@inproceedings{da9d56b61eb6412fb1729d470821fbd3,
title = "Portable software fault isolation",
abstract = "We present a new technique for architecture portable software fault isolation (SFI), together with a prototype implementation in the Coq proof assistant. Unlike traditional SFI, which relies on analysis of assembly-level programs, we analyze and rewrite programs in a compiler intermediate language, the Cminor language of the Comp Cert C compiler. But like traditional SFI, the compiler remains outside of the trusted computing base. By composing our program transformer with the verified back-end of Comp Cert and leveraging Comp Cert's formally proved preservation of the behavior of safe programs, we can obtain binary modules that satisfy the SFI memory safety policy for any of Comp Cert's supported architectures (currently: Power PC, ARM, and x86-32). This allows the same SFI analysis to be used across multiple architectures, greatly simplifying the most difficult part of deploying trustworthy SFI systems.",
keywords = "Architecture Portability, Memory Safety, Software Fault Isolation, Verified Compilers",
author = "Kroll, {Joshua A.} and Gordon Stewart and Appel, {Andrew W.}",
note = "Publisher Copyright: {\textcopyright} 2014 IEEE.; 27th IEEE Computer Security Foundations Symposium, CSF 2014 ; Conference date: 19-07-2014 Through 22-07-2014",
year = "2014",
month = nov,
day = "13",
doi = "10.1109/CSF.2014.10",
language = "English (US)",
series = "Proceedings of the Computer Security Foundations Workshop",
publisher = "IEEE Computer Society",
pages = "18--32",
booktitle = "Proceedings - 2014 IEEE 27th Computer Security Foundations Symposium, CSF 2014",
address = "United States",
}