Micro-Policies - Formally Verified, Tag-Based Security Monitors
Offered By: IEEE via YouTube
Course Description
Overview
Explore a 22-minute IEEE conference talk on formally verified, tag-based security monitors called micro-policies. Delve into a methodology for defining and reasoning about tag-based reference monitors using a high-level "symbolic machine." Examine the implementation of micro-policies for dynamic sealing, compartmentalization, control-flow integrity, and memory safety. Learn how the tagging mechanism can protect its own integrity. Discover how the symbolic machine is implemented using a hardware rule cache and software controller. Gain insights into the refinement proofs that demonstrate how the symbolic machine embodies high-level security property specifications.
Syllabus
Micro-Policies: Formally Verified, Tag-Based Security Monitors
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Secure Networked System with Firewall and IDSUniversity of Colorado System via Coursera Introduction to Cyber Security
Uttarakhand Open University, Haldwani via Swayam Preparing for the Google Cloud Professional Data Engineer Exam 日本語版
Google Cloud via Coursera Jump Start: Maestro Hyperscale Network Security
Checkpoint via edX Information Security - Introduction to Information Security
New York University (NYU) via edX