Safe and secure COncurrent programming for adVancEd aRchiTectures (COVERT)

Lead Research Organisation: University of Sheffield
Department Name: Computer Science

Abstract

The continuing evolution of computing hardware has led to enormously complex architectures with execution models that integrate advanced memory technologies and hardware models. This evolution affects all devices, ranging from large-scale data centres to mobile phones. However, these advanced architectures break assumptions that programmers have relied on, causing new safety bugs and security vulnerabilities.

We target multi-processor systems and concurrent architectures, thus support the development of concurrent programs.
Concurrent behaviour is notoriously difficult -- incorrect synchronisation can lead to many dangerous safety and security vulnerabilities, ranging from "out-of-bounds writes" and "use-after-free" errors to "improper synchronisation and race conditions". Further, architecture-based attacks (e.g., Spectre) show the urgency of addressing these important problems today.

Even when low-level programs are well synchronised, the design of the underlying concurrent algorithms can themselves be vulnerable. In particular, well-understood safety conditions such as linearizability do not guarantee security, and current approaches to addressing this issue lead to overly synchronised implementations (degrading performance). This introduces a tension between the goals of the hardware designers (who aim to maximise performance), and end users (who require trustworthy software). In the middle are developers, who are tasked with producing software that balances this tension. COVERT provides mechanisms for provably correct reusable abstractions that maximise flexibility in program design, allowing fine-tuning of both safety and security guarantees based on the architecture.

Our vision is to provide (a) reusable models, tools and techniques that enable the verification of safety and security properties over a range of advanced architectures, and (b) a verified set of concurrency abstractions that guarantee both safety and security.

This effort involves two key strands of work. In the first, we bring together different facets of modern systems and provide a rigorous foundation covering a range of architectural features such as out-of-order execution and speculative execution, and memory features such as weak memory and NVM. Additionally, we extend existing reasoning techniques above our newly established foundation by developing threat models that cast the intricate behaviours allowed by advanced architectures through the lens of a malicious attacker.

Our second strand involves the practical realisation of these techniques via verified litmus tests, verified concurrency libraries and associated verification tools. We will build novel techniques and tools that strengthen traditional correctness criteria (linearizability, opacity etc) to provide architecture-aware correctness of both safety and security. To ensure a high degree of reliability, our theory and case studies will be mechanised within the Isabelle proof assistant.

Our chosen case studies include those from the MITRE database, the Folly concurrency library as well as examples provided by our industrial partners.

In terms of academic dissemination, we expect a minimum of 2 journal publications per year per institution, plus several associated conference publications and keynote / invited talks per year. We have a direct link to standardisation work, and we have costed in continued visits to standards meetings (eg attendance of Subgroup 1, concurrency, at Workgroup 21, C++, at the ISO - Batty is a voting member of the UK delegation) in order that our work can have a direct impact on the relevant programming model standards.

By involvement of our wider project partners and our existing collaboration networks we expect not only enhanced opportunities for dissemination, but also enhanced opportunities for development of our PDRAs through interaction with these wider communities.

Publications

10 25 50
 
Title Nominal Recursors as Epi-Recurors (Mechanized Proofs Artifact) 
Description This is the Isabelle mechanization associated to the POPL 2024 conditionally accepted paper "Nominal Recursors as Epi-Recursors".  The formal proofs are located in the archive isabelle_nominal_recursors_and_corecursors.zip . They can be processed with Isabelle2023, available for download from https://isabelle.in.tum.de/ . A version packaged for macOS installation downloaded from that website, Isabelle2023_macos.tar.gz , is also included. 
Type Of Technology Software 
Year Produced 2023 
Open Source License? Yes  
URL https://zenodo.org/doi/10.5281/zenodo.10069482
 
Title Nominal Recursors as Epi-Recurors (Mechanized Proofs Artifact) 
Description This is the Isabelle mechanization associated to the POPL 2024 paper "Nominal Recursors as Epi-Recursors". The formal proofs are located in the archive isabelle_nominal_recursors_and_corecursors.zip . They can be processed with Isabelle2023, available for download from https://isabelle.in.tum.de/ . A version packaged for macOS installation downloaded from that website, Isabelle2023_macos.tar.gz , is also included. 
Type Of Technology Software 
Year Produced 2023 
Open Source License? Yes  
URL https://zenodo.org/doi/10.5281/zenodo.10116628
 
Title Nominal Recursors as Epi-Recurors (Mechanized Proofs Artifact) 
Description This is the Isabelle mechanization associated to the POPL 2024 paper "Nominal Recursors as Epi-Recursors". The formal proofs are located in the archive isabelle_nominal_recursors_and_corecursors.zip . They can be processed with Isabelle2023, available for download from https://isabelle.in.tum.de/ . A version packaged for macOS installation downloaded from that website, Isabelle2023_macos.tar.gz , is also included. 
Type Of Technology Software 
Year Produced 2023 
Open Source License? Yes  
URL https://zenodo.org/doi/10.5281/zenodo.10069481