N. Jomaa, P. Torrini, David Nowak, G. Grimaud, Samuel Hym
{"title":"基于最小可信计算基础的分离核的面向证明设计","authors":"N. Jomaa, P. Torrini, David Nowak, G. Grimaud, Samuel Hym","doi":"10.14279/TUJ.ECEASST.76.1080","DOIUrl":null,"url":null,"abstract":"The development of provably secure OS kernels represents a fundamental \nstep in the creation of safe and secure systems. To this aim, we propose the \nnotion of protokernel and an implementation --- the Pip protokernel --- as a \nseparation kernel whose trusted computing base is reduced to its bare bones, \nessentially providing separation of tasks in memory, on top of which \nnon-influence can be proved. This proof-oriented design allows us to \nformally prove separation properties on a concrete executable model very \nclose to its automatically extracted C implementation. Our design is shown \nto be realistic as it can execute isolated instances of a real-time embedded \nsystem that has moreover been modified to isolate its own processes through \nthe Pip services.","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"461 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Proof-Oriented Design of a Separation Kernel with Minimal Trusted Computing Base\",\"authors\":\"N. Jomaa, P. Torrini, David Nowak, G. Grimaud, Samuel Hym\",\"doi\":\"10.14279/TUJ.ECEASST.76.1080\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The development of provably secure OS kernels represents a fundamental \\nstep in the creation of safe and secure systems. To this aim, we propose the \\nnotion of protokernel and an implementation --- the Pip protokernel --- as a \\nseparation kernel whose trusted computing base is reduced to its bare bones, \\nessentially providing separation of tasks in memory, on top of which \\nnon-influence can be proved. This proof-oriented design allows us to \\nformally prove separation properties on a concrete executable model very \\nclose to its automatically extracted C implementation. Our design is shown \\nto be realistic as it can execute isolated instances of a real-time embedded \\nsystem that has moreover been modified to isolate its own processes through \\nthe Pip services.\",\"PeriodicalId\":115235,\"journal\":{\"name\":\"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.\",\"volume\":\"461 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14279/TUJ.ECEASST.76.1080\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14279/TUJ.ECEASST.76.1080","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proof-Oriented Design of a Separation Kernel with Minimal Trusted Computing Base
The development of provably secure OS kernels represents a fundamental
step in the creation of safe and secure systems. To this aim, we propose the
notion of protokernel and an implementation --- the Pip protokernel --- as a
separation kernel whose trusted computing base is reduced to its bare bones,
essentially providing separation of tasks in memory, on top of which
non-influence can be proved. This proof-oriented design allows us to
formally prove separation properties on a concrete executable model very
close to its automatically extracted C implementation. Our design is shown
to be realistic as it can execute isolated instances of a real-time embedded
system that has moreover been modified to isolate its own processes through
the Pip services.