Formal verification of information flow security for a simple ARM-based separation kernel

67Citations
Citations of this article
69Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A separation kernel simulates a distributed environment using a single physical machine by executing partitions in isolation and appropriately controlling communication among them. We present a formal verification of information flow security for a simple separation kernel for ARMv7. Previous work on information flow kernel security leaves communication to be handled by model-external means, and cannot be used to draw conclusions when there is explicit interaction between partitions. We propose a different approach where communication between partitions is made explicit and the information flow is analyzed in the presence of such a channel. Limiting the kernel functionality as much as meaningfully possible, we accomplish a detailed analysis and verification of the system, proving its correctness at the level of the ARMv7 assembly. As a sanity check we show how the security condition is reduced to noninterference in the special case where no communication takes place. The verification is done in HOL4 taking the Cambridge model of ARM as basis, transferring verification tasks on the actual assembly code to an adaptation of the BAP binary analysis tool developed at CMU. © 2013 ACM.

Cite

CITATION STYLE

APA

Dam, M., Guanciale, R., Khakpour, N., Nemati, H., & Schwarz, O. (2013). Formal verification of information flow security for a simple ARM-based separation kernel. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 223–234). https://doi.org/10.1145/2508859.2516702

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free