N. Jomaa, P. Torrini, David Nowak, G. Grimaud, Samuel Hym
{"title":"Proof-Oriented Design of a Separation Kernel with Minimal Trusted Computing Base","authors":"N. Jomaa, P. Torrini, David Nowak, G. Grimaud, Samuel Hym","doi":"10.14279/TUJ.ECEASST.76.1080","DOIUrl":null,"url":null,"abstract":"The development of provably secure OS kernels represents a fundamental \nstep in the creation of safe and secure systems. To this aim, we propose the \nnotion of protokernel and an implementation --- the Pip protokernel --- as a \nseparation kernel whose trusted computing base is reduced to its bare bones, \nessentially providing separation of tasks in memory, on top of which \nnon-influence can be proved. This proof-oriented design allows us to \nformally prove separation properties on a concrete executable model very \nclose to its automatically extracted C implementation. Our design is shown \nto be realistic as it can execute isolated instances of a real-time embedded \nsystem that has moreover been modified to isolate its own processes through \nthe Pip services.","PeriodicalId":115235,"journal":{"name":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","volume":"461 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14279/TUJ.ECEASST.76.1080","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
The development of provably secure OS kernels represents a fundamental
step in the creation of safe and secure systems. To this aim, we propose the
notion of protokernel and an implementation --- the Pip protokernel --- as a
separation kernel whose trusted computing base is reduced to its bare bones,
essentially providing separation of tasks in memory, on top of which
non-influence can be proved. This proof-oriented design allows us to
formally prove separation properties on a concrete executable model very
close to its automatically extracted C implementation. Our design is shown
to be realistic as it can execute isolated instances of a real-time embedded
system that has moreover been modified to isolate its own processes through
the Pip services.