TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A Secure and Formally Verified Linux KVM Hypervisor [pdf]

106 pointsby tmfialmost 4 years ago

3 comments

monocasaalmost 4 years ago
TL;DR: Changes KVM on ARM to run a tiny verifiable codebase in EL2 (derived from the original KVM code?), and run the rest of the kernel in EL1, then uses standard formal verification techniques on that tiny EL2 component. In a sense, it changes KVM into a Type 1 hypervisor in order to reduce the verification needed to a manageable level.<p>Neat, reminds me of rtlinux, using a Linux module to boot a microkernel with a reduced TCB and more useful semantics in some cases than a full Linux kernel.
csdvrxalmost 4 years ago
&gt; attackers may control peripherals to perform malicious memory accesses via DMA [19]. Side-channel attacks [20], [21], [22], [23], [24], [25] are beyond the scope of the paper<p>I have been trying to get my hands on modern NVMe : SR-IOv with separate namespace on NVMe device could help mitigating the risk <i>IF</i> you trust the firmware...
mhoadalmost 4 years ago
This is not at all my area of expertise or anything even remotely close to it but this seems to be a very similar sounding story to one of the core underpinnings of Fuschia.<p>My understanding was that they put everything kind of dangerous into the micro-kernel and then built their security model around ensuring that everything that interacted with it was only using a set of primitives that they could &quot;guarantee&quot; to be &quot;safe&quot;.<p>Could someone who actually knows about this kind of thing let me know if I am even roughly in the ballpark of correct here?