total citations
20122013201420152016201720182019202020212022202320241122121414031231822232113
Scholar articles
T Murray, D Matichuk, M Brassil, P Gammie, T Bourke… - 2013 IEEE Symposium on Security and Privacy, 2013