Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published April 7, 2021 | Version 1.0
Software Open

No Crash, No Exploit: Automatic Verification of Embedded Kernels

  • 1. Université Paris-Saclay, CEA, List
  • 2. ENS, CNRS, Université Paris Science et Lettres

Description

VirtualBox VM FOR THE BINSEC/CODEX TOOL

The kernel is the most safety- and security-critical component of many computer systems, as the most severe bugs lead to complete system crash or exploit. It is thus desirable to guarantee that a kernel is free from these bugs using formal methods, but the high cost and expertise required to do so are deterrent to wide applicability. We propose a method that can verify both absence of runtime errors (i.e. crashes) and absence of privilege escalation (i.e. exploits) in embedded kernels from their binary executables. The method can verify the kernel runtime independently from the application, at the expense of only a few lines of simple annotations. When given a specific application, the method can verify simple kernels without any human intervention. We demonstrate our method on two different use cases: we use our tool to help the development of a new embedded real-time kernel, and we verify an existing industrial real-time kernel executable with no modification. Results show that the method is fast, simple to use, and can prevent real errors and security vulnerabilities.

Files

HOWTO.txt

Files (4.0 GB)

Name Size Download all
md5:1c431be24bd42dd32a83c9e9ceb90a0d
759 Bytes Preview Download
md5:25c291125d335e8d199b7616b95ed0e6
4.0 GB Download