2017
DOI: 10.1098/rsta.2015.0401
|View full text |Cite
|
Sign up to set email alerts
|

The HACMS program: using formal methods to eliminate exploitable bugs

Abstract: For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
23
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(25 citation statements)
references
References 30 publications
1
23
0
Order By: Relevance
“…For example, model-based verification has a significant different goal than our work. For instance, the main difference between our work and [42] is that in our case there is no exploitable bug in the program. Instead, we consider legal program behavior that might be informative to attackers.…”
Section: Related Workmentioning
confidence: 82%
“…For example, model-based verification has a significant different goal than our work. For instance, the main difference between our work and [42] is that in our case there is no exploitable bug in the program. Instead, we consider legal program behavior that might be informative to attackers.…”
Section: Related Workmentioning
confidence: 82%
“…Recent advances in formal verification, a mature area of computer science concerned with improving the security and reliability of systems, offer optimism for the future of electronic voting machines (Fisher et al 2017;Gu et al 2016;Leroy et al 2016). Formal verification uses formal methods, a family of rigorous mathematical techniques, to both specify and verify desirable program behavior.…”
Section: Option 3: Invest In the Development Of Formally Verifiementioning
confidence: 99%
“…In addition to these directions, previous research work proposed using formally verified microkernels to have a secure core [22], [33], [35]. This secure code can be used to host a security tool.…”
Section: Performance Enhancementmentioning
confidence: 99%