verifiedscion verified secure routing
play

verifiedSCION: Verified Secure Routing Peter Mller Joint work with - PowerPoint PPT Presentation

verifiedSCION: Verified Secure Routing Peter Mller Joint work with the verifiedSCION Team at ETH Security and Correctness Protocol-level properties - Path validity : Constructed paths are valid and reflect the routing decisions by on-path


  1. verifiedSCION: Verified Secure Routing Peter Müller Joint work with the verifiedSCION Team at ETH

  2. Security and Correctness § Protocol-level properties - Path validity : Constructed paths are valid and reflect the routing decisions by on-path ASes - Path authorization : Packets travel only along previously authorized paths - Detectability : An active attacker cannot hide their presence on the path § Code-level properties - Safety : No run-time errors - Correctness : Routers and servers implement protocol correctly - Progress : Required I/O happens eventually - Backdoor freedom : Code does not leak information about crypto keys 2

  3. Formal end-to-end verification of security and correctness

  4. Mathematical model Mathematical model of entire network of border router Refinement Equivalence Verification Router specification Router implementation 4

  5. Protocol Verification Design model Stepwise refinement System: Border router § Prove properties of most abstract model § Each refinement - Incorporates additional system requirements - Preserves properties of more-abstract system Environment: Network § Strategy: strengthen attacker while Attacker increasing security features 5

  6. Program Verification Verified properties ü § No run-time errors § Termination Specification: What is the intended § Functional properties behavior? û § I/O behavior § Progress § Backdoor freedom Program: How is the behavior achieved? 6

  7. Status and Milestones Key results Upcoming milestones § Theory & technology § Q4/19 - Program verification techniques - Basic Go verifier - Integration of protocol and program § Q2/20 verification - Formal model of control plane - Formal model of bandwidth § Proof of concept reservation - Verification of packet forwarding - Verification of packet forwarding - Verification of path authorization and § Q4/20 detectability - Full-fledged Go verifier - Verification of parts of the Python prototype 7

  8. Conclusion § IP implementations are complex and large - They inevitably have both design and code-level bugs - Some of these bugs can be exploited by attackers § The design of Scion enables formal verification of protocol and code § Verification provides unprecedented guarantees to ISPs and end users - Functional correctness - Availability - Security, in particular, backdoor freedom 8

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend