YoVDO

Micro-Policies - Formally Verified, Tag-Based Security Monitors

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Formal Verification Courses Security Policies Courses Memory Safety Courses Control-Flow Integrity Courses

Course Description

Overview

Explore a 22-minute IEEE conference talk on formally verified, tag-based security monitors called micro-policies. Delve into a methodology for defining and reasoning about tag-based reference monitors using a high-level "symbolic machine." Examine the implementation of micro-policies for dynamic sealing, compartmentalization, control-flow integrity, and memory safety. Learn how the tagging mechanism can protect its own integrity. Discover how the symbolic machine is implemented using a hardware rule cache and software controller. Gain insights into the refinement proofs that demonstrate how the symbolic machine embodies high-level security property specifications.

Syllabus

Micro-Policies: Formally Verified, Tag-Based Security Monitors


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Secure Networked System with Firewall and IDS
University of Colorado System via Coursera
Introduction to Cyber Security
Uttarakhand Open University, Haldwani via Swayam
Preparing for the Google Cloud Professional Data Engineer Exam 日本語版
Google Cloud via Coursera
Jump Start: Maestro Hyperscale Network Security
Checkpoint via edX
Information Security - Introduction to Information Security
New York University (NYU) via edX