lh-l4v/proof/infoflow
Matthew Brecknell a3714e8190 SELFOUR-276: Finish proofs for maximum controlled priority (MCP)
To finish the proof of refinement to C, the specification for checkPrio
needed strengthening: the checkPrio spec now takes a machine word
argument. In the spec, priorities are still stored as 8-bit quantities,
however. Once the spec was strenthened, it was possible to remove some
redundant checks and mask operations from the C code.

A thread's maximum controlled priority (MCP) determines the maximum
thread priority or MCP it can assign to another thread (or itself).
2016-10-05 02:43:41 +11:00
..
admin Import release snapshot. 2014-07-14 21:32:44 +02:00
figs Import release snapshot. 2014-07-14 21:32:44 +02:00
tools Import release snapshot. 2014-07-14 21:32:44 +02:00
ADT_IF.thy SELFOUR-276: Finish proofs for maximum controlled priority (MCP) 2016-10-05 02:43:41 +11:00
ADT_IF_Refine.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00
ADT_IF_Refine_C.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00
Arch_IF.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00
CNode_IF.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00
Decode_IF.thy SELFOUR-276: Finish proofs for maximum controlled priority (MCP) 2016-10-05 02:43:41 +11:00
ExampleSystemPolicyFlows.thy infoflow: 2015 update (apart from C refinement) 2015-05-16 18:14:59 +10:00
Example_Valid_State.thy SELFOUR-276: Finish proofs for maximum controlled priority (MCP) 2016-10-05 02:43:41 +11:00
Example_Valid_StateH.thy SELFOUR-276: Finish proofs for maximum controlled priority (MCP) 2016-10-05 02:43:41 +11:00
FinalCaps.thy SELFOUR-276: Finish proofs for maximum controlled priority (MCP) 2016-10-05 02:43:41 +11:00
Finalise_IF.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00
IRQMasks_IF.thy SELFOUR-276: Finish proofs for maximum controlled priority (MCP) 2016-10-05 02:43:41 +11:00
InfoFlow.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00
Interrupt_IF.thy arch_split: requalify abstract theories 2016-04-27 18:46:16 +10:00
Ipc_IF.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00
Noninterference.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00
Noninterference_Base.thy infoflow: 2015 update (apart from C refinement) 2015-05-16 18:14:59 +10:00
Noninterference_Base_Alternatives.thy infoflow: minor cleanup 2015-05-16 21:49:01 +10:00
Noninterference_Base_Enabledness_weak_asym.thy regression: add test to check theory import paths 2016-05-27 16:17:13 +10:00
Noninterference_Base_Refinement.thy Isabelle2016: infoflow update (partial) 2016-02-11 11:15:59 +11:00
Noninterference_Base_Refinement_Example.thy SELFOUR-421: infoflow and infoflow_c builds 2016-09-22 19:11:37 +10:00
Noninterference_Refinement.thy arch_split: InfoFlowC checking 2016-05-06 13:15:37 +10:00
PasUpdates.thy arch_split: invariants: split CNodeInv_AI [VER-573] 2016-07-04 11:56:53 +10:00
PolicyExample.thy terminology in comments: async ep -> notifications 2015-11-24 16:58:22 +13:00
PolicySystemSAC.thy add arch_tcb object to C, rename aep -> ntfn 2015-11-20 16:02:13 +11:00
README.md infoflow: Move "EquivValid" out of "infoflow/", into "lib/". 2014-10-13 11:05:31 +11:00
Retype_IF.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00
Scheduler_IF.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00
Syscall_IF.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00
Tcb_IF.thy SELFOUR-276: Finish proofs for maximum controlled priority (MCP) 2016-10-05 02:43:41 +11:00
UserOp_IF.thy SELFOUR-421: fix coding style 2016-09-22 19:23:28 +10:00

README.md

Confidentiality Proof

This proof establishes that seL4 enforces information flow, and so enforces the security property of confidentiality. Information flow security is defined in terms of (intransitive) noninterference, and implies confidentiality: data cannot be inferred without appropriate read authority. This proof is described in a 2013 IEEE Symposium on Security and Privacy paper. This proof firstly establishes noninterference for seL4's abstract specification, building on top of the Access Control Proof, before transferring the noninterference result to the kernel's C implementation via the Design Spec Refinement Proof and the C Refinement Proof.

Building

To build from the l4v/ directory, run:

./isabelle/bin/isabelle build -d . -v -b InfoFlow

Important Theories

The top-level theory where noninterference is proved for the seL4 abstract specification is Noninterference; it is transferred to the C implementation via refinement in the theory Noninterference_Refinement. The base theory where noninterference is (generically) defined is Noninterference_Base. The bottom-level theory where confidentiality is formalised over the seL4 abstract specification is InfoFlow. Confidentiality is a relational property and the theory EquivValid defines these generically for the nondeterministic state monad of the abstract specification.