SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
Can Truly Dependable 
Systems Be Affordable? 
@GernotHeiser 
NICTA and UNSW Australia 
1 APSys'13 Keynote
Copyright Notice 
These slides are distributed under the Creative Commons 
Attribution 3.0 License 
• You are free: 
– to share—to copy, distribute and transmit the work 
– to remix—to adapt the work 
• under the following conditions: 
– Attribution: You must attribute the work (but not in any way that 
suggests that the author endorses you or your use of the work) as 
follows: 
• “Courtesy of Gernot Heiser, [Institution]”, where [Institution] is one of 
“UNSW” or “NICTA” 
The complete license text can be found at 
http://creativecommons.org/licenses/by/3.0/legalcode 
©2013 Gernot Heiser, NICTA 2 
COMP9242 S2/2014 W01
Present Systems are NOT Trustworthy! 
©2013 Gernot Heiser, NICTA 3 
APSys'13 Keynote 
Yet they are expensive: 
• $1,000 per line of code for 
“high-assurance” software! 
3
Fundamental issue: large stacks, need isolation 
E.g. medical implant 
• 1 kLOC critical code 
• 20–100 kLOC trusted 
computing base (TCB) 
• 100s of bugs 
• dozens of exploits! 
1,000 LOC 
4 APSys'13 Keynote 
Control, 
monitoring, 
maintenance 
Network 
stacks 
Device 
drivers 
Processor 
>10,000 
LOC 
>10,000 
LOC 
©2013 Gernot Heiser, NICTA 4 
Life-supporting 
RTOS 
1,000 LOC 
1,000 LOC
High Assurance Bad Practice 
Uncritical/ 
untrusted 
Processor 
©2013 Gernot Heiser, NICTA 5 
Sensitive/ 
critical/ 
trusted 
• TCB of millions of LOC 
• Expect 1000s of bugs 
• Expect 100s of vulnerabilities 
Hacker’s 
delight! 
Isolation? 
Xen/VMware/KVM 
hypervisor 
Huge TCB 
5 APSys'13 Keynote
High Assurance Best Practice 
Uncritical/ 
untrusted 
Processor 
©2013 Gernot Heiser, NICTA 6 
Sensitive/ 
critical/ 
trusted 
• Isolate 
• Minimise the TCB 
• Assure TCB by 
• testing 
• code inspection 
• bug-finding tools 
Separation kernel 
Minimal 
“trusted 
computing 
base” (TCB) 
base” 
Always 
incomplete! 
6 APSys'13 Keynote
State of the Art: NICTA’s seL4 Microkernel 
Uncritical/ 
untrusted 
Processor 
©2013 Gernot Heiser, NICTA 7 
Strong 
Isolation 
Sensitive/ 
critical/ 
trusted 
seL4 microkernel 
Truly 
dependable 
TCB 
7 APSys'13 Keynote 
• Provable isolation! 
• Provable assurance! 
No place for 
bugs to hide!
NICTA’s seL4: Mathematical Proof of Isolation 
Proof Proof Proof 
©2013 Gernot Heiser, NICTA 8 
APSys'13 Keynote 
Integrity 
Abstract 
Model 
C Imple-mentation 
Confiden-tiality 
Availability 
Binary 
code 
Functional 
correctness 
[SOSP’09] 
Isolation 
properties 
[ITP’11, S&P’13] 
Translation 
correctness 
[PLDI’13] 
Exclusions (at present): 
• Initialisation 
• Privileged state & caches 
• Multicore 
• Covert timing channels 
Timeliness 
[RTSS’11] 
8
©2013 Gernot Heiser, NICTA 99 Cyber Security August'13
NICTA’s seL4 Microkernel: Unique Assurance 
©2013 Gernot Heiser, NICTA 10 
APSys'13 Keynote 
First and only operating-system with 
functional-correctness proof: operation 
is always according to specification 
First and only operating-system with 
proof of integrity and confidentiality 
enforcement – at the level of binary code! 
First and only protected-mode 
operating-system with complete 
and sound timing analysis 
World’s fastest microkernel 
on ARM architecture 
Predecessor 
deployed on 
2 billion devices 
10
seL4: Cost of Assurance 
Proof Proof Proof 
©2013 Gernot Heiser, NICTA 11 
APSys'13 Keynote 
Integrity 
Abstract 
Model 
C Imple-mentation 
Confiden-tiality 
Availability 
Binary 
code 
20.5 py 
4.5 years 
1 py 
4 months 
0 py 
By construction 
4.5 py 
2 py, 1.5 years 
Mostly for tools 
11 
2 py, 1 year 
Mostly for tools 
$400 per line 
of code! 
Estimate repeat 
cost: $200/LOC
Cost of Assurance 
Industry Best Practice: 
• “High assurance”: $1,000/LOC, no guarantees, unoptimised 
• Low assurance: $100–200/LOC, 1–5 faults/kLOC, optimised 
State of the Art – seL4: 
– $400/LOC, 0 faults/kLOC, optimised 
• Estimate repeat would cost half 
– that’s about the development cost of the predecessor Pistachio! 
• Aggressive optimisation [APSys’12] 
– much faster than traditional high-assurance kernels 
– as fast as best-performing low-assurance kernels 
12 APSys'13 Keynote 
©2013 Gernot Heiser, NICTA 12
What Have We Learnt? 
Formal verification probably didn’t produce a more secure kernel 
• In reality, traditional separation kernels are probably secure 
But: 
• We now have certainty 
• We did it probably at less cost 
Real achievement: 
• Cost-competitive at a scale where traditional approaches still work 
• Foundation for scaling beyond: 2 ⨉ cheaper, 10 ⨉ bigger! 
How? 
• Combine theorem proving with 
– synthesis 
– domain–specific languages (DSLs) 
13 APSys'13 Keynote 
©2013 Gernot Heiser, NICTA 13
Boeing Unmanned 
Little Bird (AH-6) 
Deployment Vehicle 
©2013 Gernot Heiser, NICTA 14 
SMACCMcopter 
Research Vehicle 
Next Step: Full System Assurance 
DARPA HACMS Program: 
• Provable vehicle safety 
• “Red Team” must not be able 
to divert vehicle 
14 APSys'13 Keynote
Control Board Mission Board 
Verified RTOS 
Radio 
control 
©2013 Gernot Heiser, NICTA 15 
C&C 
File 
system 
seL4 – verified microkernel 
Hardware 
Hardware 
Sensors 
• gyro, 
• accel, 
• … 
C&C 
Radio 
Micro-controller 
Control 
Monitor 
CAN bus 
controller 
Network 
camera 
Proces-sor 
Untrusted 
Linux 
kernel, 
image 
processing 
Device 
drivers 
CAN Bus Key: 
Trusted 
Trusted, NICTA 
Untrusted 
System Structure 
15 APSys'13 Keynote
Architecting System-Level Security/Safety 
Architecture Specification 
Requirements 
(specific set of 
security/safety 
properties) 
Component Model 
Untr 
trusted Untr 
Correctness Formal 
©2013 Gernot Heiser, NICTA 16 
Automatic 
Analysis 
(Requirements 
fulfilled) 
Component Implementations 
Untr 
trusted Untr 
Verified Glue Code 
seL4 Kernel 
Glue Code Proof 
seL4 Proof 
proof Synthesis 
Functional 
correctness Security 
Automatic Generation 
of Glue code 
Communication Init 
16 Cyber Security August'13
Synthesis: Device Drivers [SOSP’09] 
Formal 
Formalise 
specs! 
Formal 
©2013 Gernot Heiser, NICTA 17 
driver.c 
OS Interface 
Spec 
Device Spec 
17 APSys'13 Keynote
Actually works! (On Linux & seL4) 
IDE disk controller W5100 Eth shield Intel PRO/1000 
Asix AX88772 
USB-to-Eth adapter 
©2013 Gernot Heiser, NICTA 18 
Ethernet 
SD host controller 
UART controller 
18 APSys'13 Keynote
Synthesis: Device Drivers 
In progress: 
• Extract device spec from 
device design work-flow 
• Manual optimisations 
• Verified synthesis 
©2013 Gernot Heiser, NICTA 19 
driver.c 
APSys'13 Keynote 
Formal 
OS Interface 
Spec 
Formal 
Device Spec 
19
Hardware Design Workflow 
Informal specification 
High-level model 
Manual transformation 
Register-transfer-level 
description 
netlist 
©2013 Gernot Heiser, NICTA 20 
Too 
detailed 
(for now) 
• Low-level description: 
registers, gates, wires. 
• Cycle-accurate 
• Precisely models internal 
device architecture and 
interfaces 
• “Gold reference” 
20 APSys'13 Keynote
Hardware Design Workflow 
Informal specification 
High-level model 
Manual transformation 
Register-transfer-level 
description 
netlist 
Use for now 
©2013 Gernot Heiser, NICTA 21 
• Captures external 
behaviour 
• Abstracts away structure 
and timing 
• Abstracts away the low-level 
interface 
bus_write(u32 addr, u32 val) 
{ 
... 
} 
21 APSys'13 Keynote
DSLs: File System 
©2013 Gernot Heiser, NICTA 22 
Abstract 
Spec 
(Isabelle) 
Component 
Component 
Spec 
Component 
Component 
Spec 
(Isabelle) 
Component 
Spec 
(DSL) 
Spec 
(DSL) 
Spec 
(DSL) 
Component 
Implementation 
(C) 
Component 
Implementation 
(C)Generated 
Component 
Implementation 
(Generated C) 
Manual 
Proof 
Generated 
Proof 
Component 
Spec 
(Isabelle) 
Gene- (Isabelle) 
rator 
APSys'13 Keynote 
File-system properties: 
• Multiple, pre-defined 
abstraction levels 
• Naturally modular 
• Lots of “boring” code 
• (de-)serialisation 
• error handling 
22
File System Code and Proof Co-Generation 
Proof 
Proof 
Manual, FS-specific 
Manual, FS-independent 
Generated 
Proof 
Proof 
©2013 Gernot Heiser, NICTA 23 
CSDL code 
Declarations 
of Types, 
Functions 
verified filesystem code 
Verified C code 
DDSL code 
generation 
Control 
Code 
Data layout 
Control 
Code 
ADT 
Code 
(De-)seriali-sation 
Code 
Isabelle specs & proofs 
Control 
Code Spec 
ADT 
Code Spec 
(De)-serial. 
Code Spec Functional spec 
Proof 
Proof 
generation 
generation 
APSys'13 Keynote 
Case study: Flash file system 
• Linux-compatible 
• Fits between VFS and 
flash abstraction (UBI) 
23
Future: Full-Scale Trustworthy System 
Untrusted 
Apps 
Verified Resource Management 
©2013 Gernot Heiser, NICTA 24 
Cyber Security August'13 
Verified critical application 
Verified microkernel 
Verified 
File systems 
Verified 
Device 
Drivers 
Processor Devices 
Verified 
Network 
Stacks 
Verified 
High-level 
runtime 
Untrusted VM 
Untrusted 
Linux 
Untrusted Apps 
24
Lessons Learnt So Far 
Formal methods are expensive? 
• Cost-effective for high assurance on small to moderate scale 
• $200-400/LOC for 10kLOC 
We think we can scale bigger and cheaper: 
• Componentisation 
– verify components in isolation – enabled by seL4 guarantees 
– cost – performance tradeoff 
• Synthesis 
• Abstraction: DSLs, HLLs increase productivity 
Big challenge: Proof composition 
25 APSys'13 Keynote 
©2013 Gernot Heiser, NICTA 25
Where To Find More 
• UNSW Advanced Operating Systems Course 
http://www.cse.unsw.edu.au/~cs9242 
• NICTA Trustworthy Systems research 
http://trustworthy.systems 
• seL4 open-source portal 
http://sel4.systems 
• L4 Microkernel Headquarters 
http://l4hq.org 
• Gernot’s blog: 
http://microkerneldude.wordpress.com/ 
• Gernot’s research home page: 
http://ssrg.nicta.com.au/people/?cn=Gernot+Heiser 
©2013 Gernot Heiser, NICTA 26 
COMP9242 S2/2014 W01

Más contenido relacionado

La actualidad más candente

Linux Interrupts
Linux InterruptsLinux Interrupts
Linux InterruptsKernel TLV
 
Using VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersUsing VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersMichelle Holley
 
Xen Project 15 Years down the Line
Xen Project 15 Years down the LineXen Project 15 Years down the Line
Xen Project 15 Years down the LineThe Linux Foundation
 
Fosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using VirtualizationFosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using VirtualizationThe Linux Foundation
 
"One network to rule them all" - OpenStack Summit Austin 2016
"One network to rule them all" - OpenStack Summit Austin 2016"One network to rule them all" - OpenStack Summit Austin 2016
"One network to rule them all" - OpenStack Summit Austin 2016Phil Estes
 
OSSEU18: NVDIMM and Virtualization - George Dunlap, Citrix
OSSEU18: NVDIMM and Virtualization  - George Dunlap, CitrixOSSEU18: NVDIMM and Virtualization  - George Dunlap, Citrix
OSSEU18: NVDIMM and Virtualization - George Dunlap, CitrixThe Linux Foundation
 
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...The Linux Foundation
 
OCP Engineering Workshop at UNH
OCP Engineering Workshop at UNH OCP Engineering Workshop at UNH
OCP Engineering Workshop at UNH 호용 류
 
Intel® RDT Hands-on Lab
Intel® RDT Hands-on LabIntel® RDT Hands-on Lab
Intel® RDT Hands-on LabMichelle Holley
 
CIF16: Unikernels: The Past, the Present, the Future ( Russell Pavlicek, Xen ...
CIF16: Unikernels: The Past, the Present, the Future ( Russell Pavlicek, Xen ...CIF16: Unikernels: The Past, the Present, the Future ( Russell Pavlicek, Xen ...
CIF16: Unikernels: The Past, the Present, the Future ( Russell Pavlicek, Xen ...The Linux Foundation
 
The Role of a Network Software Developer in Network Transformation
The Role of a Network Software Developer in Network TransformationThe Role of a Network Software Developer in Network Transformation
The Role of a Network Software Developer in Network TransformationMichelle Holley
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...The Linux Foundation
 
XDF18: Heterogeneous Real-Time SoC Software Architecture - Stefano Stabellini...
XDF18: Heterogeneous Real-Time SoC Software Architecture - Stefano Stabellini...XDF18: Heterogeneous Real-Time SoC Software Architecture - Stefano Stabellini...
XDF18: Heterogeneous Real-Time SoC Software Architecture - Stefano Stabellini...The Linux Foundation
 
Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018The Linux Foundation
 
XPDDS19: Argo and Hypervisor-Mediated Data eXchange (HMX) - Christopher Clark...
XPDDS19: Argo and Hypervisor-Mediated Data eXchange (HMX) - Christopher Clark...XPDDS19: Argo and Hypervisor-Mediated Data eXchange (HMX) - Christopher Clark...
XPDDS19: Argo and Hypervisor-Mediated Data eXchange (HMX) - Christopher Clark...The Linux Foundation
 
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...The Linux Foundation
 
XPDDS18: Unikraft: An easy way of crafting Unikernels on Arm - Kaly Xin, ARM
XPDDS18: Unikraft: An easy way of crafting Unikernels on Arm - Kaly Xin, ARMXPDDS18: Unikraft: An easy way of crafting Unikernels on Arm - Kaly Xin, ARM
XPDDS18: Unikraft: An easy way of crafting Unikernels on Arm - Kaly Xin, ARMThe Linux Foundation
 
2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov UpdateThe Linux Foundation
 
Virtunoid: Breaking out of KVM
Virtunoid: Breaking out of KVMVirtunoid: Breaking out of KVM
Virtunoid: Breaking out of KVMNelson Elhage
 

La actualidad más candente (20)

Linux Interrupts
Linux InterruptsLinux Interrupts
Linux Interrupts
 
Using VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersUsing VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear Containers
 
Xen Project 15 Years down the Line
Xen Project 15 Years down the LineXen Project 15 Years down the Line
Xen Project 15 Years down the Line
 
Fosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using VirtualizationFosdem 18: Securing embedded Systems using Virtualization
Fosdem 18: Securing embedded Systems using Virtualization
 
"One network to rule them all" - OpenStack Summit Austin 2016
"One network to rule them all" - OpenStack Summit Austin 2016"One network to rule them all" - OpenStack Summit Austin 2016
"One network to rule them all" - OpenStack Summit Austin 2016
 
OSSEU18: NVDIMM and Virtualization - George Dunlap, Citrix
OSSEU18: NVDIMM and Virtualization  - George Dunlap, CitrixOSSEU18: NVDIMM and Virtualization  - George Dunlap, Citrix
OSSEU18: NVDIMM and Virtualization - George Dunlap, Citrix
 
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
 
OCP Engineering Workshop at UNH
OCP Engineering Workshop at UNH OCP Engineering Workshop at UNH
OCP Engineering Workshop at UNH
 
Intel® RDT Hands-on Lab
Intel® RDT Hands-on LabIntel® RDT Hands-on Lab
Intel® RDT Hands-on Lab
 
CIF16: Unikernels: The Past, the Present, the Future ( Russell Pavlicek, Xen ...
CIF16: Unikernels: The Past, the Present, the Future ( Russell Pavlicek, Xen ...CIF16: Unikernels: The Past, the Present, the Future ( Russell Pavlicek, Xen ...
CIF16: Unikernels: The Past, the Present, the Future ( Russell Pavlicek, Xen ...
 
The Role of a Network Software Developer in Network Transformation
The Role of a Network Software Developer in Network TransformationThe Role of a Network Software Developer in Network Transformation
The Role of a Network Software Developer in Network Transformation
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
 
OSCON14: Mirage 2.0
OSCON14: Mirage 2.0 OSCON14: Mirage 2.0
OSCON14: Mirage 2.0
 
XDF18: Heterogeneous Real-Time SoC Software Architecture - Stefano Stabellini...
XDF18: Heterogeneous Real-Time SoC Software Architecture - Stefano Stabellini...XDF18: Heterogeneous Real-Time SoC Software Architecture - Stefano Stabellini...
XDF18: Heterogeneous Real-Time SoC Software Architecture - Stefano Stabellini...
 
Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018
 
XPDDS19: Argo and Hypervisor-Mediated Data eXchange (HMX) - Christopher Clark...
XPDDS19: Argo and Hypervisor-Mediated Data eXchange (HMX) - Christopher Clark...XPDDS19: Argo and Hypervisor-Mediated Data eXchange (HMX) - Christopher Clark...
XPDDS19: Argo and Hypervisor-Mediated Data eXchange (HMX) - Christopher Clark...
 
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
 
XPDDS18: Unikraft: An easy way of crafting Unikernels on Arm - Kaly Xin, ARM
XPDDS18: Unikraft: An easy way of crafting Unikernels on Arm - Kaly Xin, ARMXPDDS18: Unikraft: An easy way of crafting Unikernels on Arm - Kaly Xin, ARM
XPDDS18: Unikraft: An easy way of crafting Unikernels on Arm - Kaly Xin, ARM
 
2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update
 
Virtunoid: Breaking out of KVM
Virtunoid: Breaking out of KVMVirtunoid: Breaking out of KVM
Virtunoid: Breaking out of KVM
 

Similar a Affordable trustworthy-systems

HiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationHiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationVEDLIoT Project
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsJay Bryant
 
Cisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologiesCisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologiesssuser79fc19
 
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded DayC:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded DayArik Weinstein
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
Plan with confidence: Route to a successful Do178c multicore certification
Plan with confidence: Route to a successful Do178c multicore certificationPlan with confidence: Route to a successful Do178c multicore certification
Plan with confidence: Route to a successful Do178c multicore certificationMassimo Talia
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuArm
 
“Making Edge AI Inference Programming Easier and Flexible,” a Presentation fr...
“Making Edge AI Inference Programming Easier and Flexible,” a Presentation fr...“Making Edge AI Inference Programming Easier and Flexible,” a Presentation fr...
“Making Edge AI Inference Programming Easier and Flexible,” a Presentation fr...Edge AI and Vision Alliance
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)Mike Svoboda
 
Container security within Cisco Container Platform
Container security within Cisco Container PlatformContainer security within Cisco Container Platform
Container security within Cisco Container PlatformSanjeev Rampal
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...The Linux Foundation
 
Accelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudAccelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudRebekah Rodriguez
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Easily emulating full systems on amazon fpg as
Easily emulating full systems on amazon fpg asEasily emulating full systems on amazon fpg as
Easily emulating full systems on amazon fpg asRISC-V International
 
Workshop 16 october 2015 paris
Workshop 16 october 2015 parisWorkshop 16 october 2015 paris
Workshop 16 october 2015 parisMarcel Hartgerink
 
The Role of Standards in IoT Security
The Role of Standards in IoT SecurityThe Role of Standards in IoT Security
The Role of Standards in IoT SecurityHannes Tschofenig
 
Ceph on 64-bit ARM with X-Gene
Ceph on 64-bit ARM with X-GeneCeph on 64-bit ARM with X-Gene
Ceph on 64-bit ARM with X-GeneCeph Community
 
Embree Ray Tracing Kernels | Overview and New Features | SIGGRAPH 2018 Tech S...
Embree Ray Tracing Kernels | Overview and New Features | SIGGRAPH 2018 Tech S...Embree Ray Tracing Kernels | Overview and New Features | SIGGRAPH 2018 Tech S...
Embree Ray Tracing Kernels | Overview and New Features | SIGGRAPH 2018 Tech S...Intel® Software
 

Similar a Affordable trustworthy-systems (20)

HiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationHiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentation
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
Cisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologiesCisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologies
 
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded DayC:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
C:\Alon Tech\New Tech\Embedded Conf Tlv\Prez\Sightsys Embedded Day
 
Sgcp14phillips
Sgcp14phillipsSgcp14phillips
Sgcp14phillips
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
Plan with confidence: Route to a successful Do178c multicore certification
Plan with confidence: Route to a successful Do178c multicore certificationPlan with confidence: Route to a successful Do178c multicore certification
Plan with confidence: Route to a successful Do178c multicore certification
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiu
 
“Making Edge AI Inference Programming Easier and Flexible,” a Presentation fr...
“Making Edge AI Inference Programming Easier and Flexible,” a Presentation fr...“Making Edge AI Inference Programming Easier and Flexible,” a Presentation fr...
“Making Edge AI Inference Programming Easier and Flexible,” a Presentation fr...
 
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
Container security within Cisco Container Platform
Container security within Cisco Container PlatformContainer security within Cisco Container Platform
Container security within Cisco Container Platform
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
 
Accelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudAccelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to Cloud
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Easily emulating full systems on amazon fpg as
Easily emulating full systems on amazon fpg asEasily emulating full systems on amazon fpg as
Easily emulating full systems on amazon fpg as
 
Workshop 16 october 2015 paris
Workshop 16 october 2015 parisWorkshop 16 october 2015 paris
Workshop 16 october 2015 paris
 
The Role of Standards in IoT Security
The Role of Standards in IoT SecurityThe Role of Standards in IoT Security
The Role of Standards in IoT Security
 
Ceph on 64-bit ARM with X-Gene
Ceph on 64-bit ARM with X-GeneCeph on 64-bit ARM with X-Gene
Ceph on 64-bit ARM with X-Gene
 
Embree Ray Tracing Kernels | Overview and New Features | SIGGRAPH 2018 Tech S...
Embree Ray Tracing Kernels | Overview and New Features | SIGGRAPH 2018 Tech S...Embree Ray Tracing Kernels | Overview and New Features | SIGGRAPH 2018 Tech S...
Embree Ray Tracing Kernels | Overview and New Features | SIGGRAPH 2018 Tech S...
 

Último

tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile EnvironmentVictorSzoltysek
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 

Último (20)

tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 

Affordable trustworthy-systems

  • 1. Can Truly Dependable Systems Be Affordable? @GernotHeiser NICTA and UNSW Australia 1 APSys'13 Keynote
  • 2. Copyright Notice These slides are distributed under the Creative Commons Attribution 3.0 License • You are free: – to share—to copy, distribute and transmit the work – to remix—to adapt the work • under the following conditions: – Attribution: You must attribute the work (but not in any way that suggests that the author endorses you or your use of the work) as follows: • “Courtesy of Gernot Heiser, [Institution]”, where [Institution] is one of “UNSW” or “NICTA” The complete license text can be found at http://creativecommons.org/licenses/by/3.0/legalcode ©2013 Gernot Heiser, NICTA 2 COMP9242 S2/2014 W01
  • 3. Present Systems are NOT Trustworthy! ©2013 Gernot Heiser, NICTA 3 APSys'13 Keynote Yet they are expensive: • $1,000 per line of code for “high-assurance” software! 3
  • 4. Fundamental issue: large stacks, need isolation E.g. medical implant • 1 kLOC critical code • 20–100 kLOC trusted computing base (TCB) • 100s of bugs • dozens of exploits! 1,000 LOC 4 APSys'13 Keynote Control, monitoring, maintenance Network stacks Device drivers Processor >10,000 LOC >10,000 LOC ©2013 Gernot Heiser, NICTA 4 Life-supporting RTOS 1,000 LOC 1,000 LOC
  • 5. High Assurance Bad Practice Uncritical/ untrusted Processor ©2013 Gernot Heiser, NICTA 5 Sensitive/ critical/ trusted • TCB of millions of LOC • Expect 1000s of bugs • Expect 100s of vulnerabilities Hacker’s delight! Isolation? Xen/VMware/KVM hypervisor Huge TCB 5 APSys'13 Keynote
  • 6. High Assurance Best Practice Uncritical/ untrusted Processor ©2013 Gernot Heiser, NICTA 6 Sensitive/ critical/ trusted • Isolate • Minimise the TCB • Assure TCB by • testing • code inspection • bug-finding tools Separation kernel Minimal “trusted computing base” (TCB) base” Always incomplete! 6 APSys'13 Keynote
  • 7. State of the Art: NICTA’s seL4 Microkernel Uncritical/ untrusted Processor ©2013 Gernot Heiser, NICTA 7 Strong Isolation Sensitive/ critical/ trusted seL4 microkernel Truly dependable TCB 7 APSys'13 Keynote • Provable isolation! • Provable assurance! No place for bugs to hide!
  • 8. NICTA’s seL4: Mathematical Proof of Isolation Proof Proof Proof ©2013 Gernot Heiser, NICTA 8 APSys'13 Keynote Integrity Abstract Model C Imple-mentation Confiden-tiality Availability Binary code Functional correctness [SOSP’09] Isolation properties [ITP’11, S&P’13] Translation correctness [PLDI’13] Exclusions (at present): • Initialisation • Privileged state & caches • Multicore • Covert timing channels Timeliness [RTSS’11] 8
  • 9. ©2013 Gernot Heiser, NICTA 99 Cyber Security August'13
  • 10. NICTA’s seL4 Microkernel: Unique Assurance ©2013 Gernot Heiser, NICTA 10 APSys'13 Keynote First and only operating-system with functional-correctness proof: operation is always according to specification First and only operating-system with proof of integrity and confidentiality enforcement – at the level of binary code! First and only protected-mode operating-system with complete and sound timing analysis World’s fastest microkernel on ARM architecture Predecessor deployed on 2 billion devices 10
  • 11. seL4: Cost of Assurance Proof Proof Proof ©2013 Gernot Heiser, NICTA 11 APSys'13 Keynote Integrity Abstract Model C Imple-mentation Confiden-tiality Availability Binary code 20.5 py 4.5 years 1 py 4 months 0 py By construction 4.5 py 2 py, 1.5 years Mostly for tools 11 2 py, 1 year Mostly for tools $400 per line of code! Estimate repeat cost: $200/LOC
  • 12. Cost of Assurance Industry Best Practice: • “High assurance”: $1,000/LOC, no guarantees, unoptimised • Low assurance: $100–200/LOC, 1–5 faults/kLOC, optimised State of the Art – seL4: – $400/LOC, 0 faults/kLOC, optimised • Estimate repeat would cost half – that’s about the development cost of the predecessor Pistachio! • Aggressive optimisation [APSys’12] – much faster than traditional high-assurance kernels – as fast as best-performing low-assurance kernels 12 APSys'13 Keynote ©2013 Gernot Heiser, NICTA 12
  • 13. What Have We Learnt? Formal verification probably didn’t produce a more secure kernel • In reality, traditional separation kernels are probably secure But: • We now have certainty • We did it probably at less cost Real achievement: • Cost-competitive at a scale where traditional approaches still work • Foundation for scaling beyond: 2 ⨉ cheaper, 10 ⨉ bigger! How? • Combine theorem proving with – synthesis – domain–specific languages (DSLs) 13 APSys'13 Keynote ©2013 Gernot Heiser, NICTA 13
  • 14. Boeing Unmanned Little Bird (AH-6) Deployment Vehicle ©2013 Gernot Heiser, NICTA 14 SMACCMcopter Research Vehicle Next Step: Full System Assurance DARPA HACMS Program: • Provable vehicle safety • “Red Team” must not be able to divert vehicle 14 APSys'13 Keynote
  • 15. Control Board Mission Board Verified RTOS Radio control ©2013 Gernot Heiser, NICTA 15 C&C File system seL4 – verified microkernel Hardware Hardware Sensors • gyro, • accel, • … C&C Radio Micro-controller Control Monitor CAN bus controller Network camera Proces-sor Untrusted Linux kernel, image processing Device drivers CAN Bus Key: Trusted Trusted, NICTA Untrusted System Structure 15 APSys'13 Keynote
  • 16. Architecting System-Level Security/Safety Architecture Specification Requirements (specific set of security/safety properties) Component Model Untr trusted Untr Correctness Formal ©2013 Gernot Heiser, NICTA 16 Automatic Analysis (Requirements fulfilled) Component Implementations Untr trusted Untr Verified Glue Code seL4 Kernel Glue Code Proof seL4 Proof proof Synthesis Functional correctness Security Automatic Generation of Glue code Communication Init 16 Cyber Security August'13
  • 17. Synthesis: Device Drivers [SOSP’09] Formal Formalise specs! Formal ©2013 Gernot Heiser, NICTA 17 driver.c OS Interface Spec Device Spec 17 APSys'13 Keynote
  • 18. Actually works! (On Linux & seL4) IDE disk controller W5100 Eth shield Intel PRO/1000 Asix AX88772 USB-to-Eth adapter ©2013 Gernot Heiser, NICTA 18 Ethernet SD host controller UART controller 18 APSys'13 Keynote
  • 19. Synthesis: Device Drivers In progress: • Extract device spec from device design work-flow • Manual optimisations • Verified synthesis ©2013 Gernot Heiser, NICTA 19 driver.c APSys'13 Keynote Formal OS Interface Spec Formal Device Spec 19
  • 20. Hardware Design Workflow Informal specification High-level model Manual transformation Register-transfer-level description netlist ©2013 Gernot Heiser, NICTA 20 Too detailed (for now) • Low-level description: registers, gates, wires. • Cycle-accurate • Precisely models internal device architecture and interfaces • “Gold reference” 20 APSys'13 Keynote
  • 21. Hardware Design Workflow Informal specification High-level model Manual transformation Register-transfer-level description netlist Use for now ©2013 Gernot Heiser, NICTA 21 • Captures external behaviour • Abstracts away structure and timing • Abstracts away the low-level interface bus_write(u32 addr, u32 val) { ... } 21 APSys'13 Keynote
  • 22. DSLs: File System ©2013 Gernot Heiser, NICTA 22 Abstract Spec (Isabelle) Component Component Spec Component Component Spec (Isabelle) Component Spec (DSL) Spec (DSL) Spec (DSL) Component Implementation (C) Component Implementation (C)Generated Component Implementation (Generated C) Manual Proof Generated Proof Component Spec (Isabelle) Gene- (Isabelle) rator APSys'13 Keynote File-system properties: • Multiple, pre-defined abstraction levels • Naturally modular • Lots of “boring” code • (de-)serialisation • error handling 22
  • 23. File System Code and Proof Co-Generation Proof Proof Manual, FS-specific Manual, FS-independent Generated Proof Proof ©2013 Gernot Heiser, NICTA 23 CSDL code Declarations of Types, Functions verified filesystem code Verified C code DDSL code generation Control Code Data layout Control Code ADT Code (De-)seriali-sation Code Isabelle specs & proofs Control Code Spec ADT Code Spec (De)-serial. Code Spec Functional spec Proof Proof generation generation APSys'13 Keynote Case study: Flash file system • Linux-compatible • Fits between VFS and flash abstraction (UBI) 23
  • 24. Future: Full-Scale Trustworthy System Untrusted Apps Verified Resource Management ©2013 Gernot Heiser, NICTA 24 Cyber Security August'13 Verified critical application Verified microkernel Verified File systems Verified Device Drivers Processor Devices Verified Network Stacks Verified High-level runtime Untrusted VM Untrusted Linux Untrusted Apps 24
  • 25. Lessons Learnt So Far Formal methods are expensive? • Cost-effective for high assurance on small to moderate scale • $200-400/LOC for 10kLOC We think we can scale bigger and cheaper: • Componentisation – verify components in isolation – enabled by seL4 guarantees – cost – performance tradeoff • Synthesis • Abstraction: DSLs, HLLs increase productivity Big challenge: Proof composition 25 APSys'13 Keynote ©2013 Gernot Heiser, NICTA 25
  • 26. Where To Find More • UNSW Advanced Operating Systems Course http://www.cse.unsw.edu.au/~cs9242 • NICTA Trustworthy Systems research http://trustworthy.systems • seL4 open-source portal http://sel4.systems • L4 Microkernel Headquarters http://l4hq.org • Gernot’s blog: http://microkerneldude.wordpress.com/ • Gernot’s research home page: http://ssrg.nicta.com.au/people/?cn=Gernot+Heiser ©2013 Gernot Heiser, NICTA 26 COMP9242 S2/2014 W01