SECURIFY: A COMPOSITIONAL APPROACH OF BUILDING SECURITY VERIFIED SYSTEM
1
SECURIFY: A COMPOSITIONAL APPROACH OF BUILDING SECURITY VERIFIED - - PowerPoint PPT Presentation
1 SECURIFY: A COMPOSITIONAL APPROACH OF BUILDING SECURITY VERIFIED SYSTEM Liu Yang, Associate Professor, NTU SG-CRC 2018 28 March 2018 2 Securify Approach Compositional Security Securify Architecture Reasoning with Untrusted Components
1
2
OS / Micro Kernel Applications Libraries Hardware Hardware-aided Dynamic Security Analysis
Secure Micro- Kernel Verification Automatic Program Verification Model-based Secure Code Generation Security- Enhanced Library Verification Runtime Security Verification Hardware Verification
Compositional Security Reasoning with Untrusted Components
Securify Architecture
3
4
High Assurance Systems Internet of Things Embedded Systems
Smart Home Aerospace Medical Devices Smart Nation ITS Defense Communication Devices Banking Devices
Fault Contemption Attack Isolation Foundational Secure Architecture Dynamic Monitoring Isolated Critical back- ends from Non-secure Front-ends
5
Current Non-secure Architecture Proposed Secure Architecture HW Linux (Monolithic Kernel)
Processes
Call to Buggy System/Library
HW Separation Micro-Kernel
Necessary and Sufficient set of verified services providing Spatial and temporal isolation
Security Monitor
Runtime monitor for dynamic security
Processes
Truly Isolated
Functional and memory safety correctness using safe code generation from specification
6
HW Verified Separation Micro-Kernel
Necessary and Sufficient set of verified services providing Spatial and temporal isolation
Illegal System Call Legal System Call
Security Monitor
Runtime monitor for dynamic security
Verified Kernel Interface
Scheduling Actions Communication Actions Process Actions
7
CAN BUS
Brake ECU Steering ECU Acceleration ECU
Self-Driving System User Interface Linux
GPS Driver CAN adaptor Driver Camera Driver WiFi Driver Bluetooth Driver
8
CAN BUS
Brake ECU Steering ECU Acceleration ECU
Self-Driving System Vulnerable User Interface Linux
GPS Driver CAN adaptor Driver Camera Driver WiFi Driver Bluetooth Driver
CAN BUS easily accessible AV easy to hijack!!!
9
Separation Micro-Kernel CAN BUS
Brake ECU Steering ECU Acceleration ECU
CAN adaptor Driver
Self-Driving System
Camera Driver WiFi Driver Bluetooth Driver GPS Driver
Malicius User Interface Security Monitor
Isolated Components
do not have access to other domains
10
Separation Micro-Kernel CAN BUS
Brake ECU Steering ECU Acceleration ECU
CAN adaptor Driver
Self-Driving System
Camera Driver WiFi Driver Bluetooth Driver GPS Driver
Malicius User Interface Security Monitor
Verified Micro Kernel ensures that there are no kernel exploits able to affect the information flow.
11
Separation Micro-Kernel CAN BUS
Brake ECU Steering ECU Acceleration ECU
CAN adaptor Driver
Self-Driving System
Camera Driver WiFi Driver Bluetooth Driver GPS Driver
Malicius User Interface Security Monitor
Indirect access can be controlled:
communication in the channel
can control the information sent between domains
12
verified secure Separation kernel and run-time monitoring for dynamic security.
assurance systems.
time monitor.
architecture for IoT devices and IST, which naturally fixes most
13