Show simple item record

A Machine-Checked Safety Proof for a CISC-Compatible SFI Technique

dc.date.accessioned2006-05-11T19:32:15Z
dc.date.accessioned2018-11-24T10:24:50Z
dc.date.available2006-05-11T19:32:15Z
dc.date.available2018-11-24T10:24:50Z
dc.date.issued2006-05-11
dc.identifier.urihttp://hdl.handle.net/1721.1/32546
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/1721.1/32546
dc.description.abstractExecuting untrusted code while preserving security requires that thecode be prevented from modifying memory or executing instructionsexcept as explicitly allowed. Software-based fault isolation (SFI) or"sandboxing" enforces such a policy by rewriting code at theinstruction level. In previous work, we developed a new SFI techniquethat is applicable to CISC architectures such as the Intel IA-32,based on enforcing additional alignment constraints to avoiddifficulties with variable-length instructions. This report describesa machine-checked proof we developed to increase our confidence in thesafety provided by the technique. The proof, constructed for asimplified model of the technique using the ACL2 theorem provingenvironment, certifies that if the code rewriting has been checked tohave been performed correctly, the resulting program cannot perform adangerous operation when run. We describe the high-level structure ofthe proof, then give the intermediate lemmas with interspersedcommentary, and finally evaluate the process of the proof'sconstruction.
dc.format.extent33 p.
dc.format.extent499398 bytes
dc.format.extent1456845 bytes
dc.language.isoen_US
dc.titleA Machine-Checked Safety Proof for a CISC-Compatible SFI Technique


Files in this item

FilesSizeFormatView
MIT-CSAIL-TR-2006-035.pdf499.3Kbapplication/pdfView/Open
MIT-CSAIL-TR-2006-035.ps1.456Mbapplication/postscriptView/Open

This item appears in the following Collection(s)

Show simple item record