Rely-guarantee Reasoning about Concurrent Memory Management:
Correctness, Safety and Security
- URL: http://arxiv.org/abs/2309.09997v1
- Date: Sun, 17 Sep 2023 03:41:10 GMT
- Title: Rely-guarantee Reasoning about Concurrent Memory Management:
Correctness, Safety and Security
- Authors: Yongwang Zhao, David Sanan
- Abstract summary: An incorrect specification and implementation of the memory management may lead to system crashes or exploitable attacks.
This article presents the first formal specification and mechanized proof of a concurrent memory management for a real-world OS.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Formal verification of concurrent operating systems (OSs) is challenging, in
particular the verification of the dynamic memory management due to its complex
data structures and allocation algorithm. An incorrect specification and
implementation of the memory management may lead to system crashes or
exploitable attacks. This article presents the first formal specification and
mechanized proof of a concurrent memory management for a real-world OS
concerning a comprehensive set of properties, including functional correctness,
safety and security. To achieve the highest assurance evaluation level, we
develop a fine-grained formal specification of the Zephyr RTOS buddy memory
management, which closely follows the C code easing validation of the
specification and the source code. The rely-guarantee-based compositional
verification technique has been enforced over the formal model. To support
formal verification of the security property, we extend our rely-guarantee
framework PiCore by a compositional reasoning approach for integrity. Whilst
the security verification of the design shows that it preserves the integrity
property, the verification of the functional properties shows several problems.
These verification issues are translated into finding three bugs in the C
implementation of Zephyr, after inspecting the source code corresponding to the
design lines breaking the properties.
Related papers
- Formal Verification of Permission Voucher [1.4732811715354452]
The Permission Voucher Protocol is a system designed for secure and authenticated access control in distributed environments.
The analysis employs the Tamarin Prover, a state-of-the-art tool for symbolic verification, to evaluate key security properties.
Results confirm the protocol's robustness against common attacks such as message tampering, impersonation, and replay.
arXiv Detail & Related papers (2024-12-18T14:11:50Z) - VeriCHERI: Exhaustive Formal Security Verification of CHERI at the RTL [4.652188875442064]
CHERI provides and enforces fine-grained memory protection directly in the hardware.
VeriCHERI is conceptionally different from previous works in that it does not require any ISA specification.
We demonstrate the effectiveness and scalability of VeriCHERI on a RISC-V based processor implementing a CHERI variant.
arXiv Detail & Related papers (2024-07-26T11:48:55Z) - Rely-guarantee Reasoning about Concurrent Reactive Systems: The PiCore
Framework, Languages Integration and Applications [0.0]
This article proposes PiCore, a rely-guarantee reasoning framework for formal specification and verification of CRSs.
We design an event specification language supporting complex reaction structures and its rely-guarantee proof system to detach the specification and logic of reactive aspects of CRSs from event behaviours.
By this design, we have successfully integrated two existing languages and their rely-guarantee proof systems without any change of their specification and proofs.
arXiv Detail & Related papers (2023-09-17T03:43:25Z) - Towards Formal Verification of a TPM Software Stack [0.5074812070492739]
This paper describes a case study on formal verification of tpm2-tss using the Frama-C verification platform.
Heavily based on linked lists and complex data structures, the library code appears to be highly challenging for the verification tool.
arXiv Detail & Related papers (2023-07-31T16:35:16Z) - A Novel Approach to Identify Security Controls in Source Code [4.598579706242066]
This paper enumerates a comprehensive list of commonly used security controls and creates a dataset for each one of them.
It uses the state-of-the-art NLP technique Bidirectional Representations from Transformers (BERT) and the Tactic Detector from our prior work to show that security controls could be identified with high confidence.
arXiv Detail & Related papers (2023-07-10T21:14:39Z) - Online Safety Property Collection and Refinement for Safe Deep
Reinforcement Learning in Mapless Navigation [79.89605349842569]
We introduce the Collection and Refinement of Online Properties (CROP) framework to design properties at training time.
CROP employs a cost signal to identify unsafe interactions and use them to shape safety properties.
We evaluate our approach in several robotic mapless navigation tasks and demonstrate that the violation metric computed with CROP allows higher returns and lower violations over previous Safe DRL approaches.
arXiv Detail & Related papers (2023-02-13T21:19:36Z) - Recursively Feasible Probabilistic Safe Online Learning with Control Barrier Functions [60.26921219698514]
We introduce a model-uncertainty-aware reformulation of CBF-based safety-critical controllers.
We then present the pointwise feasibility conditions of the resulting safety controller.
We use these conditions to devise an event-triggered online data collection strategy.
arXiv Detail & Related papers (2022-08-23T05:02:09Z) - Conformance Checking with Uncertainty via SMT (Extended Version) [66.58864135810981]
We show how to solve the problem of checking conformance of uncertain logs against data-aware reference processes.
Our approach is modular, in that it homogeneously accommodates for different types of uncertainty.
We show the correctness of our approach and witness feasibility through a proof-of-concept implementation.
arXiv Detail & Related papers (2022-06-15T11:39:45Z) - Joint Differentiable Optimization and Verification for Certified
Reinforcement Learning [91.93635157885055]
In model-based reinforcement learning for safety-critical control systems, it is important to formally certify system properties.
We propose a framework that jointly conducts reinforcement learning and formal verification.
arXiv Detail & Related papers (2022-01-28T16:53:56Z) - Learning Robust Output Control Barrier Functions from Safe Expert Demonstrations [50.37808220291108]
This paper addresses learning safe output feedback control laws from partial observations of expert demonstrations.
We first propose robust output control barrier functions (ROCBFs) as a means to guarantee safety.
We then formulate an optimization problem to learn ROCBFs from expert demonstrations that exhibit safe system behavior.
arXiv Detail & Related papers (2021-11-18T23:21:00Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.