2020 IEEE Symposium on Security and Privacy (SP) 2020
DOI: 10.1109/sp40000.2020.00055
|View full text |Cite
|
Sign up to set email alerts
|

Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process

Abstract: The root causes of many security vulnerabilities include a pernicious combination of two problems, often regarded as inescapable aspects of computing. First, the protection mechanisms provided by the mainstream processor architecture and C/C++ language abstractions, dating back to the 1970s and before, provide only coarse-grain virtual-memory-based protection. Second, mainstream system engineering relies almost exclusively on test-and-debug methods, with (at best) prose specifications. These methods have histo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(28 citation statements)
references
References 44 publications
0
28
0
Order By: Relevance
“…References: Malenko2019 [69], Kim2020 [54], Savry2020 [70], Song2015 [56], Menon2017 [59], Liu2018 [61], Ma2019 [57], Weiser2019 [71], Nienhuis2020 [72] process of design, development, testing, and debugging. This methodology can satisfy many areas of the computer industry, but they fundamentally leave a large number of exploitable vulnerabilities, leading to many serious system security problems [72]. Effective memory protection can alleviate many system security vulnerabilities.…”
Section: Memory Protectionmentioning
confidence: 99%
See 3 more Smart Citations
“…References: Malenko2019 [69], Kim2020 [54], Savry2020 [70], Song2015 [56], Menon2017 [59], Liu2018 [61], Ma2019 [57], Weiser2019 [71], Nienhuis2020 [72] process of design, development, testing, and debugging. This methodology can satisfy many areas of the computer industry, but they fundamentally leave a large number of exploitable vulnerabilities, leading to many serious system security problems [72]. Effective memory protection can alleviate many system security vulnerabilities.…”
Section: Memory Protectionmentioning
confidence: 99%
“…Effective memory protection can alleviate many system security vulnerabilities. As summarized in Figure 7, At least three types of memory protection solutions have been proposed: tagged memory [56,57,59,61,71,72], memory isolation [54,69], and memory encryption and authentication [70]. In this chapter, we discuss related research work on these topics.…”
Section: Memory Protectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Capabilities include far richer metadata than traditional raw pointer values, which simply specify a single address, admit pointer arithmetic, and have access permissions set at the coarse granularity of pages. Once a user process acquires a capability value from the OS, the CHERI monotonicity property [9] ensures the capability's bounds cannot be widened and its permissions cannot be upgraded.…”
Section: Introductionmentioning
confidence: 99%