Provable Security: how feasible is it?

  • Authors:
  • Gerwin Klein;Toby Murray;Peter Gammie;Thomas Sewell;Simon Winwood

  • Affiliations:
  • NICTA and University of New South Wales, Sydney, Australia;NICTA and University of New South Wales, Sydney, Australia;NICTA and University of New South Wales, Sydney, Australia;NICTA and University of New South Wales, Sydney, Australia;NICTA and University of New South Wales, Sydney, Australia

  • Venue:
  • HotOS'13 Proceedings of the 13th USENIX conference on Hot topics in operating systems
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Strong, machine-checked security proofs of operating systems have been in the too hard basket long enough. They will still be too hard for large mainstream operating systems, but even for systems designed from the ground up for security they have been counted as infeasible. There are high-level formal models, nice security properties, ways of architecting and engineering secure systems, but no implementation level proofs yet, not even with the recent verification of the seL4 microkernel. This needs to change.