Confidentiality in the face of scale The desk islava
3
Motivating use case
4
3 key challenges
5
A mixed-sensitivity concurrent program CDDC'S HID switch as software components
6
Program verification: Prior work
7
Program verification: My work
8
Compiler verification: Prior work
9
Compiler verification: My work
10
Case study
11
Dangers of conditional branching on secrets Implicit flow 1:"storage" leak
12
Does your OS really enforce confidentiality?
13
How to verify an OS enforces time protection?
14
So far: Generic OS security model for time protection . Modelled new requirements on
15
Currently: Challenges for integration into seL4 proofs
Description:
Explore the challenges and techniques for proving confidentiality in mixed-sensitivity concurrent programs and its preservation under compilation in this 37-minute seminar by Dr. Robert Sison from the University of Melbourne. Delve into the key contributions of his doctoral dissertation, using the seL4 component-based software design of the Cross Domain Desktop Compositor as a case study. Learn about the ongoing collaboration between CIS and UNSW Sydney addressing microarchitectural side-channel vulnerabilities like Spectre. Discover the complexities of ensuring confidentiality in multi-threaded environments with shared resources, and gain insights into program verification, compiler verification, and the challenges of proving operating system security. Examine topics such as implicit flow leaks, conditional branching on secrets, and the development of a generic OS security model for time protection.
Proving Confidentiality and Its Preservation for Mixed-Sensitivity Concurrent Programs