SlideShare a Scribd company logo
1 of 32
Download to read offline
Enable
Enhanced
Security with the
seL4 Microkernel
An introduction to seL4
Visit DornerWorks.com/sel4-microkernel
• Learn more about seL4
• Get the source code
Getting Started
Is this actually secure?
Problem
PROBLEM
The traditional approach uses very detailed design
and penetration testing together.
• This often leads to a long development cycle of
design, develop, pen. test, design fixes for
bugs/vulnerabilities, develop, pen. test, etc.
• Even after you are ready for release, security
vulnerabilities and bugs are often still discovered.
• This results in long term maintenance and providing
customers with frequent security patches, leaving
them to ask, "Is this actually secure?"
Solution
Formally proven seL4 microkernel
The Proof
What does the formal proof of the seL4 microkernel accomplish?
THE PROOFUndefined behavior Buffer overflows Null pointer
deferences
(Pointer errors)
Arithmetic overflows
and exceptions
The binary code of the seL4 microkernel correctly implements the behavior described in its abstract specification
and nothing more. This is important because it means that the following can't occur:
Memory leaks
The Proof
Formally proven seL4 microkernel
The specification and the seL4 binary satisfy the classic security properties called
integrity and confidentiality.
• Integrity means that data cannot be changed without permission, and
confidentiality means that data cannot be read without permission.
• This is significant for any solution that requires extreme security and/or safety.
• These properties are the backbone for systems that rely on isolation.
• This makes seL4 an attractive solution for systems that may not have extreme security requirements, but
still want proven isolation between separate software components.
• There is no way you could make these claims without proof.
Verified Hardware
Make the most of seL4
Verified Hardware
Make the most of your content
• The seL4 microkernel offers extreme security
when deployed on a verified hardware platform.
• Data61 developed seL4 to “provide a reliable,
secure, fast, and verified foundation for building
trustworthy systems.”
• Verified extreme security on the i.MX6 SOC
Sabre Lite platform.
• Functionally correct security on the x64 PC99
(64-bit) and NVIDIA Tegra K1 TK1-SOM
platforms.
• It works on ARM and x86 platforms as well
(verification may not be available).
DornerWorks has provided open
source binary verification tools for
the microkernel, and is expanding
the seL4 ecosystem through key
partnerships with organizations
aligned with aerospace and defense.
Open Source
Formally proven seL4 microkernel
Open Source
Formally proven seL4 microkernel
•Most solutions that already have a security certification have
expensive licensing costs
• seL4 has no licensing costs and is free to use.
• The seL4 kernel is licensed under GPLv2
• The seL4 libraries and tools are mostly licensed under BSD
Open Source
Formally proven seL4 microkernel
•Open source software has many benefits
• Check out – “Open Source Software Can Enable These 9 Benefits
in Your Technology Development” for more ideas
https://dornerworks.com/blog/open-source-benefits
seL4 Design
Formally proven seL4 microkernel
seL4 Design
Formally proven seL4 microkernel
The proof of seL4 informs its design. Therefore, it is important to understand
some of its less conventional implementations.
Kernel vs. User
Formally proven seL4 microkernel
Kernel vs. User
Formally proven seL4 microkernel
KERNEL VS. USER
Device Drivers Libraries Stacks
• Kernel space and user space are well known concepts for all operating systems, but since seL4
is a microkernel, a specific approach is taken.
• The kernel is left as small as possible and components that would traditionally be in that
space are pushed out to the user space.
Kernel vs. User
Formally proven seL4 microkernel
Capabilities
Formally proven seL4 microkernel
Capabilities
Formally proven seL4 microkernel
• Capabilities are a mechanism that is used to grant access to specific resources
in the system.
• The reason why capabilities form the basis of security in seL4 is the fact that
the kernel keeps track of everything in the capability derivation tree and a
capability is required for any operation on a kernel object.
• This prevents bad actor threads from gaining access to a resource in any
other thread that they are not given access.
Untyped Memory
Formally proven seL4 microkernel
Untyped Memory
Formally proven seL4 microkernel
• When seL4 boots, unused memory is given to the root thread.
• The application running as the root thread must “Re-Type” this memory as
other kernel objects which can then be passed around to build up and
architect the system.
• This is the building block for virtual memory spaces, capability spaces,
thread control blocks, and other kernel objects.
Endpoints & IPC
Formally proven seL4 microkernel
Endpoints
Formally proven seL4 microkernel
• Allow small amounts of data and capabilities to be transferred between
two threads
• Invoked with seL4 kernel system calls
o Blocking and Non-Blocking choices
• Requires two threads to have the capability to the same endpoint
Inter-Process Communication
Formally proven seL4 microkernel
• The mechanism for thread-to-thread and thread-to-kernel
communication.
• Messages can be sent to either an “Endpoint” or other kernel objects.
• Controlled by the kernel, so data only goes to where it is configured to go.
• Useful for communication data. Larger files should be transferred through
other means, such as shared data.
seL4 Kernel API
Formally proven seL4 microkernel
seL4 Kernel API
Formally proven seL4 microkernel
• To take advantage of the isolation and security properties offered by seL4, a
system designer must utilize the API correctly. In order to build a secure
system:
• Use primitives and mechanisms made available by the seL4 kernel
• Develop applications to adhere to seL4 system API calls
• Circumventing the API negates the proof
Architecting
Formally proven seL4 microkernel
Architecting
Formally proven seL4 microkernel
• You can create isolated environments and dole out access to seL4 resources
and mechanisms at this point, but there are other tools that help a system
designer focus on high-level concepts:
• Data61 has developed CAmkES (Componentized Architecture for
microkernel Embedded Systems) which allows you to think about your
system as isolated components and connections.
• DornerWorks can help you architect a system either way and has
experience porting applications running on FreeRTOS to CAmkES.
Extreme Security
with mathematical proof
Extreme Security
With mathematical proof
• Stay ahead of costly, brand damaging cyber threats
• DornerWorks will help you fill in the gaps to enhance your security story.
seL4 Center of Excellence
• Members: DornerWorks, Intelligent Automation, Inc. and US DARPA
• Mission: build up the seL4 ecosystem with an avenue for defense-focused product developers to
work with a US-based company on implementing seL4 into their system.
Keep it Going
Continue the conversation on seL4
seL4 Communities
Join us and expand the seL4 ecosystem
LinkedIn
• seL4 Microkernel Development and Engineering
seL4 mailing list
• https://sel4.systems/lists/listinfo/
COMING SOON
• seL4 discourse group
• seL4 JIRA
Thank You
616.245.8369
sales@dornerworks.com
https://dornerworks.com/

More Related Content

What's hot

Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...Edureka!
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingBlack Duck by Synopsys
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyBlack Duck by Synopsys
 
Track f interoperable ip-delivery_ch_e ofer shragay
Track f   interoperable ip-delivery_ch_e ofer shragayTrack f   interoperable ip-delivery_ch_e ofer shragay
Track f interoperable ip-delivery_ch_e ofer shragaychiportal
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentBlack Duck by Synopsys
 
Container security Familiar problems in new technology
Container security Familiar problems in new technologyContainer security Familiar problems in new technology
Container security Familiar problems in new technologyFrank Victory
 
Barbican 1.0 - Open Source Key Management for OpenStack
Barbican 1.0 - Open Source Key Management for OpenStackBarbican 1.0 - Open Source Key Management for OpenStack
Barbican 1.0 - Open Source Key Management for OpenStackjarito030506
 
Making the Transition from Suite to the Hub
Making the Transition from Suite to the HubMaking the Transition from Suite to the Hub
Making the Transition from Suite to the HubBlack Duck by Synopsys
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldDevOps.com
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkPriyanka Aash
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementTim Mackey
 
Simplify Your Way To Expert Kubernetes Management
Simplify Your Way To Expert Kubernetes ManagementSimplify Your Way To Expert Kubernetes Management
Simplify Your Way To Expert Kubernetes ManagementDevOps.com
 
Practical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourcePractical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourceBlack Duck by Synopsys
 
OSMC 2021 | Thola – A tool for monitoring and provisioning network devices
OSMC 2021 | Thola – A tool for monitoring and provisioning network devicesOSMC 2021 | Thola – A tool for monitoring and provisioning network devices
OSMC 2021 | Thola – A tool for monitoring and provisioning network devicesNETWAYS
 
Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP FRSecure
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 
Proactive Security AppSec Case Study
Proactive Security AppSec Case StudyProactive Security AppSec Case Study
Proactive Security AppSec Case StudyAndy Hoernecke
 
The 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementThe 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementBlack Duck by Synopsys
 
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS appsDmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS appsDefconRussia
 

What's hot (20)

Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and WhyFilling your AppSec Toolbox - Which Tools, When to Use Them, and Why
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
 
Track f interoperable ip-delivery_ch_e ofer shragay
Track f   interoperable ip-delivery_ch_e ofer shragayTrack f   interoperable ip-delivery_ch_e ofer shragay
Track f interoperable ip-delivery_ch_e ofer shragay
 
Integrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps EnvironmentIntegrating Black Duck into your Agile DevOps Environment
Integrating Black Duck into your Agile DevOps Environment
 
Container security Familiar problems in new technology
Container security Familiar problems in new technologyContainer security Familiar problems in new technology
Container security Familiar problems in new technology
 
Barbican 1.0 - Open Source Key Management for OpenStack
Barbican 1.0 - Open Source Key Management for OpenStackBarbican 1.0 - Open Source Key Management for OpenStack
Barbican 1.0 - Open Source Key Management for OpenStack
 
Making the Transition from Suite to the Hub
Making the Transition from Suite to the HubMaking the Transition from Suite to the Hub
Making the Transition from Suite to the Hub
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote World
 
Hacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
 
The How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability ManagementThe How and Why of Container Vulnerability Management
The How and Why of Container Vulnerability Management
 
Simplify Your Way To Expert Kubernetes Management
Simplify Your Way To Expert Kubernetes ManagementSimplify Your Way To Expert Kubernetes Management
Simplify Your Way To Expert Kubernetes Management
 
Practical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open SourcePractical Steps to Scale Legal Support for Open Source
Practical Steps to Scale Legal Support for Open Source
 
OSMC 2021 | Thola – A tool for monitoring and provisioning network devices
OSMC 2021 | Thola – A tool for monitoring and provisioning network devicesOSMC 2021 | Thola – A tool for monitoring and provisioning network devices
OSMC 2021 | Thola – A tool for monitoring and provisioning network devices
 
Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
kali linix
kali linixkali linix
kali linix
 
Proactive Security AppSec Case Study
Proactive Security AppSec Case StudyProactive Security AppSec Case Study
Proactive Security AppSec Case Study
 
The 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk ManagementThe 4 Levels of Open Source Risk Management
The 4 Levels of Open Source Risk Management
 
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS appsDmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
Dmitry 'D1g1' Evdokimov - BlackBox analysis of iOS apps
 

Similar to Intro to the sel4 Microkernel

Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]
Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]
Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]RootedCON
 
Understanding container security
Understanding container securityUnderstanding container security
Understanding container securityJohn Kinsella
 
5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and BeyondBlack Duck by Synopsys
 
High Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyHigh Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyRamesh Nagappan
 
Get the Facts: Oracle's Unbreakable Enterprise Kernel
Get the Facts: Oracle's Unbreakable Enterprise KernelGet the Facts: Oracle's Unbreakable Enterprise Kernel
Get the Facts: Oracle's Unbreakable Enterprise KernelTerry Wang
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...Vincent Giersch
 
A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015Henry Huang
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Qualcomm Developer Network
 
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisApplied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisOW2
 
SevillaJUG - Unleash the power of your applications with Micronaut® ,GraalVM...
SevillaJUG - Unleash the power of your applications with Micronaut®  ,GraalVM...SevillaJUG - Unleash the power of your applications with Micronaut®  ,GraalVM...
SevillaJUG - Unleash the power of your applications with Micronaut® ,GraalVM...Juarez Junior
 
GeeCon Prague 2023 - Unleash the power of your applications with Micronaut®, ...
GeeCon Prague 2023 - Unleash the power of your applications with Micronaut®, ...GeeCon Prague 2023 - Unleash the power of your applications with Micronaut®, ...
GeeCon Prague 2023 - Unleash the power of your applications with Micronaut®, ...Juarez Junior
 
BYOP: Custom Processor Development with Apache NiFi
BYOP: Custom Processor Development with Apache NiFiBYOP: Custom Processor Development with Apache NiFi
BYOP: Custom Processor Development with Apache NiFiDataWorks Summit
 
Grow Your Business with Oracle Linux, Virtualization- BL v6.pdf
Grow Your Business with Oracle Linux, Virtualization- BL v6.pdfGrow Your Business with Oracle Linux, Virtualization- BL v6.pdf
Grow Your Business with Oracle Linux, Virtualization- BL v6.pdfsyamsulsakbar
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course contentShivamSharma909
 
Modern Data Security with MySQL
Modern Data Security with MySQLModern Data Security with MySQL
Modern Data Security with MySQLVittorio Cioe
 
Oracle plsql code refactoring - from anonymous block to stored procedure
Oracle plsql code refactoring - from anonymous block to stored procedureOracle plsql code refactoring - from anonymous block to stored procedure
Oracle plsql code refactoring - from anonymous block to stored procedureCarlos Oliveira
 

Similar to Intro to the sel4 Microkernel (20)

Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]
Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]
Sebastián Guerrero - Ke ase Android? [Rooted CON 2013]
 
Understanding container security
Understanding container securityUnderstanding container security
Understanding container security
 
OC|Webcast "Die neue Welt der Virtualisierung"
OC|Webcast "Die neue Welt der Virtualisierung"OC|Webcast "Die neue Welt der Virtualisierung"
OC|Webcast "Die neue Welt der Virtualisierung"
 
5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond5 Ways to Secure Your Containers for Docker and Beyond
5 Ways to Secure Your Containers for Docker and Beyond
 
High Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyHigh Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted Cryptography
 
Get the Facts: Oracle's Unbreakable Enterprise Kernel
Get the Facts: Oracle's Unbreakable Enterprise KernelGet the Facts: Oracle's Unbreakable Enterprise Kernel
Get the Facts: Oracle's Unbreakable Enterprise Kernel
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
 
A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015A Summary about Hykes' Keynote on Dockercon 2015
A Summary about Hykes' Keynote on Dockercon 2015
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, ParisApplied Security for Containers, OW2con'18, June 7-8, 2018, Paris
Applied Security for Containers, OW2con'18, June 7-8, 2018, Paris
 
SevillaJUG - Unleash the power of your applications with Micronaut® ,GraalVM...
SevillaJUG - Unleash the power of your applications with Micronaut®  ,GraalVM...SevillaJUG - Unleash the power of your applications with Micronaut®  ,GraalVM...
SevillaJUG - Unleash the power of your applications with Micronaut® ,GraalVM...
 
EFI Secure Key
EFI Secure KeyEFI Secure Key
EFI Secure Key
 
GeeCon Prague 2023 - Unleash the power of your applications with Micronaut®, ...
GeeCon Prague 2023 - Unleash the power of your applications with Micronaut®, ...GeeCon Prague 2023 - Unleash the power of your applications with Micronaut®, ...
GeeCon Prague 2023 - Unleash the power of your applications with Micronaut®, ...
 
BYOP: Custom Processor Development with Apache NiFi
BYOP: Custom Processor Development with Apache NiFiBYOP: Custom Processor Development with Apache NiFi
BYOP: Custom Processor Development with Apache NiFi
 
Grow Your Business with Oracle Linux, Virtualization- BL v6.pdf
Grow Your Business with Oracle Linux, Virtualization- BL v6.pdfGrow Your Business with Oracle Linux, Virtualization- BL v6.pdf
Grow Your Business with Oracle Linux, Virtualization- BL v6.pdf
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
2. microkernel new
2. microkernel new2. microkernel new
2. microkernel new
 
Modern Data Security with MySQL
Modern Data Security with MySQLModern Data Security with MySQL
Modern Data Security with MySQL
 
Oracle plsql code refactoring - from anonymous block to stored procedure
Oracle plsql code refactoring - from anonymous block to stored procedureOracle plsql code refactoring - from anonymous block to stored procedure
Oracle plsql code refactoring - from anonymous block to stored procedure
 

Recently uploaded

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Intro to the sel4 Microkernel

  • 1. Enable Enhanced Security with the seL4 Microkernel An introduction to seL4
  • 2. Visit DornerWorks.com/sel4-microkernel • Learn more about seL4 • Get the source code Getting Started
  • 3. Is this actually secure? Problem PROBLEM The traditional approach uses very detailed design and penetration testing together. • This often leads to a long development cycle of design, develop, pen. test, design fixes for bugs/vulnerabilities, develop, pen. test, etc. • Even after you are ready for release, security vulnerabilities and bugs are often still discovered. • This results in long term maintenance and providing customers with frequent security patches, leaving them to ask, "Is this actually secure?"
  • 5. The Proof What does the formal proof of the seL4 microkernel accomplish? THE PROOFUndefined behavior Buffer overflows Null pointer deferences (Pointer errors) Arithmetic overflows and exceptions The binary code of the seL4 microkernel correctly implements the behavior described in its abstract specification and nothing more. This is important because it means that the following can't occur: Memory leaks
  • 6. The Proof Formally proven seL4 microkernel The specification and the seL4 binary satisfy the classic security properties called integrity and confidentiality. • Integrity means that data cannot be changed without permission, and confidentiality means that data cannot be read without permission. • This is significant for any solution that requires extreme security and/or safety. • These properties are the backbone for systems that rely on isolation. • This makes seL4 an attractive solution for systems that may not have extreme security requirements, but still want proven isolation between separate software components. • There is no way you could make these claims without proof.
  • 8. Verified Hardware Make the most of your content • The seL4 microkernel offers extreme security when deployed on a verified hardware platform. • Data61 developed seL4 to “provide a reliable, secure, fast, and verified foundation for building trustworthy systems.” • Verified extreme security on the i.MX6 SOC Sabre Lite platform. • Functionally correct security on the x64 PC99 (64-bit) and NVIDIA Tegra K1 TK1-SOM platforms. • It works on ARM and x86 platforms as well (verification may not be available). DornerWorks has provided open source binary verification tools for the microkernel, and is expanding the seL4 ecosystem through key partnerships with organizations aligned with aerospace and defense.
  • 9. Open Source Formally proven seL4 microkernel
  • 10. Open Source Formally proven seL4 microkernel •Most solutions that already have a security certification have expensive licensing costs • seL4 has no licensing costs and is free to use. • The seL4 kernel is licensed under GPLv2 • The seL4 libraries and tools are mostly licensed under BSD
  • 11. Open Source Formally proven seL4 microkernel •Open source software has many benefits • Check out – “Open Source Software Can Enable These 9 Benefits in Your Technology Development” for more ideas https://dornerworks.com/blog/open-source-benefits
  • 12. seL4 Design Formally proven seL4 microkernel
  • 13. seL4 Design Formally proven seL4 microkernel The proof of seL4 informs its design. Therefore, it is important to understand some of its less conventional implementations.
  • 14. Kernel vs. User Formally proven seL4 microkernel
  • 15. Kernel vs. User Formally proven seL4 microkernel KERNEL VS. USER Device Drivers Libraries Stacks • Kernel space and user space are well known concepts for all operating systems, but since seL4 is a microkernel, a specific approach is taken. • The kernel is left as small as possible and components that would traditionally be in that space are pushed out to the user space.
  • 16. Kernel vs. User Formally proven seL4 microkernel
  • 18. Capabilities Formally proven seL4 microkernel • Capabilities are a mechanism that is used to grant access to specific resources in the system. • The reason why capabilities form the basis of security in seL4 is the fact that the kernel keeps track of everything in the capability derivation tree and a capability is required for any operation on a kernel object. • This prevents bad actor threads from gaining access to a resource in any other thread that they are not given access.
  • 19. Untyped Memory Formally proven seL4 microkernel
  • 20. Untyped Memory Formally proven seL4 microkernel • When seL4 boots, unused memory is given to the root thread. • The application running as the root thread must “Re-Type” this memory as other kernel objects which can then be passed around to build up and architect the system. • This is the building block for virtual memory spaces, capability spaces, thread control blocks, and other kernel objects.
  • 21. Endpoints & IPC Formally proven seL4 microkernel
  • 22. Endpoints Formally proven seL4 microkernel • Allow small amounts of data and capabilities to be transferred between two threads • Invoked with seL4 kernel system calls o Blocking and Non-Blocking choices • Requires two threads to have the capability to the same endpoint
  • 23. Inter-Process Communication Formally proven seL4 microkernel • The mechanism for thread-to-thread and thread-to-kernel communication. • Messages can be sent to either an “Endpoint” or other kernel objects. • Controlled by the kernel, so data only goes to where it is configured to go. • Useful for communication data. Larger files should be transferred through other means, such as shared data.
  • 24. seL4 Kernel API Formally proven seL4 microkernel
  • 25. seL4 Kernel API Formally proven seL4 microkernel • To take advantage of the isolation and security properties offered by seL4, a system designer must utilize the API correctly. In order to build a secure system: • Use primitives and mechanisms made available by the seL4 kernel • Develop applications to adhere to seL4 system API calls • Circumventing the API negates the proof
  • 27. Architecting Formally proven seL4 microkernel • You can create isolated environments and dole out access to seL4 resources and mechanisms at this point, but there are other tools that help a system designer focus on high-level concepts: • Data61 has developed CAmkES (Componentized Architecture for microkernel Embedded Systems) which allows you to think about your system as isolated components and connections. • DornerWorks can help you architect a system either way and has experience porting applications running on FreeRTOS to CAmkES.
  • 29. Extreme Security With mathematical proof • Stay ahead of costly, brand damaging cyber threats • DornerWorks will help you fill in the gaps to enhance your security story. seL4 Center of Excellence • Members: DornerWorks, Intelligent Automation, Inc. and US DARPA • Mission: build up the seL4 ecosystem with an avenue for defense-focused product developers to work with a US-based company on implementing seL4 into their system.
  • 30. Keep it Going Continue the conversation on seL4
  • 31. seL4 Communities Join us and expand the seL4 ecosystem LinkedIn • seL4 Microkernel Development and Engineering seL4 mailing list • https://sel4.systems/lists/listinfo/ COMING SOON • seL4 discourse group • seL4 JIRA