lh-l4v/proof/access-control
Gerwin Klein 0f2d557679 terminology in comments: async ep -> notifications 2015-11-24 16:58:22 +13:00
..
ADT_AC.thy 2015 update for access 2015-05-06 13:46:20 -04:00
Access.thy add arch_tcb object to C, rename aep -> ntfn 2015-11-20 16:02:13 +11:00
Arch_AC.thy add arch_tcb object to C, rename aep -> ntfn 2015-11-20 16:02:13 +11:00
CNode_AC.thy add arch_tcb object to C, rename aep -> ntfn 2015-11-20 16:02:13 +11:00
Deterministic_AC.thy Fix Access, InfoFlow and DRefine. 2014-08-13 16:45:40 +10:00
DomainSepInv.thy Wait -> Recv: update proofs 2015-11-20 16:02:14 +11:00
Dpolicy.thy add arch_tcb object to C, rename aep -> ntfn 2015-11-20 16:02:13 +11:00
ExampleSystem.thy add arch_tcb object to C, rename aep -> ntfn 2015-11-20 16:02:13 +11:00
Finalise_AC.thy add arch_tcb object to C, rename aep -> ntfn 2015-11-20 16:02:13 +11:00
Interrupt_AC.thy Minor adjustments caused by Strengthen changes. 2015-10-29 11:27:54 +11:00
Ipc_AC.thy terminology in comments: async ep -> notifications 2015-11-24 16:58:22 +13:00
README.md misc: Proofing and formatting of README.md files. 2014-07-28 13:15:48 +10:00
Retype_AC.thy add arch_tcb object to C, rename aep -> ntfn 2015-11-20 16:02:13 +11:00
Syscall_AC.thy Wait -> Recv: update proofs 2015-11-20 16:02:14 +11:00
Tcb_AC.thy add arch_tcb object to C, rename aep -> ntfn 2015-11-20 16:02:13 +11:00

README.md

Access Control Proof

This proof establishes that seL4 enforces the security properties of authority confinement and integrity. These are essential correctness properties of its capability-based access control system: authority confinement means that authority propagates only in accordance with capabilities, and integrity means that data cannot be modified without possession of an appropriate write capability to the data. These properties and proofs are described in detail in an ITP 2011 paper. These properties are phrased over seL4's abstract specification and this proof builds on top of the Abstract Spec Invariant Proof.

Building

To build from the l4v/ directory, run:

./isabelle/bin/isabelle build -d . -v -b Access

Important Theories

The top-level theory where these two properties are proved for the kernel is Syscall_AC; the bottom-level theory where the properties are defined is Access.