Hi guys, maybe a stupid question but I wonder if we can have formal verification of CHERI C (purecap) mode programs that run on a CHERI-enabled seL4?
I mean, we are all on the same boat and as dinosaur 0day exploit writer that have bypassed almost any OS security protections that exist, I can see here two amazing technologies: formal verification and hardware enforcement. I love both. I know that may look like redundant but... can we have both or am I missing something? Best, El mié, 30 jul 2025 a las 14:04, Gernot Heiser via Devel (<devel@sel4.systems>) escribió: > On 30 Jul 2025, at 19:39, Hesham Almatary via Devel <devel@sel4.systems> > wrote: > > > >> also, this question is for seL4 Foundation: are there plans to formal > verify seL4 with this changes? > >> > >> I thing you guys have put together two different Worlds that open a > powerful new field: software formally verfied (seL4) + hardware enforced > "memory protection". I a real World where very few orgs have the > (intellectual) capability of formally verify all the software they use > (specifically C/C++), Cheri support on top of seL4 looks very interesting > to "CHERI support in Microkit lets you run legacy C/C++ (non-CHERI), > memory-safe C/C++ (using CHERI capabilities), and Rust programs in distinct > protection domains". > >> > > Exactly. Formal verification works great on a slowly moving > > delveoplement project such as the seL4 microkernel itself, but once > > you start building an actual dynamic OS on top of seL4 that'll need to > > keep rapidly changing and is an order of magnitude bigger in size, > > formally verifying this C/C++ codebase is really impractical and won't > > be scalable, let alone having the scarcity of experts to do so. So > > That’s a somewhat courageous statement. > > For one, just because an OS is “dynamic” doesn't mean it’s “rapidly > changing” – high assurance OSes certainly don’t, verification or not. > > Secondly, there’s a lot of work on making verification more of a > repeatable engineering process, there’s at least a whole DARPA program > committed to this. At UNSW, we’re working on exactly this (and it surely > doesn’t mean re-writing everything in Rust). > > That doesn’t mean that intra-AS safety isn’t a good thing, but please > don’t over-claim. > > Gernot > > Confidential communication - This email and any files transmitted with it > are confidential and are intended solely for the addressee. If you are not > the intended recipient, please be advised that you have received this email > in error and that any use, dissemination, forwarding, printing, or copying > of this email and any file attachments is strictly prohibited. If you have > received this email in error, please notify me immediately by return email > and destroy this email. > > _______________________________________________ > Devel mailing list -- devel@sel4.systems > To unsubscribe send an email to devel-leave@sel4.systems > _______________________________________________ Devel mailing list -- devel@sel4.systems To unsubscribe send an email to devel-leave@sel4.systems