No crash, no exploit: Automated verification of embedded Kernels - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2021

No crash, no exploit: Automated verification of embedded Kernels

Résumé

The kernel is the most safety-and security-critical component of many computer systems, as the most severe bugs lead to complete system crash or exploit. It is thus desirable to guarantee that a kernel is free from these bugs using formal methods, but the high cost and expertise required to do so are deterrent to wide applicability. We propose a method that can verify both absence of runtime errors (i.e. crashes) and absence of privilege escalation (i.e. exploits) in embedded kernels from their binary executables. The method can verify the kernel runtime independently from the application, at the expense of only a few lines of simple annotations. When given a specific application, the method can verify simple kernels without any human intervention. We demonstrate our method on two different use cases: we use our tool to help the development of a new embedded real-time kernel, and we verify an existing industrial real-time kernel executable with no modification. Results show that the method is fast, simple to use, and can prevent real errors and security vulnerabilities.
Fichier principal
Vignette du fichier
rtas21.pdf (1012.98 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03538067 , version 1 (20-01-2022)

Identifiants

  • HAL Id : hal-03538067 , version 1

Citer

Olivier Nicole, Matthieu Lemerre, Sébastien Bardin, Xavier Rival. No crash, no exploit: Automated verification of embedded Kernels. RTAAS 2021 - Real-Time and Embedded Technology and Applications Symposium, May 2021, Nashville, United States. ⟨hal-03538067⟩
41 Consultations
158 Téléchargements

Partager

Gmail Facebook X LinkedIn More