Verifying Safety and Liveness Properties of a Kernelized Web Browser

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=hSt3GdCXWeg



Duration: 56:35
124 views
1


We describe our in-progress efforts to verify safety and liveness properties of a kernelized web browser model (with as little effort as possible). Kernelized web browsers partition the traditional monolithic browser architecture into two parts: 1) a browser kernel that includes security-relevant functionality and 2) a less privileged user-level component. The browser kernel's goal is to constrain malicious users from violating the integrity or confidentiality of honest users. The focus of this talk will be on our security-centric verification methodology including: 1) specifying security properties including a novel formulation of noninterference, 2) fine-grained partitioning of security-relevant and irrelevant system components, 3) identifying the 'right' level of abstraction to locate design flaws without getting bogged down in implementation issues, and 4) specifying realistic adversaries in a simple and intuitive way that avoids over-constraining their capabilities. We discuss insights gleaned from the verification process including how secure systems can be designed to reduce verification costs, some potential future directions that promise to further reduce verification costs, and open questions that weΓÇÖd love help answering. No background in verification or browsers is necessary to understand this talk.




Other Videos By Microsoft Research


2016-08-17Computational Social Science in Medicine
2016-08-17Virtual Machine Reset Vulnerabilities; Subspace LWE; Cryptography Against Continuous Memory Attacks
2016-08-17Adaptive Submodularity: A New Approach to Active Learning and Stochastic Optimization
2016-08-17Spectral graph sparsification Part 1: -- (The Combinatorial Multigrid Solver)
2016-08-17Glauber Dynamics for the 2D Ising Model at Low Temperature
2016-08-17Sheriff: Detecting and Eliminating False Sharing
2016-08-17National Renewable Energy Lab, renewable energy and the compute space
2016-08-17Insights into Ad-sponsored Mobile Software
2016-08-17End-User Creation of Mashups and Cross-Device UI Prototypes
2016-08-17Fully Homomorphic Encryption; Bi-Deniable Encryption; We Have The Technology, Now Where Next?
2016-08-17Verifying Safety and Liveness Properties of a Kernelized Web Browser
2016-08-17The successes and challenges of making low-data languages in online automatic translation portals
2016-08-17Optimal Auctions with Budget Constraints
2016-08-17Proof of Aldous' spectral gap conjecture
2016-08-17Why Social Computing Is So Hard
2016-08-17Metastabiity and logarithmic energy barriers for a polymer dynamics
2016-08-17Predicate Encryption; Structured Encryption and Controlled Disclosure; Cloud Cryptography
2016-08-17Approximation Schemes for Optimization
2016-08-17All pairs shortest path in quadratic time with high probability
2016-08-17Steering and Capturing Human Insight for Large-Scale Learning of Visual Objects
2016-08-17Welcome and opening remarks; Point Obfuscation and Friends; Outsourcing Computation



Tags:
microsoft research