lh-l4v/proof/access-control
Gerwin Klein a424d55e3e licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
..
ADT_AC.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
Access.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
Arch_AC.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
CNode_AC.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
Deterministic_AC.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
DomainSepInv.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
Dpolicy.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
ExampleSystem.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
Finalise_AC.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
Interrupt_AC.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
Ipc_AC.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
README.md licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
Retype_AC.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
Syscall_AC.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00
Tcb_AC.thy licenses: convert license tags to SPDX 2020-03-13 14:38:24 +08:00

README.md

Access Control Proof

This proof establishes that seL4 enforces the security properties of authority confinement and integrity. These are essential correctness properties of its capability-based access control system: authority confinement means that authority propagates only in accordance with capabilities, and integrity means that data cannot be modified without possession of an appropriate write capability to the data. These properties and proofs are described in detail in an ITP 2011 paper. These properties are phrased over seL4's abstract specification and this proof builds on top of the Abstract Spec Invariant Proof.

Building

To build from the l4v/ directory, run:

./isabelle/bin/isabelle build -d . -v -b Access

Important Theories

The top-level theory where these two properties are proved for the kernel is Syscall_AC; the bottom-level theory where the properties are defined is Access.