Micro-Policies - Formally Verified, Tag-Based Security Monitors
Offered By: IEEE via YouTube
Course Description
Overview
Explore a 22-minute IEEE conference talk on formally verified, tag-based security monitors called micro-policies. Delve into a methodology for defining and reasoning about tag-based reference monitors using a high-level "symbolic machine." Examine the implementation of micro-policies for dynamic sealing, compartmentalization, control-flow integrity, and memory safety. Learn how the tagging mechanism can protect its own integrity. Discover how the symbolic machine is implemented using a hardware rule cache and software controller. Gain insights into the refinement proofs that demonstrate how the symbolic machine embodies high-level security property specifications.
Syllabus
Micro-Policies: Formally Verified, Tag-Based Security Monitors
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Sensor SecurityIEEE via YouTube Tracking Ransomware End-to-end
IEEE via YouTube Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube