2013 IEEE International Conference on Technologies for Homeland Security (HST) 2013
DOI: 10.1109/ths.2013.6699066
|View full text |Cite
|
Sign up to set email alerts
|

SAFE: A clean-slate architecture for secure systems

Abstract: SAFE is a large-scale, clean-slate co-design project encompassing hardware architecture, programming languages, and operating systems. Funded by DARPA, the goal of SAFE is to create a secure computing system from the ground up. SAFE hardware provides memory safety, dynamic type checking, and native support for dynamic information flow control. The Breeze programming language leverages the security features of the underlying machine, and the "zero kernel" operating system avoids relying on any single privileged… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…It was first presented in Hriţcu et al [2016], where it was also proved in Coq to be noninterfering. The register machine contains a plethora of features, originally intended to model an experimental processor architecture [Chiricescu et al 2013], that make generating well-distributed inputs much harder and executing tests much slower. We briefly describe the delta between this machine and the stack machine; for the interested reader, the machine is defined formally in Hriţcu et al…”
Section: The Ifc Register Machinementioning
confidence: 99%
“…It was first presented in Hriţcu et al [2016], where it was also proved in Coq to be noninterfering. The register machine contains a plethora of features, originally intended to model an experimental processor architecture [Chiricescu et al 2013], that make generating well-distributed inputs much harder and executing tests much slower. We briefly describe the delta between this machine and the stack machine; for the interested reader, the machine is defined formally in Hriţcu et al…”
Section: The Ifc Register Machinementioning
confidence: 99%
“…Statistics on the number of lines of code affected by these changes are summarized in Table V: a negligible impact on the overall kernel of roughly 12.6M lines. Similar changes would likely allow FreeBSD to support other tagged-memory security models, such as those in the CRASH-SAFE design [14].…”
Section: Cheribsd Kernelmentioning
confidence: 99%
“…In hardware, Mondriaan investigated an access-control-centered approach based on a TLB/MMU page-table-like mechanism to represent in-addressspace security domains, including running an adaptation of Linux [56]. CRASH-SAFE has more recently explored flexible, software-defined, tagged security models, often grounded in information flow, based on clean-slate ISA approaches [14]. Hypervisors have been used to provide contained execution environments [37], and Dune utilizes hardware virtualization features to accelerate intra-process isolation [6].…”
Section: Related Workmentioning
confidence: 99%
“…Proving security of the high-level specifications is a similar process to proving soundness in other label-aware systems. We could then either treat the labels as purely logical state (like many statically-typed security systems), erasing them with a simulation relation, or we could verify a refinement to a machine like the one used in the SAFE system [2], where labels are actually implemented in the hardware and the physical machine performs dynamic label checks and tainting. Regardless of this choice of label representation, as long as we make sure our simulation relation preserves indistinguishability (as discussed in Section 2), the security of the high-level specifications will automatically give us the whole-execution noninterference property for the low-level machine.…”
Section: A3 Example 3: Security Labels and Dynamic Taintingmentioning
confidence: 99%