Skip to main content

Formal Verification of Partition Management for the AAMP7G Microprocessor

  • Chapter
  • First Online:

Abstract

The AAMP7G microprocessor, currently in use in Rockwell Collins high-assurance system products, uniquely supports strict time and space partitioning in hardware. In this chapter, we describe the formal modeling and proof effort that led to an NSA multiple independent levels of security (MILS) certification for the AAMP7G. The MILS certificate allows a single AAMP7G CPU to concurrently process Unclassified through Top Secret codeword information. We discuss the formal model architecture of the AAMP7G at several levels, including the microcode and instruction set levels. We describe how the ACL2 theorem prover was used to develop a formal security specification, called GWV, and outline a mathematical proof (machine-checked using ACL2) which established that the AAMP7G trusted microcode implements that security specification, in accordance with EAL 7 requirements. We also discuss the evaluation process, which validated that the formalizations accurately model what was actually designed and built. Finally, we provide an overview of a technique for compositional reasoning at the instruction set level, using a symbolic simulation-based technique.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alves-Foss J, Taylor C (2004) An analysis of the GWV security policy. In: Proceedings of the fifth international workshop on ACL2 and its applications, Austin, TX, Nov. 2004

    Google Scholar 

  2. Best D, Kress C, Mykris N, Russell J, Smith W (1982) An advanced-architecture CMOS/SOS microprocessor. IEEE Micro 2(3):11–26

    Article  Google Scholar 

  3. Common Criteria for Information Technology Security Evaluation (CCITSE) (1999) Available at http://www.radium.ncsc.mil/tpep/library/ccitse/ccitse.html

  4. Greve D (2004) Address enumeration and reasoning over linear address spaces. In: Proceedings of ACL2’04, Austin, TX, Nov. 2004

    Google Scholar 

  5. Greve D (2010) Information security modeling and analysis. In Hardin D (ed) Design and verification of microprocessor systems for high-assurance applications. Springer, Berlin, pp 249–299

    Chapter  Google Scholar 

  6. Greve D, Wilding M, Hardin D (2000) High-speed, analyzable simulators. In: Kaufmann M, Manolios P, Moore JS (eds) Computer-aided reasoning: ACL2 case studies. Kluwer, Dordrecht, pp 89–106

    Google Scholar 

  7. Greve D, Wilding M, Vanfleet M (2003) A separation kernel formal security policy. In: Proceedings of ACL2’03

    Google Scholar 

  8. Greve D, Richards R, Wilding M (2004) A summary of intrinsic partitioning verification. In: Proceedings of ACL2’04, Austin, TX, Nov. 2004

    Google Scholar 

  9. Hardin D, Wilding M, Greve D (1998), Transforming the theorem prover into a digital design tool: from concept car to off-road vehicle. In: Hu A, Vardi M (eds) CAV’98, vol 1427 of LNCS. Springer, Berlin, pp 39–44

    Google Scholar 

  10. Hardin D, Smith E, Young W (2006) A robust machine code proof framework for highly secure applications. In: Proceedings of ACL2’06, Seattle, WA, Aug. 2006

    Google Scholar 

  11. Kaufmann M, Manolios P, Moore JS (2000) Computer-aided reasoning: an approach. Kluwer, Dordrecht

    Google Scholar 

  12. Matthews J, Moore JS, Ray S, Vroon D (2006) Verification condition generation via theorem proving. In: Proceedings of LPAR’06, vol 4246 of LNCS, pp 362–376

    Google Scholar 

  13. Moore JS (2003) Inductive assertions and operational semantics. In Geist D (ed) CHARME 2003, vol 2860 of LNCS. Springer, Berlin, pp 289–303

    Google Scholar 

  14. Moore JS, Boyer R (2002) Single-threaded objects in ACL2. In: Proceedings of PADL 2002, vol 2257 of LNCS. Springer, Berlin, pp 9–27

    Google Scholar 

  15. Richards R (2010) Modeling and security analysis of a commercial real-time operating system kernel. In Hardin D (ed) Design and verification of microprocessor systems for high-assurance applications. Springer, Berlin, pp 301–322

    Chapter  Google Scholar 

  16. Richards R, Greve D, Wilding M, Vanfleet M (2004) The common criteria, formal methods, and ACL2. In: Proceedings of the fifth international workshop on ACL2 and its applications, Austin, TX, Nov. 2004

    Google Scholar 

  17. Rockwell Collins, Inc. (2003) AAMP7r1 reference manual

    Google Scholar 

  18. Rockwell Collins, Inc. (2005) Rockwell Collins receives MILS certification from NSA on microprocessor. Rockwell Collins press release, 24 August 2005. http://www.rockwellcollins.com/news/page6237.html

  19. RTCA, Inc. (2000) Design assurance guidance for airborne electronic hardware, RTCA/DO-254

    Google Scholar 

  20. Rushby J (1981) Design and verification of secure systems. In: Proceedings of the eighth symposium on operating systems principles, vol 15, December 1981

    Google Scholar 

  21. Rushby J (1999) Partitioning for safety and security: requirements, mechanisms, and assurance. NASA contractor report CR-1999–209347

    Google Scholar 

  22. Wilding M, Hardin D, Greve D (1999) Invariant performance: a statement of task isolation useful for embedded application integration. In: Weinstock C, Rushby J (eds) Proceedings of dependable computing for critical applications – DCCA-7. IEEE Computer Society Dependable Computing Series

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthew M. Wilding .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Wilding, M.M., Greve, D.A., Richards, R.J., Hardin, D.S. (2010). Formal Verification of Partition Management for the AAMP7G Microprocessor. In: Hardin, D. (eds) Design and Verification of Microprocessor Systems for High-Assurance Applications. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-1539-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-1539-9_6

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-1538-2

  • Online ISBN: 978-1-4419-1539-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics