Towards a Formally Verified Security Monitor for VM-based Confidential Computing

08/20/2023
by   Wojciech Ozga, et al.
0

Confidential computing is a key technology for isolating high-assurance applications from the large amounts of untrusted code typical in modern systems. Existing confidential computing systems cannot be certified for use in critical applications, like systems controlling critical infrastructure, hardware security modules, or aircraft, as they lack formal verification. This paper presents an approach to formally modeling and proving a security monitor. It introduces a canonical architecture for virtual machine (VM)-based confidential computing systems. It abstracts processor-specific components and identifies a minimal set of hardware primitives required by a trusted security monitor to enforce security guarantees. We demonstrate our methodology and proposed approach with an example from our Rust implementation of the security monitor for RISC-V.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/03/2022

Verifying RISC-V Physical Memory Protection

We formally verify an open-source hardware implementation of physical me...
research
04/12/2023

CoVE: Towards Confidential Computing on RISC-V Platforms

Multi-tenant computing platforms are typically comprised of several soft...
research
10/09/2022

seL4 Microkernel for virtualization use-cases: Potential directions towards a standard VMM

Virtualization plays an essential role in providing security to computat...
research
04/22/2023

FVCARE:Formal Verification of Security Primitives in Resilient Embedded SoCs

With the increased utilization, the small embedded and IoT devices have ...
research
09/16/2022

PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot

Hardware supply-chain attacks are raising significant security threats t...
research
09/12/2017

A certified reference validation mechanism for the permission model of Android

Android embodies security mechanisms at both OS and application level. I...
research
04/08/2021

CRC: Fully General Model of Confidential Remote Computing

Digital services have been offered through remote systems for decades. T...

Please sign up or login with your details

Forgot password? Click here to reset