The HACMS program: using formal methods to eliminate exploitable bugs

Author:

Fisher Kathleen1ORCID,Launchbury John2,Richards Raymond2

Affiliation:

1. Department of Computer Science, Tufts University, Medford, MA, USA

2. DARPA, Arlington, VA, USA

Abstract

For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA’s HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles. This article is part of the themed issue ‘Verified trustworthy software systems’.

Publisher

The Royal Society

Subject

General Physics and Astronomy,General Engineering,General Mathematics

Reference53 articles.

1. Smith T. 2001 Hacker jailed for revenge sewage attacks. See http://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/.

2. Zetter K. 2011 Even prisons can be hacked now. See http://gizmodo.com/5826291/researchers-say-vulnerabilities-could-let-hackers-spring-prisoners-from-cells.

3. Radcliffe J. 2011 Hacking medical devices for fun and insulin: breaking the human SCADA system. See https://media.blackhat.com/bh-us-11/Radcliffe/BH_US_11_Radcliffe_Hacking_Medical_Devices_WP.pdf.

4. Storm D. 2015 Researchers hack a pacemaker kill a man(nequin). See http://www.computerworld.com/article/2981527/cybercrime-hacking/researchers-hack-a-pacemaker-kill-a-man-nequin.html.

5. Cui A Stolfo SJ. 2011 Print me if you dare: firmware modification attacks and the rise of printer malware. In The 28th Chaos Communication Congress . See http://ids.cs.columbia.edu/sites/default/files/CuiPrintMeIfYouDare.pdf.

Cited by 29 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Building a Scientific Foundation for Security: Multilayer Network Model Insights for System Security Engineering;INCOSE International Symposium;2024-07

2. Next Generation Vehicles, Safety, and Cybersecurity—The CMX Framework;IEEE Transactions on Intelligent Transportation Systems;2024-02

3. CoqMatrix: Formal matrix library with multiple models in Coq;Journal of Systems Architecture;2023-10

4. An analysis of how many undiscovered vulnerabilities remain in information systems;Computers & Security;2023-08

5. A Research Agenda for Space Flight Software Security;2023 IEEE 9th International Conference on Space Mission Challenges for Information Technology (SMC-IT);2023-07

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3