Proving Confidentiality and Its Preservation for Mixed-Sensitivity Concurrent Programs
University of Melbourne via YouTube
Overview
Syllabus
Intro
Confidentiality in the face of scale The desk islava
Motivating use case
3 key challenges
A mixed-sensitivity concurrent program CDDC'S HID switch as software components
Program verification: Prior work
Program verification: My work
Compiler verification: Prior work
Compiler verification: My work
Case study
Dangers of conditional branching on secrets Implicit flow 1:"storage" leak
Does your OS really enforce confidentiality?
How to verify an OS enforces time protection?
So far: Generic OS security model for time protection . Modelled new requirements on
Currently: Challenges for integration into seL4 proofs
Taught by
The University of Melbourne