News
SysV: Oral examWritten on 30.01.22 (last change on 30.01.22) by Hamed Nemati Please pick a time slot that suits you better for the oral exam from this Doodle table. The oral exam will be on February 10. Zoom link for the exam: https://stanford.zoom.us/j/92422300762?pwd=VlVNemhKS0FtTmZTOHhwQzBnZFdvUT09
|
SysV: fourth Q&A sessionWritten on 05.01.22 by Hamed Nemati So far there is no question on Askbot, which means again there will be no Q&A session today. However, I will be in the room for a few minutes to answer random questions. Here is the link (3:00pm): https://stanford.zoom.us/j/98571696846?pwd=NzF3N3E0aDJnSkxuUUo1TS8vbitqQT09 |
PROTO parts start at 16:00 and materials onlineWritten on 03.01.22 by Robert Künnemann Hi! The PROTO lectures, which start next next week (Jan 12) will not be at the usual time, but at 16:00. This is to be compatible with Standford time, see the discussion on Askbot. Hi! The PROTO lectures, which start next next week (Jan 12) will not be at the usual time, but at 16:00. This is to be compatible with Standford time, see the discussion on Askbot. Cheers, Robert |
SysV: the fourth lecture is outWritten on 02.01.22 (last change on 02.01.22) by Hamed Nemati The fourth lecture is available now: link (https://drive.google.com/file/d/1GnrphWdqJz5gDe-oFbg1kNbSNcDYPBU5/view?usp=sharing). This lecture we talk about validation of abstract side channel models for computer architectures. The goal of this lecture is to learn about combining formal methods and… Read more The fourth lecture is available now: link (https://drive.google.com/file/d/1GnrphWdqJz5gDe-oFbg1kNbSNcDYPBU5/view?usp=sharing). This lecture we talk about validation of abstract side channel models for computer architectures. The goal of this lecture is to learn about combining formal methods and fuzzing to find bugs in low-level systems. Supplementary materials: Please make sure to check the lecture before our Q&A session on Wednesday (January 5). |
SysV: Deadline for the second assignment is extendedWritten on 30.12.21 (last change on 30.12.21) by Hamed Nemati I decided to extend the deadline for the second assignment until Tuesday January 4. |
SysV: third assignment (Deadline January 14, 23:59)Written on 16.12.21 (last change on 16.12.21) by Hamed Nemati The third problem set on SysV is available now.
The deadline is January 14, 23:59. We wish you a happy and prosperous new year :) |
SysV: Third Q&A sessionWritten on 15.12.21 by Hamed Nemati So far there is no question on Askbot, which means again there will be no Q&A session today. However, I will be in the room for a few minutes to answer random questions. Here is the link (3:00pm): https://stanford.zoom.us/j/98571696846?pwd=NzF3N3E0aDJnSkxuUUo1TS8vbitqQT09 The problem set for… Read more So far there is no question on Askbot, which means again there will be no Q&A session today. However, I will be in the room for a few minutes to answer random questions. Here is the link (3:00pm): https://stanford.zoom.us/j/98571696846?pwd=NzF3N3E0aDJnSkxuUUo1TS8vbitqQT09 The problem set for the third lecture will be posted tomorrow. |
SysV: Notes on the third question of Problem set 2Written on 12.12.21 (last change on 12.12.21) by Hamed Nemati The goal of this question is to see how we can apply a compositional approach to prove noninterference for a real world scenario where we have a processor connected to the main memory and the MMU. The interactions between these three components are clearly stated in the third lecture so if you have… Read more The goal of this question is to see how we can apply a compositional approach to prove noninterference for a real world scenario where we have a processor connected to the main memory and the MMU. The interactions between these three components are clearly stated in the third lecture so if you have not heard about them before please refer to the third lecture. In this scenario the core component is acting on behalf of the user level processes. This means that it receives requests in term of read and write operations from the user processes and tries to execute them and retrive the data from (or write user supplied date into) the memory. As you may remember from your Operating System course processes are using virtual addresses to access the memory. However, the main memory is indexed with physical addresses. This implies that whenever the core receives a memory access request from a user process, it should first translate this address into the corresponding physical address and for this the core queries the MMU. 1- The word "interface" in the first part of the question has a standard meaning. In other words by "interface" we mean a set of functionalities that the core provides to user level processes or to interact with the memory and the MMU. 2- What you need to do here is to define an observation relation as required by the noninterference property. The observation relation defines which parts of the memory and core states are visible to an attacker. In translating virtual-to-physical addresses the MMU uses page tables which store the mapping between virtual and physical addresses. So the page tables are security critical and must be protected from modifications by a user level process. Otherwise they can change the mappings in these tables and get access to secret part of the system and invalidate the noninterference property. 3- The third part of the question asks you to define a predicate which prevents user level processes from changing page tables. We need this to be able to prove the noninterference property and without defining such a constraint we cannot do the proof. In order to answer this question what you will need to define is a function like MMU which takes as input the memory and user request plus some other stuffs (if needed, you figure this out) and return either the corresponding physical address or an error saying that the request is invalid due to permission error or other issues. 4- If you manage to define the previous parts reasoning compositionally about the noninterference property should be easy. What you will need to do here is to split the proof other the noninterference property into two separate parts one about the core components and the other one about the memory. To help you further with answering this question I ask you to check the section 4 of this paper (link). |
SysV: note on "option simulation"Written on 12.12.21 (last change on 12.12.21) by Hamed Nemati Regarding the "option simulation" note that the right hand side diagram represents the situation where we have "stuttering", however we know that the "measure" is decreasing thus the abstract model cannot infinitely stutter. When the stuttering finished then the left hand side diagram holds and we can… Read more Regarding the "option simulation" note that the right hand side diagram represents the situation where we have "stuttering", however we know that the "measure" is decreasing thus the abstract model cannot infinitely stutter. When the stuttering finished then the left hand side diagram holds and we can continue to compare abstract and concrete models behaviour. |
SysV: notes on confidentiality preserving refinementWritten on 12.12.21 (last change on 13.12.21) by Hamed Nemati Some notes on confidentiality preserving refinement stated in the following theorem: where means "T_impl simulates T_spec" and it is define as follows: Regarding the simulation relation used in the confidentiality preserving refinement part of the lecture, please note the direction… Read more Some notes on confidentiality preserving refinement stated in the following theorem: where means "T_impl simulates T_spec" and it is define as follows: Regarding the simulation relation used in the confidentiality preserving refinement part of the lecture, please note the direction of the simulation property, that is "T_impl simulates T_spec". This is in opposite direction of the simulation property we normally use to prove the functional correctness of systems. The specific direction that we used here guarantees that all permitted behaviour of the systems (modeled by the specification) are also behaviour of the implementation model. In the simulation relation definition the condition "" guarantees that initial states of the two transitions are related by the property |
SysV: the third lecture is outWritten on 12.12.21 (last change on 12.12.21) by Hamed Nemati The third lecture is available now: link (https://drive.google.com/file/d/192NHl94rTGki3Qedtq4BSvxKsxX2qFZY/view?usp=sharing). This lecture we talk about refinement based reasoning and learn how to use a step-wise approach to simplify verification of a large scale system. Supplementary… Read more The third lecture is available now: link (https://drive.google.com/file/d/192NHl94rTGki3Qedtq4BSvxKsxX2qFZY/view?usp=sharing). This lecture we talk about refinement based reasoning and learn how to use a step-wise approach to simplify verification of a large scale system. Supplementary materials:
Please make sure to check the lecture before our Q&A session on Wednesday (Dec. 15). |
SysV: second assignment (Deadline December 30, 23:59)Written on 09.12.21 (last change on 09.12.21) by Hamed Nemati The second problem set on SysV is available now. The deadline is December 30, 23:59. |
SysV: Second Q&A sessionWritten on 08.12.21 by Hamed Nemati So far there is no question on Askbot, which means there will be no Q&A session today. However, I will be in the room for a few minutes to answer random questions. Here is the link (3:00pm): https://stanford.zoom.us/j/98571696846?pwd=NzF3N3E0aDJnSkxuUUo1TS8vbitqQT09 The problem set for the… Read more So far there is no question on Askbot, which means there will be no Q&A session today. However, I will be in the room for a few minutes to answer random questions. Here is the link (3:00pm): https://stanford.zoom.us/j/98571696846?pwd=NzF3N3E0aDJnSkxuUUo1TS8vbitqQT09 The problem set for the second lecture will be posted tomorrow. |
SysV: the second lecture is outWritten on 05.12.21 (last change on 05.12.21) by Hamed Nemati The second lecture is available now: link (https://drive.google.com/file/d/1-UyTwzaubGD_A9YU4_cG1M8Z15sWAvnN/view?usp=sharing). This lecture we talk about compositional reasoning and learn about some of the techniques that are used in practice to decompose large scale system… Read more The second lecture is available now: link (https://drive.google.com/file/d/1-UyTwzaubGD_A9YU4_cG1M8Z15sWAvnN/view?usp=sharing). This lecture we talk about compositional reasoning and learn about some of the techniques that are used in practice to decompose large scale system verification. Supplementary materials: Please make sure to check the lecture before our Q&A session on Wednesday (Dec. 8). |
SysV: first assignment (Deadline December 17, 23:59)Written on 02.12.21 by Hamed Nemati The first problem set on SysV is available now. The deadline is December 17, 23:59. |
SysV: First Q&A sessionWritten on 01.12.21 by Hamed Nemati So far there is no question on Askbot, which means there will be no Q&A session today. However, I will be in the room for a few minutes to answer random questions. Here is the link (3:00pm): https://stanford.zoom.us/j/98571696846?pwd=NzF3N3E0aDJnSkxuUUo1TS8vbitqQT09 The problem set for the first… Read more So far there is no question on Askbot, which means there will be no Q&A session today. However, I will be in the room for a few minutes to answer random questions. Here is the link (3:00pm): https://stanford.zoom.us/j/98571696846?pwd=NzF3N3E0aDJnSkxuUUo1TS8vbitqQT09 The problem set for the first lecture will be posted tomorrow. |
SysV: the first lecture is outWritten on 28.11.21 by Hamed Nemati The first lecture is available now: link (https://dl.cispa.de/s/qDoPwpjRwwfcLXr). This lecture we talk about preliminaries and try to set the stage for the other lectures. Supplementary materials: The first lecture is available now: link (https://dl.cispa.de/s/qDoPwpjRwwfcLXr). This lecture we talk about preliminaries and try to set the stage for the other lectures. Supplementary materials: Please make sure to check the lecture before our Q/A session on Wednesday (Dec. 1). |
Second part of the course starts next week ...Written on 26.11.21 by Hamed Nemati Next week we start with the second part of the course, which covers topics related to system verification (SysV). As it is announced before this part of the course will be given by recorded lectures (plus supplementary materials including lecture notes and other useful documents) which will be… Read more Next week we start with the second part of the course, which covers topics related to system verification (SysV). As it is announced before this part of the course will be given by recorded lectures (plus supplementary materials including lecture notes and other useful documents) which will be available at the beginning of each week. You have 3 days to check the lecture before our Q&A session. On Wednesday will meet at 15pm to answer questions (if any) that pop up on Askbot (see the menu of the course page). Please DO ask your questions on Askbot: no questions (up until the Q&A session) means no Q&A. Organisation of the course is available here, where we also publish links to the course materials. |
IFC class 4 + exam linksWritten on 24.11.21 by Marco Patrignani Hello students,
Also, here are the zoom links for the exams: Friday 9th we'll use this room: Saturday 10th we'll use this room: Hello students,
Also, here are the zoom links for the exams: Friday 9th we'll use this room: Saturday 10th we'll use this room:
cheers, |
IFC exam doodleWritten on 17.11.21 by Marco Patrignani Hello students, the doodle for the IFC exam is out (https://doodle.com/poll/gttyqtyga93xrins?utm_source=poll&utm_medium=link) , please select your slots. |
IFC class 3Written on 10.11.21 by Marco Patrignani Hi students, the recording of today's lecture is up! |
IFC Class 2Written on 03.11.21 by Marco Patrignani Hi students, the link for the class recording for today is up. Please let us know if you have any issue accessing it, and as always, post your questions on askbot so we'll go through them on friday.
|
IFC assignment 1Written on 29.10.21 by Marco Patrignani Hello students, the first IFC assignment is out, you can find it in the materials section. Pleaseheck the course page for the deadline.
|
IFC Q&A 1Written on 29.10.21 by Marco Patrignani Hello students, there's been a mismatch between the date as indicated in the IFC page for the Q&A Now they're in sync: Q&A will be at 10:00 am in the future. I've answered the questions that popped up on askbot and uploaded the video:… Read more Hello students, there's been a mismatch between the date as indicated in the IFC page for the Q&A Now they're in sync: Q&A will be at 10:00 am in the future. I've answered the questions that popped up on askbot and uploaded the video: please find the link in the IFC page.
see you next week in class |
Participation and Lecture 1 updateWritten on 27.10.21 by Marco Patrignani Dear students, there were only 6 students today, dropping to 3 when asked to split up in groups for exercises.
Dear students, there were only 6 students today, dropping to 3 when asked to split up in groups for exercises.
For those that do want to continue with the course:
|
Despite decades of research in computer security, security vulnerabilities still plague computer systems with an ever-growing number of new vulnerabilities discovered every day. How can we ensure that computer systems are really secure? Formal methods offer a promising approach towards this goal: they can guarantee the absence of specific security vulnerabilities with mathematical certainty and therefore help us develop mode reliable systems.
In this course, we will study how formal methods can be applied to verify that the design and implementation of computer systems respect their intended security policies. The course is structured in three independent parts, which focus on specific techniques for different domains: language-based information-flow control, security protocols, and system-level verification. As a whole, the course will give you hands-on experience in reasoning about security at different layers of abstraction through established principled techniques and a broad introduction to state-of-the-art research in the area.
Topics and Instructors
-
Introductory Lecture (20 October 2021)
We'll give an overview of the three parts. Marco will give it live (find the zoom link in the calendar entry, calendar link is below -- not in the CMS timetable). Hamed and Robert prepared videos for the occasion given their travel obligations:
- Hamed's Video: https://dl.cispa.de/s/8Z5kbp8yifL7tsg
- Robert's Video: https://dl.cispa.de/s/LJFsXzfr8xWoT7Y
- Class Recording: https://dl.cispa.de/s/ZMT3oCqPTyxgHcd -
Language-based Information-Flow Control (Marco Patrignani)
In the first part of the course, we will study information-flow control techniques that track how data flows in a program to enforce data confidentiality and integrity. We will discuss both static and dynamic IFC techniques based on security type systems and taint tracking, as well as techniques that track data flows in a program at a different granularity (for example per program variable or per program block). Finally, we will see how programming languages principles can be applied to formally verify that these techniques enforce security. Basic knowledge of programming languages theory is preferred, but not required.
- Proof techniques for system verification (Hamed Nemati)
The main goal of the second part of this course is to show you how we should approach verification of large scale systems like micro-kernels and hypervisors. This is a very challenging task in practice. We will study abstraction, decomposition and refinement as techniques that usually used in practice to facilitate verification of such systems. Finally, in our last lecture we see how we can combine fuzzing and formal verification to validate systems that their verification is not feasible in practice.
-
Protocol Verification (Robert Künnemann)
Protocol verification assumes that the cryptography is perfect and tries to ensure that they are used correctly. It is not about defending against super smart mathematicians exploiting biases in key streams, but equally smart hackers confusing one party about the state of another party.We will discuss how to get from the Alice-bob notation to a minimalistic, precise specification of the protocol and its setuphow to formulate our security requirements and how to verify that these requirements hold, using tools that have by now reached an impressive degree of automation.
Organization
Registration: open now! (Once you are registered here, don't forget to register in the LSF.)
When: Wed 10h-12h (official starting time is 10:15)
Where: (all links also appear in the calendar events)
- Zoom (for all classes): https://cispa-de.zoom.us/j/95941144969?pwd=QkI0RWUxY1JJZzZIUlZPMmJSOWpRQT09
- Miro (shared whiteboard, for IFC classes): https://miro.com/app/board/o9J_lxjDkD0=/
Calendar & Lecture plan: link (Click "..." next to calendar for subscription link for your favorite application).
Mode:
- IFC (Marco): Zoom+Miro lectures on Wednesday 10-12, Q&A session on Friday 10-12 based on the askbot content (see IFC page)
- SYSV (Hamed): flipped classroom: recorded lectures on Monday, Q&A session on Wednesday.
- PROTO (ROBERT): live lectures on Wednesday 10-12, Q&A session on Friday 10-12, detailed lecture script.
Exam requirements: three exercise sheets per part, 50% of total points, work in groups allowed
Exam: two oral exams (first and second part), and one project (third part). Passing requirement is >4.0 on two of the three.
Official exam date : February 9, 2022.
Course Goals
-
Understand the challenges of some open problems in computer security
-
Learn state-of-the-art techniques to address these problems and how to apply them (as a programmer, protocol designer, web developer etc.)
-
By-product: a taxonomy of where things can go wrong in security on different layers
Learning Objectives
After the course, students will be able to:
-
Apply Information-Flow Control (IFC) techniques to the design of secure programming languages.
-
Analyze the security guarantees of IFC languages through programming languages principles.
-
Discuss problems, solutions, and open challenges presented in IFC research papers.
-
Understand fundamental concepts in verification.
-
Learn how to use formal techniques to find vulnerabilities in low-level systems.
-
Gain knowledge to be able to read and understand papers in system verification.
-
Model protocols and cryptographic assumptions in the applied-pi calculus.
-
Express authentication and secrecy properties via correspondence and reachability.
-
Exploit automated tools to verify protocols.
Target Audience
Mainly M.Sc students and interested graduate students. Interested and motivated B.Sc students should contact us and argue that (a) they are particularly interested and (b) they have the necessary background in logical reasoning to follow the course.