2014
DOI: 10.1007/978-3-319-13338-6_18
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification of Secure User Mode Device Execution with DMA

Abstract: Abstract. Separation between processes on top of an operating system or between guests in a virtualized environment is essential for establishing security on modern platforms. A key requirement of the underlying hardware is the ability to support multiple partitions executing on the shared hardware without undue interference. For modern processor architectures -with hardware support for memory management, several modes of operation and I/O interfaces -this is a delicate issue requiring deep analysis at both in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…The MMU virtualization approach does not support DMA. To securely enable DMA the behaviour of the specific DMA controller must be formally modelled (in [43] the authors describe a framework for such extensions and establish Properties 1 and 2 for the resulting model) and the hypervisor must (i) mediate all accesses to the memory area where the controller's registers are mapped, (ii) enable a DMA channel only if the pointed physical blocks is data and (iii) update the reference counters accordingly. Several embedded platforms are equipped with IOMMUs, that provide HW support to isolate/confine external peripherals that use DMA.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The MMU virtualization approach does not support DMA. To securely enable DMA the behaviour of the specific DMA controller must be formally modelled (in [43] the authors describe a framework for such extensions and establish Properties 1 and 2 for the resulting model) and the hypervisor must (i) mediate all accesses to the memory area where the controller's registers are mapped, (ii) enable a DMA channel only if the pointed physical blocks is data and (iii) update the reference counters accordingly. Several embedded platforms are equipped with IOMMUs, that provide HW support to isolate/confine external peripherals that use DMA.…”
Section: Discussionmentioning
confidence: 99%
“…This is so since the ARMv7 step theorems used by the lifter are defined only for predictable instructions, and since our invariant guarantees that the MMU configuration is always well defined. As a result unpredictable behaviour can arise only during non-privileged execution, the analysis of which we have in effect deferred to other work [43].…”
Section: Discussionmentioning
confidence: 99%
“…For security, the main concern is the preservation of memory isolation in the presence of DMA devices [13]. Kernel verification has been studied both for settings with IOMMUs [21,26,54] and for peripherals configured to comply with constrained access policies [46]. Finally, kernel code is not the only code executing on the system's processors.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, 108 exploitable bugs had been discovered, indicating that Model Checking could be a feasible and integral part of software development process. It is possible to develop models of incorrect and insecure program behavior that were precise enough to prevent false positives from dwarfing the real bugs [6].…”
Section: Related Workmentioning
confidence: 99%