TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Columbia Engineering Team Builds First Hacker-Resistant Cloud Software System

9 点作者 billyharris将近 4 年前

8 条评论

geofft将近 4 年前
Ignore the overly-excited university press release office and read the paper, <i>A Secure and Formally Verified Linux KVM Hypervisor</i>: <a href="http:&#x2F;&#x2F;nieh.net&#x2F;pubs&#x2F;ieeesp2021_kvm.pdf" rel="nofollow">http:&#x2F;&#x2F;nieh.net&#x2F;pubs&#x2F;ieeesp2021_kvm.pdf</a><p>&gt; <i>Commodity hypervisors are widely deployed to support virtual machines (VMs) on multiprocessor hardware. Their growing complexity poses a security risk. To enable formal verification over such a large codebase, we introduce</i> microverification, <i>a new approach that decomposes a commodity hypervisor into a small core and a set of untrusted services so that we can prove security properties of the entire hypervisor by verifying the core alone. To verify the multi-processor hypervisor core, we introduce</i> security-preserving layers <i>to modularize the proof without hiding information leakage so we can prove each layer of the implementation refines its specification, and the top layer specification is refined by all layers of the core implementation. To verify commodity hypervisor features that require dynamically changing information flow, we introduce</i> data oracles <i>to mask intentional information flow. We can then prove noninterference at the top layer specification and guarantee the resulting security properties hold for the entire hypervisor implementation. Using microverification, we retrofitted the Linux KVM hypervisor with only modest modifications to its codebase. Using Coq, we proved that the hypervisor protects the confidentiality and integrity of VM data, while retaining KVM’s functionality and performance. Our work is the first machine- checked security proof for a commodity multiprocessor hypervisor.</i>
评论 #27276045 未加载
评论 #27275988 未加载
评论 #27275993 未加载
peterbonney将近 4 年前
“This system is provably secure.”<p>Okay, against what specific threat model? Can it protect against an admin’s password&#x2F;key being stolen&#x2F;hacked&#x2F;guessed or any of the other extremely mundane attacks you’re actually likely to encounter in the real world?<p>I’m sure the CS is novel and excellent. But the grandiose framing seems a bit… much.
评论 #27275975 未加载
bearjaws将近 4 年前
What even is hacker resistant?<p>Security is far more than secure VM hosting...<p><i>one person opens a phishing email</i>
ct0将近 4 年前
What do you have to do, mail in your data?
lettergram将近 4 年前
This seems like all cloud software? Seriously, what do they think Google and AWS do?
评论 #27275961 未加载
评论 #27275917 未加载
rambojazz将近 4 年前
That looks like a title from The Onion.
imranhou将近 4 年前
When something seems too good to be true, it usually is.
duckfang将近 4 年前
This sounds like dumb marketing material of &quot;This is the only security software you need!&quot;<p>Turing completeness means there&#x27;s nigh infinite ways to convolute malware that will evade all scanners. And as long as users have capabilities to their data, they will be subject to attacks against data they have access to.<p>Tl;dr. Grandiose claims require grandiose proof.
评论 #27276021 未加载