Skip to content

Commit 17ff4d2

Browse files
committed
thesis: Misc improvements
1 parent 7c0cdc1 commit 17ff4d2

File tree

10 files changed

+336
-326
lines changed

10 files changed

+336
-326
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,8 @@ Cf. http://pyexpander.sourceforge.net for more information on `pyexpander`.
4545

4646
### smvtrcviz
4747

48-
When nuXmv finds a property to be false, it generates a counter example.
49-
These counter examples can be given in various forms, one of which is XML.
48+
When nuXmv finds a property to be false, it generates a counter-example.
49+
These counter-examples can be given in various forms, one of which is XML.
5050
I wrote a command-line-tool that converts a trace given in XML into an HTML-table that can be looked at more easily.
5151
This tool is completely optional but I found it to be very helpful.
5252
You can find it under https://github.com/felixlinker/smvtrcviz.

thesis/appendix/counter-examples.tex

Lines changed: 27 additions & 27 deletions
Large diffs are not rendered by default.

thesis/sections/background.tex

Lines changed: 113 additions & 108 deletions
Large diffs are not rendered by default.

thesis/sections/conclusion.tex

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ \chapter{Conclusion}
77
As a first step, the MINRV8 architecture inspired by the RISC-V architecture was defined and implemented in nuXmv in section \ref{sec:minrv8}.
88
In chapter \ref{chp:ifc}, information flow semantics and three information flow properties forming an information flow control in spirit of the work of \citeauthor{Ferraiuolo17} \cite{Ferraiuolo17} were developed.
99
The information flow semantics was used to augment the model of the MINRV8 by information flow tracking.
10-
In chapter \ref{chp:results} eight assumptions that, when implemented software running in machine-mode, guarantee the absence of vulnerabilities covered by aforementioned information flow properties were presented.
10+
In chapter \ref{chp:results}, eight assumptions that, when implemented software running in machine-mode, guarantee the absence of vulnerabilities covered by the aforementioned information flow properties were presented.
1111
Our model, the properties and the assumptions were evaluated by showing that taken together, they manage to detect both the cache poisoning \cite{Wojtczuk09} and the SYSRET vulnerability \cite{Dunlap19}.
12-
Finally in chapter \ref{chp:discussion}, the limitations and the scope of our work were discussed and it was reflected whether our methodology is trustworthy.
12+
Finally, in chapter \ref{chp:discussion}, the limitations and the scope of our work were discussed and it was reflected whether our methodology is trustworthy.
1313

1414
\begin{figure}
1515
\centering
@@ -20,12 +20,12 @@ \chapter{Conclusion}
2020

2121
Before a final summary of what has been achieved in this thesis will be given, we first recap all directions future work might take that were hinted towards throughout this thesis:
2222
\begin{description}
23-
\item[Executable memory] First and foremost, the model could be enhanced by a model of executable memory to more closely resemble modern architectures.
23+
\item[Executable memory] First and foremost, the model could be enhanced by a model of executable memory to resemble modern architectures more closely.
2424
This was discussed extensively in section \ref{sec:discuss-arch}.
2525
\item[MMU] In light of \cite{KhakpourSD13} a model of an \gls{mmu} could be implemented to make use of information flow tracking on user-mode level.
2626
This was discussed in chapter \ref{chp:related-work}.
2727
\item[Machine-generated model] The model of the architecture that was implemented by hand in this thesis could be generated from existing machine-readable architectural specifications.
28-
For example, there are machine-readable versions of the ARM architecture; both \cite{Reid17,Fox02} either used or developed machine-readable specifications that might be used for this endeavor.
28+
For example, there are machine-readable versions of the ARM architecture; both \cite{Reid17,Fox02} either used or developed machine-readable specifications that might be used for this endeavour.
2929
For RISC-V, there also is a formal specification available \cite{RiscvSpecFormal}.
3030
Not implementing the model by hand would \begin{enumerate*}[label=\alph*)]
3131
\item possibly enhance the trust in the model itself, depending on the trust in the source and the translation procedure, and
@@ -39,8 +39,8 @@ \chapter{Conclusion}
3939
Since these properties are stable for a given architecture, there could be off the shelf tools verifying programs for high-level correctness removing the need to tailor verification efforts per system to be verified.
4040
\end{description}
4141

42-
Finally, the main contribution of this thesis is a new approach the verifying \glspl{isa} by higher-level information flow properties using a model checker.
43-
This approach promises to take into account unbounded numbers of transitions, i.e. instructions, is non-redundant and architecture independent and results in either architectural changes to combat vulnerabilities or rules for, e.g. \gls{os} or compiler engineers that are: \textit{practical} and \textit{verifiable themselves}, \textit{concise}, and \textit{stable}.
42+
Finally, the main contribution of this thesis is a new approach to verifying \glspl{isa} by higher-level information flow properties using a model checker.
43+
This approach promises to take into account unbounded numbers of transitions, i.e. instructions, is non-redundant and architecture-independent and results in either architectural changes to combat vulnerabilities or rules for, e.g. \gls{os} or compiler engineers that are: \textit{practical} and \textit{verifiable themselves}, \textit{concise}, and \textit{stable}.
4444

4545
This approach was applied to the MINRV8 architecture to implement a prototype.
4646
During this, three properties were found that lead to eight rules being stated.

0 commit comments

Comments
 (0)