Loading…
Attending this event?
arrow_back View All Dates
Thursday, October 17
 

08:00 AEDT

Registration
Thursday October 17, 2024 08:00 - 17:00 AEDT
Thursday October 17, 2024 08:00 - 17:00 AEDT
Bluegum Lobby

09:00 AEDT

seL4 in Software-Defined Vehicles: Vision, Roadmap, and Impact at NIO
Thursday October 17, 2024 09:00 - 09:50 AEDT
The automotive industry is rapidly evolving, with software-defined vehicles (SDVs) at the forefront of this transformation. At NIO, we are leveraging the seL4 microkernel to redefine vehicle architecture, ensuring robust safety, reliability, and performance. This presentation will explore the vision behind integrating seL4 into our SDV platform. We will share the journey of delivering the seL4-based SkyOS-M within the ONVO vehicle on our latest NT3 platform, highlight the significant impact this integration has had on our vehicle design and functionality, and outline our future roadmap beyond the current launch.
Speakers
Thursday October 17, 2024 09:00 - 09:50 AEDT
Banksia + Bluegum

09:50 AEDT

Announcements
Thursday October 17, 2024 09:50 - 10:00 AEDT
Thursday October 17, 2024 09:50 - 10:00 AEDT
Banksia + Bluegum

10:00 AEDT

Break
Thursday October 17, 2024 10:00 - 10:30 AEDT
Thursday October 17, 2024 10:00 - 10:30 AEDT
Bluegum Lobby

10:00 AEDT

Expo Hall
Thursday October 17, 2024 10:00 - 15:30 AEDT
Thursday October 17, 2024 10:00 - 15:30 AEDT
Bluegum Lobby

10:30 AEDT

Enhancing seL4’s C/C++ userspace memory safety using CHERI
Thursday October 17, 2024 10:30 - 11:00 AEDT
seL4 currently provides, formally verified, memory safety guarantees in the kernel and isolation guarantees between seL4's userspace tasks, but there is no safety within a single seL4 task or protection domain itself (e.g., VMs or single-address-space servers such as rumprun). According to a recent Microsoft study, memory safety vulnerabilities account for 70% of all software vulnerabilities. CHERI is a capability-based hardware-software architecture aiming to address memory-safety and software compartmentalisation issues. The goal of this project is to have a complete memory-safe C/C++ seL4-based software stack using CHERI on Morello, without having to re-write the existing seL4 C/C++ userspace libraries (currently over 250 KLoC, using sloc tool) from scratch or formally verify them. This talk will describe the progress of CHERIfying the existing seL4's userspace in order to have complete (spatial) memory and pointer safety.
Speakers
HA

Hesham Almatary

Capabilities Limited
Thursday October 17, 2024 10:30 - 11:00 AEDT
Banksia + Bluegum

11:00 AEDT

Hardware Support for Time Protection
Thursday October 17, 2024 11:00 - 11:15 AEDT
Timing channels enable information leakage across address spaces, bypassing an operating system’s security boundaries. They can result from any shared microarchitectural state that depends on previous execution and affects a system’s timing. Closing timing channels (aka “time protection”) requires strict partitioning of microarchitectural state, which is not feasible (or extremely expensive) in current ISAs.

At the 2022 seL4 summit, we presented the custom RISC-V fence.t instruction to temporally partition on-core processor state in CVA6, a simple in-order RV64GC processor. This year’s talk will propose a minimal ISA extension that enables hybrid spatial and temporal partitioning of a complete system-on-chip comprising complex out-of-order CPUs, last-level caches, and DRAMs, making system-wide microarchitectural state a first-class resource that can be managed by the OS. We will highlight hardware design implications in different system components and present preliminary experimental results detailing the efficacy and performance overheads of the proposed solution based on extended hardware systems running seL4.
Speakers
NW

Nils Wistoff

ETH Zurich
GH

Gernot Heiser

Trustworthy Systems, UNSW
LB

Luca Benini

ETH Zurich and University of Bologna
Thursday October 17, 2024 11:00 - 11:15 AEDT
Banksia + Bluegum

11:15 AEDT

Verification Status of Time Protection and Microkit-based OS Services
Thursday October 17, 2024 11:15 - 11:45 AEDT
This talk will give an overview of the status of ongoing and planned research and development at Trustworthy Systems to expand the scope of proofs about seL4-based operating systems in two directions: (1) downwards, to prove that the seL4 kernel implements time protection correctly at the abstract and C specification levels, and (2) upwards, to prove functional specifications of seL4's system calls and on that basis carry out SMT-based automated deductive verification of the user-level seL4 Microkit and Lions OS service components built on top of it. Here I will lay out the research and engineering challenges facing us on both these fronts and the planned subprojects for which we seek talented PhD students, postdocs and engineers to tackle them.
Speakers
avatar for Rob Sison

Rob Sison

Senior Research Associate, UNSW Sydney
Rob is a postdoc at UNSW Sydney who researches and develops formal methods, primarily for proving absences of information flow in systems for high-assurance use cases. In the past, their focus was on complications arising from concurrency and refinement to enable secure compilation... Read More →
Thursday October 17, 2024 11:15 - 11:45 AEDT
Banksia + Bluegum

11:45 AEDT

seL4 as a CPU Driver for an OS for Real Computers
Thursday October 17, 2024 11:45 - 12:15 AEDT
Modern operating systems -- including seL4 -- are written to a fictional model of machine hardware from the 1960s and 1970s: a set of homogeneous cores accessing a common physical address space containing main memory, plus memory-mapped devices. However, modern SoCs and server platforms are really a complex network of heterogeneous cores and intelligent devices, many of which are running their own firmware and "operating systems''. The result is a catastrophe of system design, including a plethora of security exploits like remote over-the-air compromises due to
weaknesses in WiFi modem firmware. Link: https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_11.html.

We are building Kirsch, a new OS that solves this problem by embracing and formally capturing the heterogeneity and multiple trust domains of modern hardware. To this end, Kirsch formally models what each hardware context can access using a decoding net representation of the platform (Link "Putting out the hardware dumpster fire", https://doi.org/10.1145/3593856.3595903), which induces a trust relationship between contexts. This trust relationship is the basis for reasoning about isolation, protection and authorization in the system. An seL4 instance can run from, and manage, a region of RAM which is explicitly isolated from untrusted contexts in the system, by using the trust an access information we formally derived. Kirsch thus recovers the power of the seL4 correctness proofs, and we can finally use the seL4 kernel to run truly isolated processes and virtual machines.
Speakers
avatar for Timothy Roscoe

Timothy Roscoe

Professor, ETH Zurich
avatar for Roman Meier

Roman Meier

Doctoral Student, ETH Zurich
I'm broadly interested in research that involves Operating Systems, with a sprinkling of Formal Methods on top: How to correctly manage a computer, or collection of computers, with actual confidence in the correctness of methods and code.
BF

Ben Fiedler

Doctoral Student, ETH Zürich
avatar for Zikai Liu

Zikai Liu

Doctoral Student, ETH Zurich
Thursday October 17, 2024 11:45 - 12:15 AEDT
Banksia + Bluegum

12:15 AEDT

Lunch
Thursday October 17, 2024 12:15 - 13:30 AEDT
Thursday October 17, 2024 12:15 - 13:30 AEDT
Jacaranda Terrace

13:30 AEDT

Discussion, BoF Teasers
Thursday October 17, 2024 13:30 - 13:45 AEDT
Thursday October 17, 2024 13:30 - 13:45 AEDT
Banksia + Bluegum

14:00 AEDT

BoFs
Thursday October 17, 2024 14:00 - 15:00 AEDT
Thursday October 17, 2024 14:00 - 15:00 AEDT
Banksia + Bluegum

15:00 AEDT

Break
Thursday October 17, 2024 15:00 - 15:30 AEDT
Thursday October 17, 2024 15:00 - 15:30 AEDT
Bluegum Lobby

15:30 AEDT

BoFs
Thursday October 17, 2024 15:30 - 16:30 AEDT
Thursday October 17, 2024 15:30 - 16:30 AEDT
Banksia + Bluegum

16:30 AEDT

Report from BoFs + Discussion
Thursday October 17, 2024 16:30 - 16:45 AEDT
Thursday October 17, 2024 16:30 - 16:45 AEDT
Banksia + Bluegum

16:45 AEDT

Concluding Remarks
Thursday October 17, 2024 16:45 - 17:00 AEDT
Thursday October 17, 2024 16:45 - 17:00 AEDT
Banksia + Bluegum
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -