Главная
Study mode:
on
1
Microsoft: 70% of patched vulnerabilities are memory safety issues
2
Two fundamental problems
3
Rigorous engineering for hardware security
4
CHERI: hardware support for capabilities
5
Versions of CHERI
6
Fine-grained memory protection
7
Capability manipulations
8
Scalable software compartmentalisation
9
Protection domain transitions
10
A prose architecture description
11
A formal architecture model
12
The formal specification of Cload
13
Prose security properties
14
Formal security properties
15
Mapping instructions to abstract actions
16
Property about storing data
17
Monotonicity of reachable capabilities
18
Memory isolation between compartments
19
Conclusion
Description:
Explore the rigorous engineering methods applied to develop a security-enhanced processor architecture in this IEEE conference talk. Delve into the use of formal models for the complete instruction-set architecture (ISA) in the design and engineering process of CHERI, a hardware capability-based architecture supporting fine-grained memory protection and scalable secure compartmentalization. Learn about the formalization of key security properties and their verification through mechanized proof. Discover how these methods have been integral to CHERI's development, enabling rapid experimentation and increasing confidence in the design. Gain insights into the potential adoption of CHERI in mass-market commercial processors and its implications for addressing memory safety issues in computing.

Formal Modelling and Proof in the CHERI Design and Implementation Process

IEEE
Add to list