2014 IEEE 27th Computer Security Foundations Symposium 2014
DOI: 10.1109/csf.2014.10
|View full text |Cite
|
Sign up to set email alerts
|

Portable Software Fault Isolation

Abstract: We present a new technique for architecture portable software fault isolation (SFI), together with a prototype implementation in the Coq proof assistant. Unlike traditional SFI, which relies on analysis of assembly-level programs, we analyze and rewrite programs in a compiler intermediate language, the Cminor language of the CompCert C compiler. But like traditional SFI, the compiler remains outside of the trusted computing base. By composing our program transformer with the verified back-end of CompCert and l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 36 publications
0
19
0
Order By: Relevance
“…A semantically equivalent but syntactically different code sequence would be rejected. An alternative to the a posteriori binary verifier approach is Portable Software Fault Isolation (PSFI), proposed by Kroll et al [16]. In this methodology, there is no verifier to trust.…”
Section: Software Fault Isolation Through Compilationmentioning
confidence: 99%
See 1 more Smart Citation
“…A semantically equivalent but syntactically different code sequence would be rejected. An alternative to the a posteriori binary verifier approach is Portable Software Fault Isolation (PSFI), proposed by Kroll et al [16]. In this methodology, there is no verifier to trust.…”
Section: Software Fault Isolation Through Compilationmentioning
confidence: 99%
“…This section presents background information about the CompCert compiler [18] and the Portable Software Fault Isolation proposed by Kroll et al [16].…”
Section: Introductionmentioning
confidence: 99%
“…Verifying correct low-level compartmentalization Recent work focused on formally verifying the correctness of lowlevel compartmentalization mechanisms based on software fault isolation [42], [49], [73] or tagged hardware [12]. That work, however, only considers the correctness of the lowlevel compartmentalization mechanism, not the compiler and not high-level security properties and reasoning principles for code written in a programming language with components.…”
Section: Related Workmentioning
confidence: 99%
“…When used as a defense mechanism against memory unsafety, compartmentalization is often achieved via cooperation between a compiler and a low-level compartmentalization mechanism [16], [33], [39], [42], [61], [70], [72]. In this paper we use compartmentalizing compilation to refer to cooperative implementations of this sort.…”
Section: Introductionmentioning
confidence: 99%
“…There are several verified SFI systems, including ARMor [89], RockSalt [63], and a portable one by Kroll et al [54]. Our compartmentalization model is based on Wahbe et al's original SFI work [84] but differs from it in several ways.…”
Section: Compartmentalization Micro-policymentioning
confidence: 99%