Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Micro-Policies - Formally Verified, Tag-Based Security Monitors

IEEE via YouTube

Overview

Explore a 22-minute IEEE conference talk on formally verified, tag-based security monitors called micro-policies. Delve into a methodology for defining and reasoning about tag-based reference monitors using a high-level "symbolic machine." Examine the implementation of micro-policies for dynamic sealing, compartmentalization, control-flow integrity, and memory safety. Learn how the tagging mechanism can protect its own integrity. Discover how the symbolic machine is implemented using a hardware rule cache and software controller. Gain insights into the refinement proofs that demonstrate how the symbolic machine embodies high-level security property specifications.

Syllabus

Micro-Policies: Formally Verified, Tag-Based Security Monitors

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Micro-Policies - Formally Verified, Tag-Based Security Monitors

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.