1 / 1

Introduction

Verification with Small and Short Worlds Rohit Sinha, Cynthia Sturton, Petros Maniatis, Sanjit A. Seshia, David Wagner. S 2 W Our contribution: a semi-decision procedure for verifying property is an invariant of system : . S 2 W is a three-step procedure: Standard Mathematical Induction

lucie
Télécharger la présentation

Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Verification with Small and Short WorldsRohit Sinha, Cynthia Sturton, Petros Maniatis, Sanjit A. Seshia, David Wagner • S2W • Our contribution: a semi-decision procedure for verifying property is an invariant of system : . • S2W is a three-step procedure: • Standard Mathematical Induction • If is an invariant, return True. • Else, continue to step 2. • Small World • Create , a scaled down model with most data structure members abstracted away. • Abstraction makes state space manageable. • Short World • Compute a bound on the reachability diameter of . • Use bounded model checking to prove the invariant on the abstracted system: . • Using as the bound for BMC makes the verification sound. Introduction Verification of large data structures is beyond the current state of the art for finite state model checking. We present a new technique, S2W, for the verification of safety properties on large or unbounded data structures. Heuristics In general, computing a bound on the reachability diameter is undecidable for our class of systems. We develop two heuristics for computing . • Evaluation • We use case studies to evaluate the practicality of using S2W for real-world applications. • We successfully verify safety properties for six systems: • Bochs’ TLB: Address translation optimization is correct • Content Addressable Memory-based Cache: Cache optimization is correct • Shadow Page Tables: Guest/host isolation • SecVisor: Only approved code executes in kernel mode • sHype: Chinese Wall policy is enforced • ShadowVisor: Guest/host isolation • Motivation • Hypervisors and CPU emulators are used in a variety of security-critical applications: • Cloud computing • Malware analysis • Hosting dangerous applications • Verifying the isolation properties provided by virtualization often involves reasoning about large data structures: • Page tables • Translation lookaside buffers (TLB) • Caches A B 232 … … … v-pg 31 22 21 12 11 0 Virtual Address TLB Look Up Figure 2. In a system with two large arrays, we might model a single entry in each array precisely and abstract away all others; the abstracted entries receive arbitrary values at each step of execution. p-pg p-pg v-pg Page Table 4 KB Page Page Directory … … Page Table Walk Figure 1. A virtual address is translated to a physical address via the page tables. The TLB caches previously translated addresses. We verify that for any virtual address, the value p-pg returned by the TLB is equal to the value p-pg returned by the page tables.

More Related