This paper describes a mechanism by which an operating -system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel first defines a safety policy and makes it public. Then, using this policy, an application can provide binaries in a special form called self-certified code, or simply SCC. Each SCC binary contains, in addition to the native code, a safety certificate that attests to the code's safety properties. The kernel can easily validate a certificate without using cryptography and without consulting any external trusted entities. If the validation succeeds, the code is guaranteed to respect the safety policy without relying on run-time checks. The main practical difficu...
We report on an ongoing project aiming at a fully secure micro-kernel named ProvenCore. This operati...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
International audienceThe kernel is the most safety-and security-critical component of many computer...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
VirtualBox VM FOR THE BINSEC/CODEX TOOL The kernel is the most safety- and security-critical compon...
Importing and executing untrusted foreign code has become an everyday occurrence: Web servers downlo...
Our project applies automated proof checking to two application domains: protecting host computers f...
Computing systems in which the consequences of failure are very serious are termed safety-critical....
The proliferation of kernel mode malware and rootkits over the last decade is one of the most critic...
Proof-carrying code is a technique that can be used to execute untrusted code safely. A code consum...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
Binary code from untrusted sources remains one of the primary vehicles for malicious software attack...
Binary code from untrusted sources remains one of the primary vehicles for malicious software attack...
Since its creation, the Linux kernel has gained international recognition and has been employed on a...
We report on an ongoing project aiming at a fully secure micro-kernel named ProvenCore. This operati...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...
International audienceThe kernel is the most safety-and security-critical component of many computer...
The vast majority of hosts on the Internet, including mobile clients, are running one of three commo...
VirtualBox VM FOR THE BINSEC/CODEX TOOL The kernel is the most safety- and security-critical compon...
Importing and executing untrusted foreign code has become an everyday occurrence: Web servers downlo...
Our project applies automated proof checking to two application domains: protecting host computers f...
Computing systems in which the consequences of failure are very serious are termed safety-critical....
The proliferation of kernel mode malware and rootkits over the last decade is one of the most critic...
Proof-carrying code is a technique that can be used to execute untrusted code safely. A code consum...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
Binary code from untrusted sources remains one of the primary vehicles for malicious software attack...
Binary code from untrusted sources remains one of the primary vehicles for malicious software attack...
Since its creation, the Linux kernel has gained international recognition and has been employed on a...
We report on an ongoing project aiming at a fully secure micro-kernel named ProvenCore. This operati...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
textOperating system kernels present a difficult security challenge. Despite their millions of lines...