You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: thesis/sections/conclusion.tex
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -7,9 +7,9 @@ \chapter{Conclusion}
7
7
As a first step, the MINRV8 architecture inspired by the RISC-V architecture was defined and implemented in nuXmv in section \ref{sec:minrv8}.
8
8
In chapter \ref{chp:ifc}, information flow semantics and three information flow properties forming an information flow control in spirit of the work of \citeauthor{Ferraiuolo17} \cite{Ferraiuolo17} were developed.
9
9
The information flow semantics was used to augment the model of the MINRV8 by information flow tracking.
10
-
In chapter \ref{chp:results} eight assumptions that, when implemented software running in machine-mode, guarantee the absence of vulnerabilities covered by aforementioned information flow properties were presented.
10
+
In chapter \ref{chp:results}, eight assumptions that, when implemented software running in machine-mode, guarantee the absence of vulnerabilities covered by the aforementioned information flow properties were presented.
11
11
Our model, the properties and the assumptions were evaluated by showing that taken together, they manage to detect both the cache poisoning \cite{Wojtczuk09} and the SYSRET vulnerability \cite{Dunlap19}.
12
-
Finally in chapter \ref{chp:discussion}, the limitations and the scope of our work were discussed and it was reflected whether our methodology is trustworthy.
12
+
Finally, in chapter \ref{chp:discussion}, the limitations and the scope of our work were discussed and it was reflected whether our methodology is trustworthy.
13
13
14
14
\begin{figure}
15
15
\centering
@@ -20,12 +20,12 @@ \chapter{Conclusion}
20
20
21
21
Before a final summary of what has been achieved in this thesis will be given, we first recap all directions future work might take that were hinted towards throughout this thesis:
22
22
\begin{description}
23
-
\item[Executable memory] First and foremost, the model could be enhanced by a model of executable memory to more closely resemble modern architectures.
23
+
\item[Executable memory] First and foremost, the model could be enhanced by a model of executable memory to resemble modern architectures more closely.
24
24
This was discussed extensively in section \ref{sec:discuss-arch}.
25
25
\item[MMU] In light of \cite{KhakpourSD13} a model of an \gls{mmu} could be implemented to make use of information flow tracking on user-mode level.
26
26
This was discussed in chapter \ref{chp:related-work}.
27
27
\item[Machine-generated model] The model of the architecture that was implemented by hand in this thesis could be generated from existing machine-readable architectural specifications.
28
-
For example, there are machine-readable versions of the ARM architecture; both \cite{Reid17,Fox02} either used or developed machine-readable specifications that might be used for this endeavor.
28
+
For example, there are machine-readable versions of the ARM architecture; both \cite{Reid17,Fox02} either used or developed machine-readable specifications that might be used for this endeavour.
29
29
For RISC-V, there also is a formal specification available \cite{RiscvSpecFormal}.
30
30
Not implementing the model by hand would \begin{enumerate*}[label=\alph*)]
31
31
\item possibly enhance the trust in the model itself, depending on the trust in the source and the translation procedure, and
@@ -39,8 +39,8 @@ \chapter{Conclusion}
39
39
Since these properties are stable for a given architecture, there could be off the shelf tools verifying programs for high-level correctness removing the need to tailor verification efforts per system to be verified.
40
40
\end{description}
41
41
42
-
Finally, the main contribution of this thesis is a new approach the verifying \glspl{isa} by higher-level information flow properties using a model checker.
43
-
This approach promises to take into account unbounded numbers of transitions, i.e. instructions, is non-redundant and architectureindependent and results in either architectural changes to combat vulnerabilities or rules for, e.g. \gls{os} or compiler engineers that are: \textit{practical} and \textit{verifiable themselves}, \textit{concise}, and \textit{stable}.
42
+
Finally, the main contribution of this thesis is a new approach to verifying \glspl{isa} by higher-level information flow properties using a model checker.
43
+
This approach promises to take into account unbounded numbers of transitions, i.e. instructions, is non-redundant and architecture-independent and results in either architectural changes to combat vulnerabilities or rules for, e.g. \gls{os} or compiler engineers that are: \textit{practical} and \textit{verifiable themselves}, \textit{concise}, and \textit{stable}.
44
44
45
45
This approach was applied to the MINRV8 architecture to implement a prototype.
46
46
During this, three properties were found that lead to eight rules being stated.
0 commit comments