Is Formal Verification of seL4 Adequate to Address the Key Security Challenges of Kernel Design?

被引:0
|
作者
Siapoush, Mina Soltani [1 ]
Alves-Foss, Jim [1 ]
机构
[1] Univ Idaho, Ctr Secure & Dependable Syst CSDS, Moscow, ID 83844 USA
关键词
Microkernel; seL4; formal methods; correctness verification; OPERATING SYSTEM; MODELS;
D O I
10.1109/ACCESS.2023.3316031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Formal method tools are used in the initial stages of the software development cycle and have advanced to deal with the design difficulties related to ensuring strong cybersecurity and reliability in high-assurance systems. Operating system kernels are the security keystone of most computer systems. Their continuous advances require formal verification that guarantees the accuracy of their functionalities. As the world's first microkernel to be proven mathematically secure and functionally correct, seL4 has been adopted for use in a range of critical systems, including defense, aerospace, and financial services applications. In spite of the great effort of the seL4 team to present a comprehensive formal verification of the kernels, there are some security aspects of verification that suffer from a limited scope. From an outsider's perspective, this paper aims to evaluate if seL4 formal verification is adequate to address security requirements and surveys the recent state of the art for seL4 microkernels.
引用
收藏
页码:101750 / 101759
页数:10
相关论文
共 26 条
  • [21] Application of the XTT rule-based model for formal design and verification of internet security systems
    Nalepa, Grzegorz J.
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2007, 4680 : 81 - +
  • [22] Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4
    Scurtu, Andreea
    Pura, Mihai-Lica
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2019), 2019,
  • [23] A Formal Approach to Design and Security Verification of Operating Systems for Intelligent Transportation Systems Based on Object Model
    Qian, Zhenjiang
    Zhong, Shan
    Sun, Gaofei
    Xing, Xiaoshuang
    Jin, Yong
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (12) : 15459 - 15467
  • [24] Harnessing the sun's powerHybrid photosynthesis might become a key technology to address the energy crisis and food security challenges
    Philip Hunter
    The EMBO Reports, 2022, 23 (11):
  • [25] Security Enhancement of Handover Key Management Based on Media Access Control Address in 4G LTE Networks
    Krishnamoorthy, Vidya
    Mathi, Senthilkumar
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 868 - 872
  • [26] 4-4 the design and application of a mimetic network environment construction system: Security verification environment building system and contribution to human resource development
    Yasuda, Shingo
    Journal of the National Institute of Information and Communications Technology, 2016, 63 (02): : 93 - 101