Lecture 13: Certifying Correctness

APL Lecture 13: Certifying CorrectnessThis lecture presented ways to take proofs of code properties beyond correctness or safety of individual programs into the domain of mobile code, trustworthiness, and complete systems.
When deciding what trust to place in mobile code, the technique of  Proof-Carrying Code can complement digital certificates — which authenticate a code provider — with digital evidence that confirms properties of the code itself and can be independently checked. Given verified source code, its eventual behaviour still depends on compilers, libraries, operating systems, hardware, and more: all of these are areas of current research into verification and correctness, with some success but still considerable challenge.

Link: Slides for Lecture 13

References

If you are interested in how tricky it might be to prove a compiler correct, then I strongly recommend reading Ken Thompson’s classic Turing Award lecture. It’s short, and fun.

Final step in Ken Thompson's trojan program from his Reflections on Trusting Trust Reflections on Trusting Trust
Ken Thompson
1983 ACM Turing Award lecture
Communications of the ACM 27(8):761–763, August 1984
Links: Thompson’s own page on this; CACM article; Turing Award citation

Three noted failures of using digital certificates on code. Two of these were malicious subversion, but the shipping of a virus within a Microsoft product appears to have been accidental and shows a characteristic gap within digital certification: it is only the provider that is being certified, not the contents of the code.

Microsoft Security Bulletin MS01-017 - Critical Microsoft Security Bulletin MS01-017 – Critical
Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard
Attacker could digitally sign code using the name “Microsoft Corporation”
Link: Full text of bulletin
Microsoft Inadvertently Ships Nimda Virus in Visual Studio .NET Microsoft Inadvertently Ships Nimda Virus in Visual Studio .NET
As reported in Windows IT Pro, June 2002
File containing the virus was distributed in the Korean version of VS.NET.
Links: News article; Article from Microsoft
 Comperworld: Microsoft throws 'kill switch' on own certificates after Flame hijack Microsoft throws ‘kill switch’ on own certificates after Flame hijack
As reported in Computerworld, June 2012
Microsoft revoked certification authority subverted by the Flame malware.
Links: News article; Microsoft security advisory

Projects at Edinburgh related to proof-carrying code and digital evidence.
Links: LFCS Mobility and Security group; Security and Privacy @ Informatics

MRG: Mobile Resource Guarantees Mobile Resource Guarantees
Proof-carrying code that certifies Java app performance
Edinburgh / Munich collaboration 2002–2005
Links: Summary leaflet; MRG home page
Mobius: Mobility, Ubiquity and Security Mobius: Mobility, Ubiquity and Security
Enabling proof-carrying code for Java on mobile devices.
European integrated project 2004–2009
Links: Slides; Poster; Mobius home page.
AppGuarden: Resilient Application Stores AppGuarden: Resilient Application Stores
Enhancing App Stores with fine-grained policies discovered through machine learning and enforced using machine-checkable digital evidence.
Edinburgh 2013–2016
Links: AppGuarden home page; UK CyberSecurity Research Institute

Compiler verification.

CompCert: Compilers you can Formally Trust CompCert
The CompCert C verified compiler comes with a mathematical, machine-checked proof that the generated executable code behaves exactly as prescribed by the semantics of the source program.
Link: CompCert home page
CerCo: Certified Complexity Cerco: Certified Complexity
Verified execution costs for an embedded microcontroller.
Edinburgh / Bologna / Paris collaboration 2010–2013
Link: CerCo home page
The CompCertTSO Compiler CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency
Compiles C to x86, verified against the Total Store Order concurrency model.
Link: CompCertTSO home page

Platform verification.

SAFE: A Secure Computing Platform SAFE: A Secure Computing Platform
Tagged hardware architecture for flexible security checking.
Part of DARPA CRASH: Clean-slate design of Resilient, Adaptive, Secure Hosts.
Links: SAFE home page; DARPA CRASH programme
sel4: The World's Most Highly Assured Operating System seL4: A Secure OS Kernel
Verified implementation of the L4 operating system microkernel.
National ICT Australia (NICTA)
Link: seL4 home page
REMS: Rigorous Engineering for Mainstream Systems REMS: Rigorous Engineering for Mainstream Systems
Verification of CPU architectures, systems code, concurrent software.
Cambridge / London / Edinburgh 2013–2019
Link: REMS home page
ulb HACMS: High-Assurance Cyber-Military Systems
Verified security for embedded control systems and autonomous vehicles.
Uses automated code synthesis, embedded Haskell DSLs for realtime hardware control, and machine-checked safety proofs.
Links: DARPA HACMS page; Open-source SMACCM quadcopter
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s