Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SP.2015.55guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Micro-Policies: Formally Verified, Tag-Based Security Monitors

Published: 17 May 2015 Publication History

Abstract

Recent advances in hardware design have demonstrated mechanisms allowing a wide range of low-level security policies (or micro-policies) to be expressed using rules on metadata tags. We propose a methodology for defining and reasoning about such tag-based reference monitors in terms of a high-level "symbolic machine" and we use this methodology to define and formally verify micro-policies for dynamic sealing, compartmentalization, control-flow integrity, and memory safety, in addition, we show how to use the tagging mechanism to protect its own integrity. For each micro-policy, we prove by refinement that the symbolic machine instantiated with the policy's rules embodies a high-level specification characterizing a useful security property. Last, we show how the symbolic machine itself can be implemented in terms of a hardware rule cache and a software controller.

Cited By

View all
  • (2023)MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe CodeProceedings of the ACM on Programming Languages10.1145/35712087:POPL(425-454)Online publication date: 11-Jan-2023
  • (2023)Survey of Approaches and Techniques for Security Verification of Computer SystemsACM Journal on Emerging Technologies in Computing Systems10.1145/356478519:1(1-34)Online publication date: 19-Jan-2023
  • (2022)Le temps des cerises: efficient temporal stack safety on capability machines using directed capabilitiesProceedings of the ACM on Programming Languages10.1145/35273186:OOPSLA1(1-30)Online publication date: 29-Apr-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '15: Proceedings of the 2015 IEEE Symposium on Security and Privacy
May 2015
923 pages
ISBN:9781467369497

Publisher

IEEE Computer Society

United States

Publication History

Published: 17 May 2015

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2023)MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe CodeProceedings of the ACM on Programming Languages10.1145/35712087:POPL(425-454)Online publication date: 11-Jan-2023
  • (2023)Survey of Approaches and Techniques for Security Verification of Computer SystemsACM Journal on Emerging Technologies in Computing Systems10.1145/356478519:1(1-34)Online publication date: 19-Jan-2023
  • (2022)Le temps des cerises: efficient temporal stack safety on capability machines using directed capabilitiesProceedings of the ACM on Programming Languages10.1145/35273186:OOPSLA1(1-30)Online publication date: 29-Apr-2022
  • (2021)FlexFilt: Towards Flexible Instruction Filtering for SecurityProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3488019(646-659)Online publication date: 6-Dec-2021
  • (2021)Keeping Safe Rust Safe with GaleedProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3485903(824-836)Online publication date: 6-Dec-2021
  • (2021)SCALPEL: Exploring the Limits of Tag-enforced CompartmentalizationACM Journal on Emerging Technologies in Computing Systems10.1145/346167318:1(1-28)Online publication date: 29-Sep-2021
  • (2021)Towards formally verified compilation of tag-based policy enforcementProceedings of the 10th ACM SIGPLAN International Conference on Certified Programs and Proofs10.1145/3437992.3439929(137-151)Online publication date: 17-Jan-2021
  • (2019)The high-level benefits of low-level sandboxingProceedings of the ACM on Programming Languages10.1145/33711004:POPL(1-32)Online publication date: 20-Dec-2019
  • (2019)Linear capabilities for fully abstract compilation of separation-logic-verified codeProceedings of the ACM on Programming Languages10.1145/33416883:ICFP(1-29)Online publication date: 26-Jul-2019
  • (2018)When Good Components Go BadProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243745(1351-1368)Online publication date: 15-Oct-2018
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media