English
 
Help Privacy Policy Disclaimer
  Advanced SearchBrowse

Item

ITEM ACTIONSEXPORT
 
 
DownloadE-Mail
  A Formal Model for Capability Machines An Illustrative Case Study towards Secure Compilation to CHERI

El-Korashy, A. (2016). A Formal Model for Capability Machines An Illustrative Case Study towards Secure Compilation to CHERI. Master Thesis, Universität des Saarlandes, Saarbrücken.

Item is

Files

show Files
hide Files
:
2016_Akram El-Korashy_MSc Thesis.pdf (Any fulltext), 927KB
 
File Permalink:
-
Name:
2016_Akram El-Korashy_MSc Thesis.pdf
Description:
-
OA-Status:
Visibility:
Restricted (Max Planck Institute for Informatics, MSIN; )
MIME-Type / Checksum:
application/pdf
Technical Metadata:
Copyright Date:
-
Copyright Info:
-
License:
-

Locators

show

Creators

show
hide
 Creators:
El-Korashy, Akram1, Author
Patrignani, Marco2, Advisor
Garg, Deepak2, Referee           
Reineke, Jan3, Referee
Affiliations:
1International Max Planck Research School, MPI for Informatics, Max Planck Society, Campus E1 4, 66123 Saarbrücken, DE, ou_1116551              
2Max Planck Institute for Software Systems, Max Planck Society, Campus E1 5, 66123 Saarbrücken, DE, ou_2105284              
3Universität des Saarlandes, Campus E1 3, 66123 Saarbrücken, DE, ou_persistent22              

Content

show
hide
Free keywords: -
 Abstract: Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part also due to programmer's false (i.e., over-optimistic) expectations about the guarantees that are given by the abstractions of a programming language. For the latter kind of vulnerabilities, architectures with hardware or instructionlevel support for protection mechanisms can be useful. One trend in computer systems protection is hardware-supported enforcement of security guarantees/policies. Capability-based machines are one instance of hardware-based protection mechanisms. CHERI is a recent implementation of a 64-bit MIPS-based capability architecture with byte-granularity memory protection. The goal of this thesis is to provide a paper formal model of the CHERI architecture with the aim of formal reasoning about the security guarantees that can be offered by the features of CHERI. We first give simplified instruction operational semantics, then we prove that capabilities are unforgeable in our model. Second, we show that existing techniques for enforcing control-flow integrity can be adapted to the CHERI ISA. Third, we show that one notion of memory compartmentalization can be achieved with the help of CHERI's memory protection. We conclude by suggesting other security building blocks that would be helpful to reason about, and laying down a plan for potentially using this work for building a secure compiler, i.e., a compiler that preserves security properties. The outlook and motivation for this work is to highlight the potential of using CHERI as a target architecture for secure compilation.

Details

show
hide
Language(s): eng - English
 Dates: 2016-09-272016
 Publication Status: Issued
 Pages: 89 p.
 Publishing info: Saarbrücken : Universität des Saarlandes
 Table of Contents: -
 Rev. Type: -
 Identifiers: BibTex Citekey: El-KorashyMaster2016
 Degree: Master

Event

show

Legal Case

show

Project information

show

Source

show