diff --git a/PR_400/About/Performance/home.pml b/PR_400/About/Performance/home.pml deleted file mode 100644 index 013d4c68..00000000 --- a/PR_400/About/Performance/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - -
This page displays the latest benchmark numbers for seL4 from the publicly -available sel4bench repository. -The following times are reported as mean and standard deviation in -the format mean (std dev), both rounded to the nearest integer.
-ISA | -Mode | -Core/SoC/Board | -Clock | -IRQ Invoke | -IPC call | -IPC reply | -Notify | -||||
---|---|---|---|---|---|---|---|---|---|---|---|
Armv7a | -32 | -A9/i.MX6/Sabre | -1.0 GHz | -586 | -(11) | -316 | -(2) | -338 | -(7) | -832 | -(11) | -
x86_64 | -64 | -i7-4770/Haswell | -3.4 GHz | -1568 | -(255) | -581 | -(13) | -589 | -(12) | -1321 | -(72) | -
x86_64 | -64 | -i7-6700/Skylake (without meltdown mitigation) | -3.4 GHz | -1258 | -(193) | -382 | -(3) | -388 | -(4) | -754 | -(82) | -
Armv8a | -64 | -A57/Tx1/Jetson | -1.9 GHz | -672 | -(32) | -412 | -(10) | -411 | -(11) | -912 | -(8) | -
RV64IMAC | -64 | -U54-MC/SiFive Freedom U540/Hifive | -1.5 GHz | -971 | -(75) | -470 | -(12) | -648 | -(90) | -1340 | -(51) | -
ISA | -Mode | -Core/SoC/Board | -Clock | -IRQ Invoke | -IPC call | -IPC reply | -Notify | -||||
---|---|---|---|---|---|---|---|---|---|---|---|
Armv7a | -32 | -A9/i.MX6/Sabre | -1.0 GHz | -895 | -(30) | -324 | -(1) | -364 | -(2) | -1235 | -(17) | -
x86_64 | -64 | -i7-4770/Haswell | -3.4 GHz | -2005 | -(425) | -584 | -(13) | -604 | -(13) | -1589 | -(7) | -
x86_64 | -64 | -i7-6700/Skylake (without meltdown mitigation) | -3.4 GHz | -1626 | -(339) | -382 | -(3) | -406 | -(3) | -1039 | -(10) | -
Armv8a | -64 | -A57/Tx1/Jetson | -1.9 GHz | -758 | -(15) | -414 | -(5) | -462 | -(11) | -1074 | -(13) | -
RV64IMAC | -64 | -U54-MC/SiFive Freedom U540/Hifive | -1.5 GHz | -2970 | -(154) | -721 | -(101) | -871 | -(29) | -3820 | -(142) | -
All benchmarks were built using the trustworthy-systems/sel4 -docker image from the seL4 -docker file repository
ISA | -Mode | -Core/SoC/Board | -Clock | -Compiler | -Build command | -
---|---|---|---|---|---|
Armv7a | -32 | -A9/i.MX6/Sabre | -1.0 GHz | -arm-linux-gnueabi-gcc GNU 10.2.1 | -init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DAARCH32=TRUE -DPLATFORM=sabre | -
x86_64 | -64 | -i7-4770/Haswell | -3.4 GHz | -gcc GNU 10.2.1 | -init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DPLATFORM=x86_64 | -
x86_64 | -64 | -i7-6700/Skylake | -3.4 GHz | -gcc GNU 10.2.1 | -init-build.sh -DKernelSkimWindow=FALSE -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DPLATFORM=x86_64 | -
Armv8a | -64 | -A57/Tx1/Jetson | -1.9 GHz | -aarch64-linux-gnu-gcc GNU 10.2.1 | -init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DAARCH64=TRUE -DPLATFORM=tx1 | -
RV64IMAC | -64 | -U54-MC/SiFive Freedom U540/Hifive | -1.5 GHz | -riscv64-unknown-elf-gcc GNU 8.3.0 | -init-build.sh -DFASTPATH=TRUE -DHARDWARE=FALSE -DFAULT=FALSE -DRISCV64=TRUE -DPLATFORM=hifive | -
ISA | -Mode | -Core/SoC/Board | -Clock | -Compiler | -Build command | -
---|---|---|---|---|---|
Armv7a | -32 | -A9/i.MX6/Sabre | -1.0 GHz | -arm-linux-gnueabi-gcc GNU 10.2.1 | -init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DAARCH32=TRUE -DPLATFORM=sabre -DMCS=TRUE | -
x86_64 | -64 | -i7-4770/Haswell | -3.4 GHz | -gcc GNU 10.2.1 | -init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DPLATFORM=x86_64 -DMCS=TRUE | -
x86_64 | -64 | -i7-6700/Skylake | -3.4 GHz | -gcc GNU 10.2.1 | -init-build.sh -DKernelSkimWindow=FALSE -DMCS=TRUE -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DPLATFORM=x86_64 | -
Armv8a | -64 | -A57/Tx1/Jetson | -1.9 GHz | -aarch64-linux-gnu-gcc GNU 10.2.1 | -init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DAARCH64=TRUE -DPLATFORM=tx1 -DMCS=TRUE | -
RV64IMAC | -64 | -U54-MC/SiFive Freedom U540/Hifive | -1.5 GHz | -riscv64-unknown-elf-gcc GNU 8.3.0 | -init-build.sh -DFASTPATH=TRUE -DHARDWARE=FALSE -DFAULT=FALSE -DRISCV64=TRUE -DPLATFORM=hifive -DMCS=TRUE | -
This page was generated on 2024-08-14 for sel4bench-manifest 4d7edabb.
- -- seL4 is a high-assurance, high-performance operating system - microkernel. It is unique because of its comprehensive formal - verification, without compromising performance. It is meant to be used as a - trustworthy foundation for building safety- and security-critical - systems. It is available as open source on GitHub and supported by the - seL4 Foundation. -
-- - Being a kernel means it is the piece - of software that runs at the heart of any software system and - controls all accesses to resources. It provides fine-grained - access control through capabilities, - and controls communication between components of the system. - It is the most critical part of the software system, and runs - in privileged mode. -
-- Being a microkernel means that it is reduced to a minimal core - that is free from policy and therefore can form a dependable base - for building arbitrary systems serving many different usage - scenarios. -
-- seL4 is a member of the L4 family of - microkernels, and is the world's most advanced, most - highly assured operating-system kernel. -
-- seL4's formal verification sets it apart from any other operating - system. In a nutshell, it provides the highest assurance of - isolation between applications running in the system, - meaning that a compromise in one part of the system can be - contained and prevented from harming other, potentially more - critical parts of the system. -
-- Specifically, seL4's implementation is formally (mathematically) - proven correct (bug-free) against its specification, has been - proved to enforce strong security properties, and if configured - correctly its operations have proven safe upper bounds on their - worst-case execution times. It was the world's first operating - system with such a proof, and is still the only proven operating - system featuring fine-grained capability-based security and high - performance. It also has the most advanced support for mixed - criticality real-time systems. -
-- For detailed explanations of these terms, see our FAQ. -
-- In 2009, the seL4 kernel was a scientific breakthrough result - from the Trustworthy Systems - group (TS) that showed that high-performance kernels are - within the realm of formal verification. Today, seL4 is part of - an ecosystem supporting active use in various domains including - automotive, aviation, infrastructure, medical, and defence. A key - highlight demonstrating its fit for real-world deployment was in - the DARPA-funded HACMS - program, where seL4 was used to protect an autonomous helicopter - against cyber-attacks. TS continues to push the state of the art - of operating systems through seL4, in close - cooperation with its partners in the seL4 Foundation. -
- -- More on TS ongoing and future research about seL4 and trustworthy - systems. -
- - -We welcome and encourage community contribution to the seL4 platform.
- -Contributions can take the form of code contributions, proof contributions, documentation contributions, and community support.
- -We provide general guidance on contributing code to the seL4 platform as well as specific guidance on making contributions to the kernel and to user-level code.
- - - -We also provide a list of suggested projects to start working on, as well as an overview of the different libraries and components available and what can be done to help contribute to their further development. - -
Contributing to the seL4 proofs requires a different skill set than contributing to the code, and so far we have not had many community contributions to the proofs.
- -As a result, our infrastructure for proof contributions is not as mature as that for code contributions.
- -We are aiming to provide more resources in the next few months. In the meantime, if you are interested in contributing to the seL4 proofs, please review the actual proofs and the tools and techniques used for the proofs. Then contact us to discuss ideas, plans, and options about your contributions.
- -To get started, you will have to be familiar with the Isabelle theorem prover. Some learning resources for it are described in this blog post. - -
seL4 platform documentation is maintained either with the code sources, with the proofs, or on the docsite.
- -We welcome contribution to all of this documentation, and provide guidance on the docsite.
- -The seL4 discussion and support platforms are open to the community and we invite community participation, not only in asking questions, but also in answering questions and providing help.
- -Please see our Community Guidelines on the docsite.
- - -- The Governing Board of the seL4 Foundation - consists of: -
-- The Governing Board meetings are normally held in private, - i.e. attended by Governing Board Representatives only, although - the Governing Board may invite others to participate. However, the - Governing Board meeting minutes are publicly accessible. -
-- Gernot is the Founder of the Trustworthy Systems Research Group - (TS), which created seL4. He is Scientia Professor and - John Lions Chair of Operating Systems - at UNSW Sydney, where he has - been teaching operating systems and leading research on L4 - microkernels for more than 25 years. Besides that, his focus is on - transferring TS technology to the real world. He was the founder - and CTO of Open Kernel Labs and is presently serving as Chief - Scientist (Software) - at HENSOLDT - Cyber. Gernot holds a PhD from ETH Zurich and is a Fellow of - the ACM, - the IEEE and - the Australian Academy of Technology - and Engineering (ATSE). Jointly with June and Gerwin he - won the ACM SIGOPS - Hall-of-Fame award in 2019. -
-- June is a former leader of the TS group and was a core contributor to seL4's - verification story, as well as verification work on the eChronos - RTOS. She holds a PhD - from Paris-Saclay - University. In 2011 she was recognised by MIT Tech Review as - a Top - Innovator under 35. She is a conjoint professor - at UNSW Sydney. -
-- Dr. David Hardin is an Associate Director, Systems Engineering - at Collins Aerospace. Dr. Hardin has significant experience in - the design and verification of high-assurance hardware, - software, and systems, and is editor of the book Design and - Verification of Microprocessor Systems for High-Assurance - Applications. -
-- Dr. Feng Zhou has 15 years of academic experience (Professor and - Vice Chairman of Dept. of Information and Electronics - Engineering in Zhejiang University, China) and over 15 years of - industrial experience in video/image compression & processing, - computer vision, artificial intelligence, and ASIC processor - architecture. Dr. Feng Zhou experience extends to the FPGA/ASIC - system architecture design and deep learning algorithm - implementation based on FPGA/ASIC platforms. -
-- Gerwin lead the verification of seL4. He spends much of his time - deep in the proofs - about seL4 and contributes to other verification research in - TS. He holds a PhD from TU - Munich and led the original seL4 verification, which won the - MIT-TR10 award for the top 10 emerging technologies in 2011, as - well as the SIGOPS - Hall-of-Fame award in 2019. He is a conjoint professor - at UNSW Sydney. -
-- Matthew is the representative of Premium Member Jump Trading, - where he specializes on measurement and optimization of - high-performance and low-latency network systems. He holds a - doctorate in computer science from the University of Cambridge - where his research work focused on techniques for managing and - mitigating latency variance in hyper-scale datacenter - networks. He is also a former member of the Trustworthy Systems - research group. For his honors project, Matt worked on capability - allocation/deallocation techniques using the seL4 capability - system. Matthew maintains a strong interest in facilitating and - performing research, particularly in the areas of - high-performance, and high-assurance systems. -
-- Qiyan is the representative of Premium Member NIO, where he - leads a global R&D team responsible for Vehicle Operating - System, Connected Vehicle Cloud, Vehicle Digital Architecture, - Cyber Security, and Vehicle Software Integration and - Validation. Prior to NIO, he worked as Principal Scientist at - Symantec and Exabeam. He received his PhD in Computer Science - from the University of Illinois at Urbana-Champaign with - research focus on Distributed Systems and Cyber Security. -
-The compliance committee proposes rules and licensing conditions -for the seL4 trademark, and drives the Interim Endorsement scheme for -seL4-based products and services.
- -Its present members are:
-The Outreach Committee is in charge of expanding the membership. It -develops material for supporting membership recruitment. Members of -the committee will work closely with existing members to make best use -of their networks for strategic recruitment of members. The Outreach -Committee may co-opt member representatives.
- -Its present members are:
-The Marketing Committee is responsible for the external presentation -of the Foundation. This includes the look-and-feel of the web site and -presentation materials and other branding issues, social media -presence and other media liaison.
- -Its present members are:
-- If you would like to contact us about the foundation, please - email us at: -
- -- -
- - - -- The seL4 Foundation is established as a - project under The Linux Foundation. It is designed to - fulfill the key principles described here and summarised below. -
-- The seL4 Foundation has 2 parts: -
-- The seL4 Foundation is intended to be structured and governed - to promote the following key principles: -
-- The seL4 Foundation is underpinned by 2 key documents: the - seL4 - Foundation Fund Charter, and the - seL4 - Foundation Technical Charter. Both are modelled on - the standard approach for Linux - Foundation projects. -
-- -This page matches member organisations looking for seL4 expertise and -people looking for jobs in the seL4 ecosystem. - -
- --The list is in chronological order, more recent at the top. -
- -- -If you are a member of -the seL4 Foundation! -and would like to post job offers here, email foundation@sel4.systems with:
- -- -
-
- HENSOLDT Cyber is a joint venture between Secure Elements GmbH and
- HENSOLDT Holding Germany GmbH. We are a founding member in the seL4
- Foundation and also member of the RISC-V foundation. Our mission is
- establishing a paradigm shift to cyber security, we advocate secure IT
- instead of IT security. We combine the know-how of more than one
- hundred years of experience in high-performance technology in the fields
- of defense and aerospace. We build systems that are secure from the ground
- up, combining innovative physical protection with mathematical proofs of
- software correctness to achieve true trustworthiness. We offer
- Security Made in Germany.
-
- Optimized for use in industrial, aerospace and defense applications, our
- customers can expect high quality military-grade security, safety
- critical, user-friendly and flexible solutions. Our products have been
- designed to ensure the integrity of embedded systems at the core: the
- operating system and the processor.
-
- The operating system TRENTOS is a revolution in cyber security based on
- the seL4 microkernel and CAmkES. We developed this highly secure operating
- system for IoT devices and cyber physical systems. seL4 provides strict
- isolation of components, with communication restricted to explicitly
- enabled channels, ensuring clarity of information flows. Mathematical
- proofs of implementation correctness of seL4 as well as critical
- components guarantee system integrity under all operating conditions.
-
- Our MiG-V is a RISC-V based general purpose processor targeting
- high-security use cases. The core's logic encryption prevents the
- insertion of hardware trojans through production. Running seL4 from ROM
- prevents any kernel modifications to achieve ensures highest security
- levels.
-
- The combination of MiG-V and TRENTOS gives HENSOLDT Cyber full control of
- the design and production chain. The MiG-V SoC can be used together with
- the formally verified seL4 microkernel hosted in the chip's internal ROM
- to create an ultra-secure solution.
-
- In order to fulfill our mission, we are expanding our teams in Engineering
- (junior/senior level) and Research (PhD program and post-doc).
-
- We are looking for the following profiles with focus on seL4 for our
- office in the south of Munich or remote, Germany-wide:
-
- -
-- Please visit https://hensoldt-cyber.com/job-offers - or contact Daniela Kagerer at daniela.kagerer@hensoldt-cyber.com. -
-- -
-- - DornerWorks is an seL4 Foundation founding member, a leading contributor - to the open source project, provides integration services, training, and - tools to accelerate/support the growth of seL4 globally. Gregg Wildes is - also on the board of directors for the US (seL4 focused) trusted computing - COE. - -
-- - DornerWorks, a leader in embedded systems engineering, is growing and - seeks a Senior Firmware Engineer to join our team. Our Separation - Technology team is pioneering the use of hypervisors and virtualization in - the embedded space. Using hypervisors in embedded applications is - relatively new, and our outstanding team is partnering with vendors and - customers to apply this novel technology to new products. Demand for our - expertise continues to grow, and we are seeking top-notch technical minds - who are comfortable blazing a trail in this emerging technology. As you - develop hypervisor functionality, you will become an expert in the open - source ecosystems around Xen Project hypervisor, Linux, and the seL4 - micro-kernel as you gain advanced understanding of cutting-edge - system-on-chips (SoC). This position is located in Grand Rapids, - Michigan; however, we are open to remote employees as well. - -
-- - Please visit https://dornerworks.com/careers/ - or contact Deb DeVries at deb.devries@dornerworks.com. - -
-- -
-- - NIO Inc. is a pioneer in China’s premium electric vehicle market. We - design, jointly manufacture, and sell smart and connected premium electric - vehicles, driving innovations in next generation technologies in - connectivity, autonomous driving and artificial intelligence. Redefining - user experience, we provide users with comprehensive, convenient and - innovative charging solutions and other user-centric service - offerings. NIO went public in U.S. in 2018. So far, NIO has launched 3 - mass production vehicle models: ES8, ES6, and EC6, and accumulated - deliveries to users are over 120,000. Starting September, NIO will start - delivering to users in Norway. NIO invests heavily in in-house R&D to - build full-stack cutting-edge technologies around intelligent and - autonomous driving EV. Its engineering teams are distributed across the - globe, including US, UK, Germany and China. See more on the company's - profile. - -
-- - Digital Systems department at NIO is missioned to develop the most - advanced software platform for the next-generation autonomous driving - vehicles in the industry from the ground up. This platform is internally - named NIO Vehicle Operating System (NVOS), and based off seL4. It - involves solving a wide range of technical challenges, such as seamless - app development on heterogeneous hardware chipsets, low-latency & high - throughput data processing, powerful AI framework, automobile-grade safety - and security guarantee, and complete toolchains to provide Android alike - development experience. - -
-- - We are looking for world class experts in seL4 and OS / software - platform in general, and positions available range from NVOS Architect - (x5), Software Developer (x4), Software Dev Engineer in Test (x3), - Security Engineer in Formal Verification (x1), to Chief Software Architect - / Technical Fellow (x1), and are based in San Jose or Seattle in U.S. - - Some job postings can be found - here - - -
-- - Please send resume to Selena Parigoris (selena.parigoris@nio.io) and - Qiyan Wang (qiyan.wang@nio.io) - -
-- Become part of the members who have already joined the seL4 Foundation!. -
-- Joining is an easy process via the Linux Foundation's online - signup page. -
-- Note that seL4 Foundation members must be (or become) members of the Linux Foundation. The online process will include your Linux Foundation membership if you are not already a member. Details on Linux Foundation membership can be found here. -
-- You can review the seL4 Foundation Directed Fund Participation Agreement. -
-Questions? Email us at - foundation@sel4.systems -
- - -- Below is the list of members of the - seL4 Foundation. Want to be part of the adventure? -
-- JOIN NOW - HERE! - -
-- - - - | -
-
- Cog has been preparing for the revolution in connected device
- architecture since 2017. The traditional architecture of IoT and
- other connected devices has created innumerable opportunities
- for bad actors to compromise the device, thereby forcing
- security policy to accept higher risk and restricted access,
- which in turn poses a burden on users. We have adopted an
- embedded solution set, leveraging seL4, built on modularity,
- proactive security, trustworthiness, and adaptability to enable
- highly secure connected devices. - - As the leading integrator of type-1 visualization solutions - based on seL4, Cog leverages modularity to isolate critical - functions and services on connected devices. This approach - pro-actively secures these devices by reducing the attack - surface and increases reliability by eliminating single points - of failure. Cog focuses on securing the kernel, data, and - network as the baseline to our security. Additionally, we can - isolate specific applications, operating systems, drivers, or - services to further achieve a full defense in depth based - solution. The system can scale linearly and infinitely, thus - reducing bottlenecks and preserving performance. All of this is - available for the IoT market with the flexibility to run all - applications effectively and securely. - -
|
-
- - - - | -
-
- DornerWorks helps product makers turn their ideas into
- reality with FPGA, hardware, and embedded software engineering
- expertise. We accelerate your product development and lower
- risk for adopting advanced technologies. One of our
- specialties is seL4 microkernel-based
- development. DornerWorks, a founding member of the seL4
- Foundation, can accelerate integration of seL4 as the trusted
- software base for your products.
- - - DornerWorks Ltd is an Endorsed Services Provider for: -
|
-
-DornerWorks, Ltd.
-3445 Lake Eastbrook Blvd SE
-Grand Rapids, MI 49546
-Phone: +1.616.245.8369
-Email: sales@DornerWorks.com
-
- The type of services that the member has expertise on and is being endorsed for, are described in detail, and taken from a template list of services, namely: -
-- Endorsement in one of the category above means that the member has one or multiple people in-house who have that expertise and have already contributed in this area. This is reviewed annually. -
-- Each category can have qualifiers/examples, which can be suggested by the member, eg "user-level OS (VM)” or “user-level OS (CAMkES).” -
-- The endorsement of services is limited to members and provided for free. -
- - - - -- - - - | -
-
- In the development of high assurance systems with military grade
- security, HENSOLDT Cyber works intensively with the seL4
- microkernel. As we aim to increase the usability of seL4
- technologies, we develop user-friendly components bundled in the
- seL4 operating system TRENTOS, providing an easy-to-use basis
- for the development of embedded systems. We support our
- customers by guiding them with our seL4 experience and improving
- their development time by advising them on the correct
- application of the seL4 technologies. -
|
-
- seL4 is an attractive platform for building highly resilient - systems, but to do so requires a fair degree of understanding of - the technology. Fortunately, help is available from a growing - number of community members offering consulting and development - services around seL4. -
-- Below are the seL4 Service Providers that are endorsed by the seL4 Foundation -
-- If you are a member and would like to be endorsed, you can find more information on the endorsement scheme. If you are not a member yet, you can join the seL4 Foundation. -
- -- - - - | -
- DornerWorks Ltd - Innovative companies are building products on a trusted - software base with the guidance of DornerWorks engineers. As - a founding member of the seL4 Foundation, DornerWorks can - accelerate the integration of seL4 as the trusted software - base for your products. - - - DornerWorks Ltd is an Endorsed Services Provider for: -
|
-
- - - - | -
- Cog Systems Inc - As the leading integrator of type-1 visualization solutions - based on seL4, Cog leverages modularity to isolate critical - functions and services on connected devices. All of this - is available for the IoT market with the flexibility to run - all applications effectively and securely. - - - Cog Systems Inc is an Endorsed Service Provider for: -
|
-
- - - - | -
- UNSW Sydney - - The Trustworthy Systems (TS) team is the creator of seL4 and - the seL4 Foundation, and for a long time was the sole source - of support. With the seL4 Foundation now in place, and at its - new home at UNSW, TS is now focusing on seL4-related research - and driving development, leaving engineering mostly to other - ecosystem players. However, TS is happy to take on research and - consultancy contracts, as well as providing engineering - (systems and verification) services when no commercial player - is available. - - - Trustworthy Systems specialises is an Endorsed Service proider for: -
|
-
- - - - | -
- Proofcraft Pty Ltd - - Formal verification is what makes seL4 unique. With increasing uptake - and adoption, seL4 is evolving, supporting more platforms, - architectures, configurations, and features. An increasing number of - high assurance systems are built with seL4 as a trustworthy foundation. - - As seL4 code evolves, so must its formal proofs. As more systems are - built on seL4, there is an increased need to ensure correct - configuration and initialisation, and correctness of critical - components. - - Proofcraft is here to help. Founded by the seL4 verification leaders, it - offers commercial support, verification projects, training and - consulting on formal verification in general, and involving seL4 - specifically. - - By applying mathematical machine-checked software verification, - Proofcraft increases critical software systems' reliability, safety and - security, for a verified future. - - - - Proofcraft is a Trusted Service Provider for: -
|
-
- - - - | -
- Kry10 Limited - - Kry10 offers support to enable seL4-based secure projects to be - affordable, maintainable, and remotely manageable. Kry10 offers a - full-featured operating system on top of the seL4 kernel, along with - tooling, services, key management and more. The Kry10 Platform is a fast - and easy way to build highly secure, next-generation cyber-physical - devices. We leverage the verification of seL4 to bring you a secure, - self-healing, truly dynamic system with minimal downtime, even during - upgrades. Whether you are working on national assets, vehicles or - sensors on a wall, you require deep confidence and easy to use - tools. Come talk to us. - - - - Kry10 is an Endorsed Service Provider for: -
|
-
- Keynote -
- --I will provide an overview of the seL4-related research activities of the Trustworthy Systems group at UNSW, and how they relate to each other and the overall seL4 vision. Some of these activities will be covered in more detail in the afternoon session (seL4 Core Platform and seL4 Device Driver Framework), so I will mostly provide context for them and focus on the activities that will not be discussed further. These include: -
--I will also attempt to provide some context for various pull requests against the kernel originating from TS. -
- - - -- Talk -
- -- Verification makes seL4 unique. With increasing adoption, seL4 is evolving to support more platforms, architectures, configurations, and features, meaning its formal proofs must evolve as well. Proofcraft is committed to keep this evolution alive. In this talk, we will present the status of the seL4 verification roadmap. -
-- seL4’s extensive formal verification comprises formal proofs of a number of properties for various hardware architectures: AArch32, Intel x64 and RISC-V (64-bit). These properties include: -
-- The verification matrix of architectures, properties, configurations and seL4 features is ever evolving. AArch32 still has the most complete proof stack, but RISC-V is catching up. Intel x64 and AArch32 with hypervisor extensions have verified functional correctness. The current roadmap includes completion of the seL4 MCS configuration (support for mixed-criticality systems), functional correctness of seL4 on AArch64, and progress on multicore seL4 verification. -
- - - -- Talk -
- -- Kry10 is building a cost-effective platform for connected devices, with extreme security and reliability. We choose to build on seL4 because its capability model gives us the mechanisms, and its verification gives us the confidence that we need. But how do we understand what the verification says about how we should use seL4's mechanisms to build secure systems? -
-- From the functional correctness and invariant proofs, we know that the implementation has no behaviours that aren't permitted by the specification, and that the specification is internally consistent. But the specification still contains considerable detail. When viewed from the perspective of a user outside the kernel, it can be hard for a mere mortal to infer the security properties of a particular system design. -
-- In this presentation, we will look at the seL4 integrity theorems, which give us an abstract way to understand the authorities that components in a system have over each other. We'll see how to construct abstract authority graphs, called policies, and how they relate to individual system states through policy refinement. Policy refinement is a purely static view of the system state, which is appropriate for system initialisation, but we're also interested in how the system evolves from its initial state. So we define integrity as the system state changes that we want to allow for a given policy, and prove that actual state changes are bounded by that definition. Note that integrity does not tell us whether the new state is governed by the same policy, so a separate proof, called authority confinement, shows that state changes preserve the policy refinement. -
-- Both theorems are subject to some well-formedness assumptions about the policy. These assumptions are important for system designers who want the benefit of the theorems, because they act as constraints on their system designs. So we'll examine these conditions in detail, and consider what they mean for static systems such as those produced by the CAmkES tool and the capDL loader. We'll also look at more dynamic systems, where we'll see that with careful design, the theorems can still provide some benefit. -
- - - -- Talk -
- -- The seL4CP is a very lightweight OS environment for seL4 that’s presently being developed by Breakaway in collaboration with TS. Compared to CAmkES, seL4CP abstractions map more directly on seL4 primitives, and it dissociates app development from the kernel build system, allowing easier integration into the developer’s preferred development environment. The seL4CP was originally presented as a concept at the 2020 seL4 Summit. It now has an implementation that is already used in products. The talk will provide a refresher on the seL4CP’s concepts and will the discuss recent/on-going work, which falls into two broad categories: -
--a) Verification: this has itself two thrusts: -
-- b) Adding dynamic features to seL4CP. This is a multi-step process, of making apps restartable to supporting empty app slots that can load arbitrary apps at run time -
-- Both categories are work in progress, with prototypes of partial functionality available at time of writing, significant progress is expected by the time of the Summit. -
- - - - -- Talk -
- -- Here we present a framework for high-performance I/O on seL4 that enables formal reasoning, eventual verification and demonstrates performance competitive with Linux in a networking focused system. Unlike monolithic kernels, the seL4 microkernel prescribes device drivers to run as user level programs. This has the advantage that a driver’s special privileges are reduced to just the ability to access the control registers of the device it drives, thus significantly reducing the system’s trusted computing base. However, the extra context switches involved in such a system can degrade performance. The seL4 Device Driver Framework (sDDF) aims to provide interfaces and protocols for writing and porting device drivers to run as seL4 user-level programs. It assumes a simple and general device model, and presents an asynchronous transport layer as a means of communication to other components in the system. It currently supports network devices to run at near wire speed. -
- - - -- Talk & Discussion -
- -- Verified multicore seL4 seem too far away? Think again, this talk presents a simple multikernel approach to achieve this goal that is attainable using the verified unicore kernel we already have. While this solution does not provide all the benefits of a single system image it allows us to build static systems on a verified seL4 using multiple cores today. This talk will detail how to construct such a system, the work involved and examples of how it can be used. -
- - - -- Talk -
- -- The traits of seL4 makes it an appealing hypervisor platform. Today hypervisors are increasingly used to build complex security- and safety critical systems. Good and stable abstractions are required to build upon, and that in turn needs a vivid community of developers and maintainers. Having access to stable and high quality drivers can help building such a community, and is one step towards having seL4 on par feature-wise with the other hypervisors. At TII we explored if QEMU could be used as a VirtIO backend for seL4. The QEMU would bring the tried and tested VirtIO backend, and already thriving ecosystem to work with. Having VirtIO backend running in a Linux VMs user space has its benefits, but also comes with an overhead cost. This talk walks through our journey with having a QEMU within a Linux VM on top of seL4 to provide paravirtualized devices to the other VMs. We share how we went about getting the QEMU working with seL4 along with the benchmarks, the learnings and the pain points. We share where we are at the moment, and our plans for the future. -
- - - -- Talk -
- -- The talk gives an overview about what works more or less out of the box for ARM and RISC-V and what advances configuration and debug options can be used. Then we will look at the limitations of the various emulated machines and some pitfalls. Finally we will explain some of the modifications we have done to the QEMU sources, so it provides some otherwise missing features. -
- - - -- Talk -
- -- Our work has been aimed towards easing the overheads for new users to adopt seL4. To support this, we have developed a relatively quick and easy method for providing a high level of driver coverage for an i.MX8MQ-based board (Avnet MaaXBoard). The approach implements a framework to support the U-Boot Driver Model, a standard model employed by U-Boot for defining and interfacing to device drivers. With that framework implemented, the drivers already available in U-Boot (which comprise a very large set) can be made available within seL4 with either limited or zero code changes to the driver itself. -
-- Our approach has so far been used to port several drivers from U-Boot including USB3.0, Ethernet, MMC, GPIO, I2C, SPI. -
-- This approach is not optimised for performance or verifiability and is unlikely to be used for drivers where this is paramount. However, our approach is intended to be complementary to such use cases, with significantly less handcrafting of bespoke drivers, helping to lower the bar for entry into seL4 development. -
- - - -- Talk -
- -- Microarchitectural timing channels enable information transfer between security domains that are supposed to be isolated, bypassing the operating system's security boundaries. They result from shared microarchitectural state that depends on execution in one security domain and impacts timing in another. Since modern ISAs do not specify timing behaviour, they are insufficient to address these channels. -
-- In this talk, we present fence.t, a novel RISC-V instruction that clears the processor's microarchitectural state and thus any timing dependence on execution history. We show how this instruction was implemented in an open-source RISC-V core and integrated into an experimental version of seL4 with time protection. Furthermore, we will address the challenges of fence.t and its future roadmap. -
- - - -- Keynote -
- -- The Kry10 Secure Platform is a new seL4-based platform that brings security and reliability to industrial connected devices. The platform is based on a philosophy of "Trust but Isolate" - build trusted software to the best quality, but isolate it so that if problems do occur, they cannot spread to the rest of the system. -
-- "Trust but isolate" requires: strict spatial and temporal isolation for OS processes, modular system design that benefits from and takes advantage of isolation to contain any errors, and the ability for application and OS software to be restarted and updated without causing downtime for the rest of the system. -
-- The foundation of the Kry10 Secure Platform is Kry10 OS (KOS), an OS based on the guaranteed isolation provided by the seL4 microkernel. KOS builds on top of seL4, providing a dynamic runtime environment that allows for a flexible and updateable system architecture. KOS integrates an Elixir-based application environment bringing the resilience and concurrency benefits of the BEAM to connected devices. KOS also enables fine-grained and efficient system updates, so that updates can be performed on specific application or system components without affecting other running components, thus virtually eliminating the need for scheduled downtime. Finally, KOS provides a high quality development environment with API and tools that are designed to be consistent, understandable, and usable. -
-- In this presentation we will introduce the Kry10 Secure Platform with its Trust but Isolate philosophy, and then show how the Kry10 Operating System implements this philosophy to achieve a secure and robust platform for industrial connected devices. -
- - - -- Talk -
- -- When building secure and robust systems, the general strategy is to "prevent, contain, and recover". Ideally we prevent problems (like errors and vulnerabilities) from occurring in the first place, contain the effects of any problems that do occur, and recover from those problems by repairing any damage and ensuring the problems do not happen again in the future. -
-- SeL4 provides excellent spatial and temporal isolation mechanisms to help contain any potential problems, but it does not address prevention and recovery - gaps left for user-level software running on top of the kernel. The BEAM virtual machine and its Erlang and Elixir programming environments provide one of the best opportunities to fill these gaps. Developing code based on the BEAM and its programming environments prevents many errors from occurring, leading to robust user-level components. The BEAM also provides strong fault-recovery mechanisms based on its supervision trees and a "crash and restart" philosophy coupled with dynamic code (re)loading. This, combined with seL4's strong isolation, leads to systems that can realise the full "prevent, contain, and recover" strategy. -
-- In this presentation we will demonstrate what can be achieved by combining seL4 and the BEAM. We will also describe our experience with building BEAM-based systems on seL4, including porting the BEAM to run on seL4, integrating the BEAM with seL4 inter-process communication mechanisms and other C-based components, and creating a powerful Elixir-based development environment for seL4 systems. -
- - - -- Talk -
- -- Most modern computing platforms are so complex that they need a separate embedded system to manage them. These systems are referred to as (Base-)Board Management Controllers or BMCs. BMCs handle power and clock distribution and sequencing, firmware for other components on the board, and usually offer remote management capabilities (e.g. console access and firmware updates). This makes them the root of trust in such systems. -
-- Although BMCs have absolute power over modern computing platforms they are not engineered in the rigorous way that warrants the implicit trust that we put in them. In our talk we will present ongoing work on declarative power and clock management and our broader vision of a trustworthy BMC software stack with, at its heart, seL4 as a separation kernel. Not only will a trustworthy BMC stack improve safety and security of modern computing platforms but, with the right tools for generating code from declarative models, it has the potential to shorten bringup times for new platforms. -
- - - - --
- -- The Rust programming language and ecosystem offer memory safety and developer productivity even at lower levels of the software stack. There are numerous efforts within the seL4 community towards laying groundwork for an accessible development story for Rust in the seL4 userspace. This talk explores the technical considerations related to Rust in the seL4 userspace, surveys the accomplishments and directions of these efforts, and then calls for the participation of interested parties in the ongoing design and implementation of Rust support in the upstream seL4 software ecosystem. -
- - - -- -
- -- We are investigating the question of whether the field of software verification has matured enough to allow a small group of researchers at two undergraduate institutions to prove correctness properties of network protocols implemented in operating system distributions, in general, and IoT devices, in particular. As a proof of concept, we are designing a networked temperature sensor, to monitor incubators, built on top of the seL4 microkernel and seL4® core platform. In this talk, we will share our early experience building and proving some properties about such a system. In particular, we will describe our efforts developing our own UDP networking stack, testing IPv6-based protocols, proving properties about reassembly of network fragments, and finding possible inconsistencies in specifications published by the Internet Engineering Task Force. -
- - - -- Talk -
- -- Formal methods tools that provide mathematical proof of system properties have improved dramatically in their power and capabilities. As part of DARPA's Cyber Assured Systems Engineering (CASE) program, our team has developed a model-based systems engineering environment called BriefCASE that integrates formal methods at all levels of system design, including the ability to build systems targeting seL4. We will present an overview of the CASE project and the capabilities of the BriefCASE tools. We will also describe an application of the BriefCASE tools and workflow to the mission computing system in a military helicopter. -
- - - -- Talk -
- -- Remote attestation is a process where one digital system gathers and provides evidence of its state and/or identity to an external system. The external system appraises the attestation evidence to make judgments over the attesting system. For this process to be successful, the appraiser must find the attestation evidence to be convincingly trustworthy. Remote attestation is difficult to make trustworthy due to the appraiser’s limited access to the attestation target. In contrast to local attestation, the appraising system is unable to directly observe and oversee the attestation target. In this work, we present a system architecture design and prototype implementation that we claim enables trustworthy remote attestation. -
-- This architecture defines a layered system consisting of seL4 and a Linux virtual machine contained therein. Existing Linux systems may easily be run within the virtual machine, and augmented by coordinated attestation components running both at the Linux and seL4 level. We argue that this layered design offers both the flexibility to accommodate existing systems as wells as rigorous and trustworthy attestation capabilities. -
- -- Experience report -
- -- Even though seL4 promises that our resources are isolated, how can we know those resources are enough to fuel our applications? FerrOS is an approach to answering that question by using Rust's type system to layer resource management abstractions on top of seL4 primitives. This talk covers the productivity advantages of teaching a compiler to check that the right kinds of capabilities are in the right places, the tradeoffs between rigid and fluid modes of development, and the branching future paths for Rust with seL4. -
- - - -- Experience report -
-- A few important criteria have to be satisfied for a piece of software system before becoming ASIL-D certified, two of those are MISRA coding standard and Code Coverage. -
-- First, MISRA is an important coding standard for automotive industry. Making seL4 source code MISRA compliant is a key point to boost the adoption of seL4 in automotive industry. In this talk, we’ll present a joint work from us and our partners, how to make seL4 code MISRA compliant, who has chosen seL4 as the fundamental kernel for their OS product. We’ll discuss typical implementation issues which don’t follow MISRA guidance, the fixes and impacts on proofs. -
-- Second, Code Coverage has been an important metric to measure the code quality in automotive industry. Although seL4 is a formally proven, Code Coverage is still important for two reasons. One is Code Coverage can work orthogonally with formal proof to assure the code quality. The other is Code Coverage rate is key metric in many certifications. We’d like to share our work regarding measure seL4 kernel code coverage. We will present the measuring results and ways we have tried to improve code coverage rate. -
- - - -- Panel & discussion -
-- We are very fortunate to welcome four leaders at major funding agencies to participate in a session Funding agencies: priorities and vision. They will each give their views on the priorities and vision of their agency in terms of high-assurance systems. -
- The Defense Advanced Research Projects Agency (DARPA), established in 1958, is an agency within the Department of Defense (DOD) responsible for catalyzing the development of technologies that maintain and advance the capabilities and technical superiority of the U.S. military. -
-- William Martin currently serves as a program manager in the Information Innovation Office at DARPA. He joined DARPA from the National Security Agency (NSA), where he served in a variety of roles, most recently as acting technical director and cybersecurity subject matter expert of the Laboratory for Advanced Cybersecurity Research. His research interests include formal methods, domain-specific languages, system analysis, and trustworthy artificial intelligence. -
-- NCSC is the UK national technical authority for cyber security. Part of the UK government, we provide expert leadership and guidance to help make the UK the safest place to live and work online. -
-- Paul has worked in cryptography and hardware security since graduating with a degree in mathematics in 2001. He has represented the NCSC and its predecessor organisation in various standards bodies, including the Trusted Computing Group, Global Platform and FIDO. His current role allows him to spend time with academic and industry partners learning what the future holds for security technology, and also to help user communities take advantage of new features. Outside of work Paul likes to cycle up small hills in summer, and ski down bigger ones in winter. -
- The Agentur für Innovation in der Cybersicherheit (Cyberagentur) funds high-risk research and development projects with a high disruptive potential in the field of cybersecurity. The Cyberagentur’s goal is to advance internal and external security and technological sovereignty. It was created in 2020 by the German Federal Government and is funded by the Federal Ministry of Defence and the Federal Ministry of the Interior and Home Affairs. -
-- Sebastian Jester is Head of Secure Hardware and Supply Chains at the Agentur für Innovation in der Cybersicherheit, which he joined in June 2022. Previously, he was at Germany’s Federal Ministry of Education and Research, latterly responsible for microelectronics R&D policy at the national and EU level. He holds a doctorate in astronomy from the University of Heidelberg and a Master of Physics from the University of Oxford. -
- -- Technology Innovation Institute (TII) is pioneering global research institute that focuses on applied research and a new-age technology capabilities. The institute has seven initial dedicated research centers in Secure Systems, Quantum, Autonomous Robotics, Cryptography, Advanced Materials, Digital Security and Directed Energy. -
-- TII advances research rapidly through a defined research roadmap, approved research funding and state-of-the-art-facilities. By working with an exceptional talent, universities, research institutions and industry partners from all over the world, the institute connects an intellectual community and contributes to building an R&D ecosystem in Abu Dhabi and the UAE. The institute pursues the development of breakthrough technologies that have practical use-cases and global impact. Technology Innovation Institute also reinforces Abu Dhabi and the UAE’s status as hub for innovation and contributes to the broader development of the knowledge-based economy. -
-- Dr Shreekant (Ticky) Thakkar is Chief Research Officer at the Secure Systems Research Centre at the Technology Innovation Institute (TII), a cutting-edge UAE-based scientific research Centre and Adjunct Research Professor at Khalifa University. In this role, he is -responsible for carrying out advanced research that is driving end-to-end security and resilience in cyber physical and autonomous systems of systems (swarm of drones). These includes secure technologies in silicon, edge and mobile and cloud platforms working with open-source ecosystems (Dronecode, RISC-V, Linux, Apache, ROS) and research institutions across USA, Europe, and UAE. -
-- Plenary -
- -- Gernot will start the day by providing background on seL4 and its philosophy. Specifically he will talk about the principles that drive seL4’s design and abstractions. Given the low-level nature of seL4’s abstractions and mechanisms, and the deliberate policy-freedom, it is not always clear what constitutes “proper use”. Gernot will highlight some of the do’s and don’ts that developers should keep in mind to produce good designs. He will link this back to earlier presentations on user-level frameworks and how they support proper use. -
- Plenary -
- -- seL4 is commonly referred to as "the most verified microkernel". While this statement is true, the notion of being “verified” requires careful handling to ensure appropriate expectations and valid claims. seL4’s verification is its key differentiator. Inappropriate claims will damage its reputation and could have serious consequences in real systems. -
-- Not all seL4 configurations and features are verified, and not all “verified” configurations are verified to the same degree. While we should celebrate and promote the high-assurance that seL4 and seL4-based systems provide, it is important to ensure understanding of what exactly is proved, as well as the conditions under which the proofs hold and what they imply in practice. Such precision is also important and necessary to allow a suitable comparison with other alternative solutions. -
-- In this talk we will give a brief overview of what seL4 verification claims can be made and what they mean, and which claims should not be made. -
- - - - -- Plenary -
- -- The seL4 foundation manages a collection of over 55 repositories in the seL4 GitHub organisation. -
-- This talk gives an overview of the Continuous Integration (CI) setup for this collection, how the repositories are kept consistent with each other, and how we can tell after a change whether things are still working or not. -
-- The centre of this collection is the seL4 kernel repository itself. Its test suite includes running the formal verification of the kernel, as well as static compilation checks for all supported hardware platforms, simulation runs for all architectures, automated tests on hardware for most of the supported platforms, running benchmarks, documentation builds, etc. Both, formal verification and runtime tests are necessary – formal verification is good at showing the absence of bad behaviours, tests are good at showing the presence of good behaviours. They are also useful for validating assumptions of the formal verification. Test runs leave behind log files and build artefacts such as compiled kernel binaries or sel4tests binaries that can be simulated or run on hardware. Successful test runs automatically record the constellation of repositories that were involved in that successful run, so developers can easily trace and access known working combinations. The talk will also give an overview on how you can contribute tests, how you can help to improve the CI infrastructure, and how you can run most of these tests locally yourself. -
- - - -- Talk & Discussion -
- -- The lifeblood of open-source projects are the contributors, developers, and maintainers that work to keep the projects up to date, add new features, and squash bugs. However, there can be quite a few roadblocks that prevent or slow down upstreaming of code. This will be an account of the seL4 mainlining experiences of DornerWorks. This talk will encompass our successes, difficulties, possible improvements, and some open questions. This will be a short talk with a lot of time for open discussion. The goal is to spark a conversation that will lead to even greater collaboration than is seen today. -
- - - -- Talk & Discussion -
- - -- Using seL4 in complex production environments brings new challenges often quite different from research-oriented environments. At a high level, there are gaps in the seL4 stack, specifically the VMM, userspace, and tooling, which complicate matters for integrators attempting to meet real-world customer use cases. Not all business opportunities require a solution using a VM architecture, but those that do quickly become complex and would benefit enormously from an established standard or reference baseline. The lack of a robust and consistent VMM for seL4 has created a highly fractured environment. Most integrators have their own specialized customer use cases, and they have found that the quickest path is to use a forked and modified VMM. This practice may have short-term benefits to that integrator. Still, it does not allow the community to benefit from commonality and guarantees that the fork will get old and out of sync with the mainline. -
-- This talk proposes to establish a driving philosophy to design a baseline VMM rather than prescribe a specific system architecture. We intend to discuss the possible missing features of the existing seL4 VMM concerning standardization, more so than a prescription for the right way to do it. Indeed, this will entail recommending high-level architecture patterns but cannot lock an adopter into specific implementations. Each adopting integrator will inevitably start from the new standard and refine the implementation for their use case. The effort here is to close the gap between the current VMM baseline and the point of necessary deviation. -
- - - -- -
- -- While seL4 is an amazing technology, it is difficult to develop and build applications from scratch. Even when using virtualization, the development process for OS applications is a long loop of write, build, deploy, test, fix, build, deploy, test, etc. One way to improve on this is to borrow from the server world and support containers in VMs running on seL4. This improves embedded DevOps by allowing developers to test various container applications together on their host target, thereby reducing the number of required deployments. We will be discussing what work we have already done in this space as well as some thoughts on where to take it in the future. This will be a short talk followed by open discussion to explore issues and interests. -
- - - -- Talk & Discussion -
- -- Since the winter term 2020, the practical course "seL4 & TRENTOS" offers students at the TUM an introduction into the fundamental aspects of TRENTOS, a novel secure embedded operating system developed by HENSOLDT Cyber, which is built on top of the seL4 microkernel and the CAmkES framework. The course starts with a respective theory phase, in which students get to know the basic building blocks of both kernel and user space. Afterwards, the course participants work within teams on an individual practical project. They hereby apply a TRENTOS-based setup, running on top of the the Raspberry Pi platform, to a selected real-world use case (e.g. originating from the domains automotive or industrial automation). Besides providing a general course overview, this talk shall therefore demonstrate respective course results and serve as a starting point for follow-up discussions. -
- - - -- Teaser -
- -- A secure kernel is more and more attractive these days and seL4 is one of the strongest microkernels around. However, the seL4 ecosystem is still maturing and may not be a drop-in replacement for practical applications in real-world systems. With the strictest security needs, it is probably best to use just the microkernel with user-space applications. However, there are many stacks, libraries, and drivers lacking to meet the needs of most systems. Virtualization and the user-space VMM provide an answer to this. For developers new to the seL4 ecosystem, it is difficult to configure the software to meet system requirements. The traditional approach is to start with a known working configuration and tweak it until it fits the specific application. The latest approach is to use DornerWorks’ VM Composer, a graphical, drag-and-drop interface which allows one to easily configure their seL4-based, virtualized systems without needing to modify any CMake, CAmkES, python, or C files. This short, teaser talk will introduce the features and platforms that are supported in VM Composer. -
- - - - -- Plenary -
- -- The seL4 Foundation is home to the ecosystem of software, developers and adopters for safety- and security-critical systems based on seL4. It was formed in April 2020 as a neutral and community-based organisation that ensures long-term, independent support for seL4 and its ecosystem, and fosters strong community participation and ownership in the ecosystem. It raises funds for continuing and accelerating development, facilitates interoperability, standardisation and sharing of cost for the benefit of all. Its aim is to ensure that seL4 is not only the world’s best secure operating-system technology, but is readily deployable and supported by a diverse and stable ecosystem of services and products. -
-- In this talk I will give an brief update on the Foundation's successes in increased contributions, increased support, and increased membership, as well as the vision to keep supporting a thriving seL4 ecosystem. -
- - - -- Bootcamp -
- -- This session will help you setup a development environment for building and running seL4-based systems. -
-- Most tutorials and trainings begin with a step zero: "set up your development environment and all the prerequisites, then run 'hello world' to confirm that your setup works". It's expected that this step is trivial and "just works" and participants are expected to have already done this (at home) before showing up to the tutorial or training session. -
-- For many people this works. But for some people it doesn't "just work". Maybe they don't have time or resources to do the preparation, maybe despite their best efforts something doesn't work right, or maybe they want to set up their system a bit differently (e.g. a different OS) and the basic instructions are not enough. If that's you, then this session is for you. -
-- In this session we'll walk through the development environment setup, and provide assistance to make sure you have a setup that works so that you can actively participate in any of the other tutorials and trainings sessions. -
-- If you already have a working development environment set up, then you can probably skip this session - unless you want to lend a hand helping others get set up, in which case, come on down. We may even have cookies. -
-See this talk in the program- Bootcamp -
- -- CAmkES (Component Architecture for microkernel-based Embedded Systems) is a software development and runtime framework that shall ease systems development by providing an abstraction layer on top of the seL4 microkernel. As part of this workshop, participants shall therefore get to know the general CAmkES architecture as well as its basic building blocks. Finally, the execution of a corresponding CAmkES-based application on top of seL4 will be demonstrated. -
-See this talk in the program- Bootcamp -
- -- With TRENTOS, HENSOLDT Cyber develops a novel secure embedded OS on top of the proven seL4 ecosystem. The CAmkES framework is hereby utilized for providing the respective abstraction layer on top of seL4, which allows for constructing respective OS components and services (e.g. for storage or networking support) within TRENTOS. As part of this workshop, participants shall therefore get to know the general TRENTOS architecture, its basic building blocks as well as the standard TRENTOS operating system components. Finally, with the help of the TRENTOS SDK, a small TRENTOS application will be developed and the corresponding build and deployment process will be demonstrated. -
-See this talk in the program- Bootcamp -
- -- The seL4 Core Platform (seL4CP) is a minimal Operating System built on top of seL4. It was designed to be simple enough that those without prior experience with seL4 can get started easily in building secure performant systems on seL4. seL4CP provides lean abstractions so that seL4 can be used for building reliable systems easily, without being restricted to a specific environment. This workshop will introduce you to seL4CP such that by the end, you will be able to build systems for your own purposes and know how to run them on hardware. We'll also give a brief overview of the internals of seL4CP to make it a little easier for participants to port seL4CP to their own hardware. -
-See this talk in the program- Bootcamp -
- -- A secure kernel is more and more attractive these days and seL4 is one of the strongest microkernels around. However, the seL4 ecosystem is still maturing and may not be a drop-in replacement for practical applications in real-world systems. With the strictest security needs, it is probably best to use just the microkernel with user-space applications. However, there are many stacks, libraries, and drivers lacking to meet the needs of most systems. Virtualization and the user-space VMM provide an answer to this. For developers new to the seL4 ecosystem, it is difficult to configure the software to meet system requirements. The traditional approach is to start with a known working configuration and tweak it until it fits the specific application. The latest approach is to use DornerWorks’ VM Composer, a graphical, drag-and-drop interface which allows one to easily configure their seL4-based, virtualized systems without needing to modify any CMake, CAmkES, python, or C files. This training session will provide step-by-step instructions to configure an example virtualized system using an evaluation version of the tool. It will show basic and advanced configuration options. It will also create some invalid configurations to show the validation that the tool performs. -
-See this talk in the program- Bootcamp -
- --As part of DARPA's Cyber Assured Systems Engineering (CASE) program, our team has developed a model-based systems engineering environment called BriefCASE that integrates formal methods at all levels of system design, including the ability to build systems targeting seL4. In this hands-on session we will provide a top to bottom demonstration of the tools, transforming a system model to address cyber requirements, verifying the correctness of the model, generating component implementations from formal specifications, generating infrastructure code to run on seL4, automatically producing an assurance case documenting the design rationale, and running the final system in emulation on QEMU. A virtual machine containing all necessary tools and models will be provided before the session. -
- -See this talk in the program
-
Acknowledgement:
-Slide icons created by Syahrul Hidayatullah - Flaticon
-
- Bids should be sent to summit@sel4.systems and should include at least the following information: -
-- For examples of websites of winning bids for conferences in related areas, see e.g. -
- -- The deadline for bids is Tuesday, 22 February 2022. -
-- - The seL4 summit aims at gathering the seL4 community to - learn, share, and connect: -
-- - The seL4 summit covers the complete seL4 ecosystem, consisting of the verified - microkernel, as well as all seL4-related technology, tools, infrastructure, - products, projects, and people. - -
- -- - The seL4 summit 2022 will be in Munich, Germany, on 10-12 October 2022. - -
- -Share your seL4 work
-Share your seL4 experience
-Share your seL4 thoughts
-Share your seL4 questions
--We solicit proposals on any seL4-related topic, in particular in the areas of: -
-- - If you would like to propose a talk (or nominate someone else to be invited to - do so), please send an abstract of one page or less for your - proposed talk (or a one paragraph description of your nominee’s proposed talk) - by Monday 9th of May 2022 to summit@sel4.systems. Abstracts and - nomination paragraphs should indicate why the talk fits in the seL4 summit - scope. Notifications of accepted presentations will be made by Monday 30th May - 2022. If you would like to propose a talk to be delivered remotely, please - notify it in the submission. - -
- -- If you have questions, please do not hesitate to contact the seL4 Foundation summit team at: summit@sel4.systems. -
- -- The seL4 Summit 2022 was the fourth edition of the international summit on the seL4 microkernel, the world's most highly assured OS kernel. -
-- The first three seL4 Summits were organised by the Trusted Computing Center of - Excellence, and were hosted in the US. -
-- The seL4 Summit 2022 was the first to be organised by the seL4 Foundation, established in 2020. -
-- Summit organisation and hosting is based on these principles. -
-- The seL4 Summit 2022 was held in Munich, Germany (hybrid), 10-13 Oct 2022, hosted by HENSOLDT Cyber GmbH. -
-- We were very fortunate to welcome four leaders at major funding agencies to participate in a session Funding agencies: priorities and vision. They each gave their views on the priorities and vision of their agency in terms of high-assurance systems. -
-- Videos of the seL4 summit 2022 are available on the seL4 YouTube channel! Links and slides can be found on the summit Program and Abstracts pages. Thanks to all the speakers for making the seL4 summit 2022 a great success! -
-- We are grateful to the following sponsors for their financial support of the seL4 summit 2022. -
-- For any questions regarding the summit, please contact summit@sel4.systems. -
-- An open call for presentation invites submissions of short abstracts about cool work on seL4. -
- -- The Program Committee is in charge of the technical content (reviewing submission, selecting invited speakers, defining the program). -
- -- The Hosting Team is in charge of organising the event (venue, finances, catering, local arrangements). -
- -- The location is aimed to be on a different continent each year, as far as possible, with a hybrid in-person/online event. -
-- All times are local time in Munich, Germany (UTC+2). -
-Day 1 10 October 2022 | -|||||
---|---|---|---|---|---|
- | Session chair | -||||
9:00 - 9:10 | -Announcements | -Welcome | -- | - | Darren Cofer & June Andronick |
-
9:10 - 10:00 | -Keynote | -State of seL4-related research Gernot Heiser, - UNSW - |
- - | - | Darren Cofer | -
Break | -|||||
10:15 - 10:45 | -Talk | -seL4 verification roadmap Rafal Kolanski, Gerwin Klein & June Andronick, - Proofcraft |
- - | - | Nick Spinale | -
10:45 - 11:15 | -Talk | -Explaining the seL4 integrity theorems Matt Brecknell, - Kry10 |
- - | - | |
11:15 - 11:45 | -Discussion | -AMA (Ask Me Anything) with the Foundation TSC | -- | - | Darren Cofer | -
Break | -|||||
12:45 - 13:15 | -Talk | - The seL4 Core
- Platform (seL4CP) Zoltan Kocsis, - UNSW |
- - | - | Robbie VanVossen | -
13:15 - 13:45 | -Talk | -The seL4 Device Driver Framework (sDDF) Lucy Parker, - UNSW |
- - | - | |
13:45 - 14:30 | -Talk & Discussion | -Multiprocessing on seL4 with verified kernels Kent McLeod, - Kry10 |
- - | - | |
Break | -|||||
15:00 - 15:30 | -Talk | -Using QEMU to extend seL4 VirtIO support Hannu Lyytinen & Markku Ahvenjärvi, - TII |
- - | - | Ihor Kuz | -
15:30 - 16:00 | -Talk | -QEMU as prototyping platform for seL4 systems Axel Heider, - HENSOLDT Cyber |
- - | - | |
16:00 - 16:30 | -Talk | -Porting U-Boot drivers to seL4 Mark Jenkinson & Stephen Williams, - Capgemini |
- - | - | |
16:30 - 17:00 | -Talk | -fence.t: hardware support for preventing microarchitectural timing channels Nils Wistoff, - ETH |
- - | - | |
Traditional Bavarian Dinner 19:00 - 22:30 | -|||||
Day 2 11 October 2022 | -|||||
- | Session chair | -||||
9:00 - 9:50 | -Keynote | -Kry10 Secure Platform Boyd Multerer, - Kry10 |
- - | - | June Andronick | -
9:50 - 10:00 | -Announcements | -Foundation announcements | -- | - | June Andronick & Darren Cofer |
-
Break | -|||||
10:15 - 10:45 | -Talk | -seL4 and BEAM: a match made in Erlang Ihor Kuz, - Kry10 |
- - | - | Gerwin Klein | -
10:45 - 11:15 | -Talk | -Trustworthy board management controllers Daniel Schwyn, Ben Fiedler, Michael Giardino, David Cock & Timothy Roscoe, - ETH |
- - | - | |
11:15 - 11:45 | -Talk & Discussion | -Rust support in seL4 userspace: present and future Nick Spinale |
- - | - | |
Break | -|||||
12:45 - 13:15 | -Talk | -Early experiences proving the correctness of a network stack implementation Alain Kägi, Aubrey Birdwell, Caitlyn Wilde, Jens Mache & Richard Weiss, Lewis & Clark College |
- - | - | Rafal Kolanski | -
13:15 - 13:45 | -Talk | -CASE overview: Cyber Assured Systems Engineering Darren Cofer, - Collins Aerospace |
- - | - | |
13:45 - 14:15 | -Talk | -A verified architecture for trustworthy remote attestation Grant Jurgensen, - The University of Kansas |
- - | - | |
Break | -|||||
14:45 - 15:05 | -Experience report | -FerrOS: Rust-y unikernels on seL4 w/ compile-time assurances Zack Pierce, - Auxon |
- - | - | Kent McLeod | -
15:05 - 15:25 | -Experience report | -Make seL4 an ASIL-D certified system Yuning Liang, - Xcalibyte |
- - | - | |
15:25 - 15:45 | -Experience report | -seL4 Summit and TCCOE - an overview
- Renato Levy, Jason Li & Ray Richards, - TCCOE - |
- - | - | |
15:45 - 17:00 | -Panel & Discussion | -Funding agencies: priorities and vision
- - William “Brad” Martin, DARPA - - Paul Waller, NCSC - - Sebastian Jester, Cyberagentur - - Dr. Shreekant (Ticky) Thakkar, TII |
- - |
- - - - - - - |
- Gernot Heiser | -
Day 3 12 October 2022 | -|||||
- | Session chair | -||||
9:00 - 9:45 | -Plenary | -Overview: seL4 principles, abstractions and use Gernot Heiser, - seL4 Foundation |
- - | - | Matt Brecknell | -
9:45 - 10:00 | -Plenary | -Overview: what's verified, what's not, and what does it mean? June Andronick, - seL4 Foundation |
- - | - | |
10:00 - 10:45 | -Plenary | -The seL4 GitHub test suite Gerwin Klein, - Proofcraft |
- - | - | |
Break | -|||||
11:00 - 11:15 | -Announcements | -Discussion teaser and suggestions for Birds of a Feather | -- | - | Anna Lyons | -
11:15 - 12:00 | -Room 1: Talk & Discussion |
- seL4 mainlining: experiences, challenges, and solutions Robbie VanVossen & Chris Guikema, - DornerWorks |
- - | - | Anna Lyons | -
Room 2: BoF |
- Birds of a Feather on a topic to be suggested | -- | - | ||
Break | -|||||
12:45 - 13:30 | -Room 1: Talk & Discussion |
- seL4 microkernel for virtualization use-cases “The importance of a standard VMM” Everton de Matos & Jason Sebranek, TII+Cog |
- - | - | Room 1: Axel Heider Room 2: self-organised |
-
Room 2: BoF |
- Birds of a Feather on a topic to be suggested | -- | - | ||
13:30 - 14:15 | -Room 1: Talk & Discussion |
- Improving embedded DevOps with seL4 VMM Robbie VanVossen, - DornerWorks |
- - | - | |
Room 2: BoF |
- Birds of a Feather on a topic to be suggested | -- | - | ||
14:15 - 15:00 | -Room 1: Talk & Discussion |
- Experience teaching seL4 Sebastian Eckl, - HENSOLDT Cyber |
- - | - | |
Room 2: BoF |
- Birds of a Feather on a topic to be suggested | -- | - | ||
Break | -|||||
15:15 - 16:00 | -Plenary | -BoFs report back | -- | - | Gernot Heiser | -
16:00 - 16:15 | -Announcements | -Bootcamp overview | -- | - | Gernot Heiser | -
16:15 - 16:30 | -Teaser | -DornerWorks’ VM Composer Robbie VanVossen, - DornerWorks |
- - | - | Gernot Heiser | -
16:30 - 16:45 | -Plenary | -seL4 Foundation: overview, update and vision June Andronick, - seL4 Foundation |
- - | - | |
16:45 - 17:00 | -Announcements | -Concluding remarks | -- | - | Darren Cofer, June Andronick & Gernot Heiser |
-
Day 4 (Bootcamp, on-site participants only) 13 October 2022 | -|||||
9:00 - 10:00 | -Bootcamp | -seL4: from zero to hello world - Ihor Kuz, - Kry10 |
- - | - | Axel Heider | -
Break | -|||||
10:15 - 10:45 | -Bootcamp | -CAmkES Sebastian Eckl, - HENSOLDT Cyber |
- - | - | Axel Heider | -
10:45 - 12:00 | -Bootcamp | -TRENTOS Sebastian Eckl, - HENSOLDT Cyber |
- - | - | Axel Heider | -
Break | -|||||
13:00 - 14:30 | -Bootcamp | -The seL4 Core Platform (seL4CP) Ivan Velickovic & Peter Chubb, UNSW |
- - | - | Axel Heider | -
14:30 - 15:15 | -Bootcamp | -DornerWorks’ VM Composer: the easy button for virtualized seL4-based systems Chris Guikema & Robbie VanVossen, - Dornerworks |
- - | - | Axel Heider | -
Break | -|||||
15:30 - 17:00 | -Bootcamp | -BriefCASE tutorial Isaac Amundson & Darren Cofer, - Collins Aerospace |
- - | - | Axel Heider | -
17:00 - 17:05 | -Plenary | -Concluding remarks | -- | - | June Andronick & Darren Cofer |
-
-
Acknowledgement:
-Slide icons create by Syahrul Hidayatullah - Flaticon
-
- Keynote -
- --In both the safety and security industries, high levels of product assurance are sought to mitigate the risk of product failure. Often this means that software developers need to demonstrate that all functions do what they are supposed to do, the product does not do anything it is not supposed to do, and that the product is free from all known bugs and vulnerabilities. -
--Whilst none of these requirements have trivial solutions, testing does a reasonable job of checking the correctness of functions. Similarly, taking advantage of tooling (such as static analysis, dynamic analysis), tracking the discovery of bugs and vulnerabilities, and having a refined software patching process helps to mitigate the presence of bugs and vulnerabilities. However, it is much less obvious how one can gain confidence that the software has no unintended functionality without checking the entire software implementation. Even then, the scope of what you need to check is potentially unbounded (we’re looking for the unknown unknowns after all), issues will still be missed, and the resource requirements are high. -
--In this talk, I will describe how basing a software product on seL4 facilitates the scoping of this no unintended functionality problem, and in turn, reduces the amount of effort required when it comes to demonstrating assurance of a security product. By walking through an example, we’ll observe the assurance benefits of component isolation, data flow control, how seL4 helps to direct where we should focus our assurance efforts, and any caveats we should be aware of. -
--Accepting that the assurance effort should be commensurate with the criticality of the security product, my hope is that this presentation provides a sliding scale of seL4 features we should seek to take advantage of, be it for articulating an assurance case, or conducting an independent assessment. -
- -- Talk -
- -- The current state of the art in seL4-based system design is to statically partition system resources into unprivileged components. Components may synchronise and communicate with each other, but otherwise only have rights to their own resources. For such static systems, the seL4 security theorems guarantee that seL4 correctly enforces access controls, and does not allow any component to gain new rights. The main benefit of this approach is that it automatically gives strong guarantees about component isolation, without further verification effort, and these can be used to support arguments about fault tolerance and security. -
--However, some things are not possible in static systems. For Kry10, over-the-air software and configuration updates are important. Updates should minimise disruption to the system, and may therefore need to co-ordinate with running components. For example, a server may gain new clients, and an allocation of extra memory it can use to serve them. -
--Support for dynamic features like updates adds significant complexity. Dynamic systems must include some privileged components that retain authority to resources used by other components, so isolation guarantees are no longer free. Privileged components should be verified, so we need a way to reason about user-level components, and their interactions with each other and the kernel. -
--This talk will report on our initial work on this challenge. We'll discuss our approach to system design, which uses a strict hierarchy of control to ensure that supervisors have complete oversight of their subsystems, and can enforce protocols for resource delegation and revocation. We'll look at our work-in-progress supervisor API design, whose distinguishing feature is the ability to apply complex configuration updates with all-or-nothing semantics. And finally, we'll speculate on how we might eventually back this up with formal guarantees. -
- - - -- Talk -
- --With the rise in high profile attacks against safety and security critical systems, formal methods are being considered as a defensive option across many domains, such as with critical infrastructure, since they can prove that software behaves exactly according to specification, therefore minimizing software vulnerabilities. Unfortunately, there has been slow adoption of this technology due to technical (e.g., performance limitation of verification tools) and non-technical (e.g., unfamiliarity with concepts, difficult to implement) reasons. We propose an analysis of the interface between formally (checking software against specifications) and non-formally verified components, to better understand the impacts to system robustness. This work has the potential to be transformational by enabling wider adoption of this defensive measure. -
--We are analyzing system interaction impacts between components that are formally verified and those that are not using a e.g., seL4-provided channel with approved access control. The seL4 microkernel, which is the minimal core of an operating system provides strong isolation. To allow communication between components, seL4 must enable fine-grained access control, which is an explicitly enabled communication channel for a desired operation. -
--This talk is relevant to the seL4 scope because it covers an seL4 experience report relevant to developing capabilities toward “building a business case for using a verified kernel”. In order to use a verified kernel, especially with critical components, it is important to know its potential limitations and special considerations, therefore exploring the kernel’s interactions with components that might not be verified is paramount. -
- - - -- Talk -
- -- The seL4 microkernel is the world’s most highly assured OS kernel. Keeping this claim true is hard work. The formal verification journey of the seL4 microkernel is nearing two decades, and still has a busy roadmap for the years ahead. It started as a research project aiming for a highly challenging problem with the potential of significant impact. Today, the seL4 proofs represent more than a million lines of formal proofs that have been continuously maintained over a system that has evolved considerably, with significant new features being added in response to increased interest and adoption from numerous sectors. -
-- This unique maintenance of a formally verified, evolving software system is one of the largest examples in the emerging discipline of proof engineering: the art of systematic treatment, management and estimation of large-scale proofs. Proofcraft is constantly developing and refining proof engineering techniques to manage what is probably the world’s largest continually maintained formal proof artefact. -
-- Importantly, and perhaps paradoxically, proof engineering aims at reducing the reliance - on verification experts, in this case through techniques improving the genericity and automation of the seL4 proofs. - - In this talk we will present the challenges one encounters while maintaining such a large proof base, along with some of Proofcraft’s existing and planned techniques to make seL4 proofs more agile and friendly to change, more robust against predictable change, and less dependent on experts for updates. -
-- For instance, the current seL4 invariant proofs are split into a generic architecture- independent part and an architecture-dependent part. This allows significantly speed up in development of proofs for new features, as well as reduction of the proof update bur- den on code changes. We plan to improve this architecture split and apply it to other large proof artefacts in seL4. Another example is our plan to almost completely automate the verification of platform ports within existing verified architectures of the seL4 kernel. Currently, porting seL4 to a new platform involves determining which architecture the platform runs on, for instance Arm v7, Intel x64, or RISC-V 64, determining which devices are included, at which memory addresses they reside, etc. These lead to configuration parameters for the kernel and the definition of a set of constants. Instead of requiring the involvement of experts, we can develop proof automation that shows these interface relationships are satisfied by a concrete platform configuration, greatly reducing the verification overhead of porting to a new platform. -
- - - -- Talk -
- --Multicore systems with verified seL4 is just around the corner with multikernels - kernel state is isolated on each core and avoid kernel-mode concurrency for easier verification. Does this mean that it's not possible to support multicore at user level? Let's find out by investigating whether it's possible to efficiently support virtualizing SMP virtual machines -with small core counts using our multikernel mechanisms. -
--This talk will detail how to construct such a system, the work involved and examples of how it can be used. -
- - - -- Talk -
- --Most seL4 systems are multi-server systems - consisting of numerous user-level components that communicate amongst each other. These systems often rely on isolation and restricted communication between components to provide assurance about security and safety properties while minimising the trust put into individual components. For such assurance it is usually necessary to analyse the information and control flow in the systems in order to get an understanding of the isolation (or protection) domains and how the system could behave at runtime. This is something that we are interested in doing for the seL4-based Kry10 OS as well. -
--There has been past work looking at analysing static seL4-based systems for various information flow properties, but Kry10 OS is a more dynamic system. This presentation will discuss the problem space of analysing information and control flow in multi-server systems and present options and solutions (both formal and informal) for doing this for static and dynamic seL4-based systems. We will also discuss how such analyses contribute to overall system assurance cases and how they relate to kernel and user-level component proofs. -
- - - -- Talk -
- --Virtualization enables multiple virtual machines (VMs) to operate on a single physical machine, each with its own operating system, applications, and data, while sharing the underlying physical resources of the host machine. seL4 is a microkernel-based operating system that provides a high-assurance, secure, and efficient platform for the deployment of critical systems. It can be utilized as a hypervisor, providing a minimal and scalable infrastructure for virtualized environments, making it well-suited for use in embedded and real-time systems and high-assurance security-critical systems that require virtualization. -
--Our previous talk at the seL4 Summit 2022 presented our architecture on VirtIO-based Virtualization with seL4 Hypervisor and QEMU. We demonstrated how our approach provides VirtIO standard support to devices on top of the seL4 hypervisor using QEMU to provide the VirtIO device backends for the guest VMs. Our approach offered support for practically all VirtIO-device backends with a minimal amount of source code, providing accelerated graphics and proper file system support. -
--In this talk at the seL4 Summit 2023, we will show the evolution of our architecture compared to the one presented last year, as well as current efforts that we have been working on regarding virtualization support. We aim to discuss the adaptation and integration of our "VirtIO backend" implementation work from the CAmkES environment to the seL4 Core Platform (seL4cp). We will emphasize how the underlying concepts and principles are orthogonal to the choice between CAmkES and seL4cp, demonstrating the seamless transition of key elements such as CAmkES dataports to seL4cp shared memory regions. Our objective is to showcase the versatility and applicability of this virtualization approach, highlighting its value for rapid prototyping in both CAmkES and seL4cp environments. By presenting our work in this manner, we aim to encourage the adoption of this robust virtualization solution, empowering developers to efficiently prototype and deploy secure embedded systems, irrespective of their chosen -platform. -
--Our approach provides a flexible and scalable solution for critical systems, addressing the limitations of existing solutions while building on the foundation of our previous work. Our talk will provide an overview of the implementation details, performance improvements, and future directions for the technology, highlighting the benefits of using the seL4 hypervisor for virtualized environments. -
- - - -- Talk -
- --A lack of a good approach to I/O is one of the primary barriers to uptake for seL4. Unfortunately, there’s a distinct lack of guidance, along with too many poor performing solutions that don’t make good use of seL4. We believe a thoughtful design can, and should, demonstrate performance competitive with Linux. We present such a design in the seL4 Device Driver framework (sDDF). Its simple design prioritises a strong separation of concerns by using multiple isolated components, each with a single task in the pipeline, that communicate via a low-overhead, asynchronous transport layer. It’s presently focused on networking systems, and comparison against Linux already shows that simplicity wins. This talk will revisit the design of the sDDF, and discuss ongoing work to further evaluate and optimise the framework for device sharing. -
- - - -- Talk -
- --I will given an overview of seL4-related research and development at Trustworthy Systems. -
--At the core of our present work is the design and implementation of a new OS personality for IoT/embedded/cyberphysical systems that is based on the KISS principle – keep it simple, stupid! We take simplicity to the extreme, with fine-grained modularity driven by strict separation of concerns, resulting in extremely simple modules, most just comprising a few hundred lines of code. This is possible by abandoning the 1980's model of an OS, implemented by almost all contemporary OS designs, that strives to provide general (and thus inherently complex) policies. Our approach is the opposite: extremely use-case-specific policies, that are simple to implement, and trivial to replace. Our experience with networking (see the preceding talk by Lucy) shows that this approach is not only feasible, it can also be highly performant. -
--Highly aligned to the above is our work on the use of push-button verification of OS components. We have demonstrated that we can verify the implementation of the seL4 Core Platform this way: Once a suitable specification is created, the SMT solver provides the proof without further manual action. We have furthermore created an automated translation-validation toolchain, using a similar apporach as for the binary verification of seL4, that proves the correctness of a mapping of the seL4CP system specification (SDF) to the CapDL formalism that describes low-level access rights in an seL4 system (and that can produce a verified system initialiser). -
--Our experience with verifying seL4CP makes us confident that we can verify (at least) core components of our new KISS-based OS using the same push-button approach. This creates the exciting prospect that in the near future we will have an OS that is not only easy to use, yet high performant, but also at least partially verified. -
--Our third major activity is Pancake, our new systems language aimed at easing verification of OS components, especially device drivers. Pancake has a verified compiler, meaning that correctness proofs can be based on the semantics of Pancake rather than dealing with the complexities of C. We have already used Pancake to implement some components of the networking system, although significant work remains to be done. -
--I will finally give an update on our work on verified Time Protection, the principled prevention of microarchitectural timing channels, as wel as the SMOS project, which is designing a fully dynamic, general-purpose OS that can be proved to enforce a security policy. -
- - - -- Talk -
- --Sandboxing legacy code provides a low barrier approach for developers to start implementing systems in the seL4 ecosystem. However, these legacy applications often need to communicate with each other to function properly. seL4 provides a means of communication between virtual machines via a software implementation of an ethernet device called virtio-net, which currently suffers from performance and stability problems. These performance and stability issues present a barrier to adoption of seL4 for multiple markets. DornerWorks will present an overview of the seL4 virtio-net implementation, the challenges using it, how DornerWorks improved it in the mainline, and performance benchmarks which include our IP solution to increase performance by a factor of 40. -
- - - -- Talk -
- --At the 2022 seL4 summit, our colleagues presented a framework allowing u-boot drivers to be used in seL4. This submission presents follow on work, with the goal of improving seL4 USB support. Specifically, by writing a native xHCI driver and stack for use in seL4. -
--We use the Avnet MaaXBoard as our development board although our intention is to make the driver easily portable to other platforms. Our approach has been to port an existing xHCI USB stack from the NetBSD operating system into the Microkit framework, changing as little code as possible. -
--We also present an experience report detailing our development with seL4 as a team who had no prior experience with it. -
- - - -- Talk -
- --A reliable OS needs to make sure that it, and the software that runs on it, keeps running and is always available. -
--Ideally software would never fail, so reliability would be easy. But even if your software is perfect, there are always hardware problems, or problems when interacting with other software. Also software isn’t perfect (even if it’s formally verified) so we have to deal with inevitable failure. -
--One approach to dealing with failure is to let software crash, but monitor it and restart it when it does crash. This allows the system to control (and importantly - recover from) the failures. Erlang OTP-based systems take this approach, and it has worked extremely well for building highly reliable long-running systems. -
--We’ve applied this “let it crash” approach in the sel4-based Kry10 OS. In this presentation we will dive into our use of this approach, describe the challenges of applying it in Kry10 OS (such as resource recovery, dependency managements, re-initialisation of resources, etc), explain why seL4 provides all the right features for applying this approach at the system level, and give examples of how it helps to achieve reliability. -
- - - -- Gold Sponsor Talk -
- --Boyd Multerer, Founder and CEO of Kry10 will talk about the role of seL4 as a one of the critical ingredients for addressing the “real world” requirements and high level of assurance required by their critical systems. Boyd will talk about the importance of the continued innovation around seL4 and the additional platform services platform work Kry10 is doing to need to deliver addition of seL4 and the new work underway as a key ingredient to any broader platform for critical systems and the importance of new investments done and the critical role that seL4 plays as Boyd will emphasize role of seL4 and the Kry10 Platform. Hear about the design principles of the KRy10 Platform Kry10 Platform that caters to the real-world demands of critical systems. Don't miss this opportunity to learn about the exciting advancements in seL4 and the Kry10 Platform and its potential to support the real-world challenges faced by critical systems. -
- - - -- Keynote -
- --CantripOS is an open source operating system purpose-built to run ML workloads for embedded systems. It is being developed as part of Google’s project Sparrow, whose charter is to build a low-power embedded platform for ML applications with a focus on security and privacy. CantripOS is built in the Rust programming language1, runs under the seL4 microkernel2, and uses a modified CAmkES framework3. This allows CantripOS to run dynamically loaded applications in a controlled sandbox, while still retaining the benefits of a statically designed system. This paper describes the system design, modifications made to seL4 and CAmkES, and future directions. All the work described here is publicly available on GitHub4. -
- - - -- Talk -
- --What if the isolation that seL4 provides could be applied at a fine-grained level to individual processes? Frequently seL4 is used as a hypervisor but at MIT Lincoln Laboratory, we explored the potential of seL4 as a foundational block in a new security-focused operating system. Magnetite is a suite of performant, secure-by-design, real-time OS services built upon the formally-verified microkernel seL4 and written in Rust, a memory-safe language. Magnetite offers a feature-rich API for both legacy C and new Rust applications to engage with its variety of resource types, which extend seL4’s capability-based system to provide common OS services. Magnetite is built upon the Principle of Least Privilege (PoLP) to limit trust and time of trust, and also adheres to strong isolation properties with self-contained processes and system services, and isolated domains known as silos. -
- - - -- Talk -
- --This talk will demonstrate how Gapfruit OS [0], an operating system built with the Genode Framework [1], can be deployed for edge computing in industrial IoT environments. Genode is an operating system framework that supports seL4. -
--When it comes to systems engineering, we live in exciting times. On the one hand, we have projects, such as seL4 and Genode, that push the boundaries for a solid computing foundation from the bottom up. On the other hand, Zero-Trust principles move the industry to combine public-key infrastructures with TPM-backed device identities. Third, we can witness a trend from the cloud natives that tries to free us from much of the complex legacy code bases on the application layer with new runtimes such as WebAssembly/WASI. -
--I present Gapfruit's journey of deploying WASM code to a microkernel OS with capability-based security. I will explain how we chose the Genode Framework for our products and how we utilize it to port libraries such as tpm2-tss [2] and WasmEdge [3]. -
--I will then showcase a live demo demonstrating the zero-touch provisioning capabilities of an IoT gateway running Gapfruit OS. The demo will show how the device boots and connects to its digital twin on Azure [4] with TPM-backed credentials and how the desired-state configuration of its digital twin triggers the deployment of a WebAssembly application with WasmEdge to the device. -
--[0] https://gapfruit.com -
--[1] https://github.com/genodelabs/genode -
--[2] https://github.com/tpm2-software/tpm2-tss -
--[3] https://github.com/WasmEdge/WasmEdge -
--[4] https://azure.microsoft.com/en-us/products/iot-hub -
- - - -- Talk -
- --The Rust programming language and ecosystem provide memory safety and enhance developer productivity even at lower levels of the software stack. This talk outlines our efforts, funded by the seL4 Foundation, to apply Rust to seL4 userspace and facilitate its use in the seL4 software ecosystem. This talk will cover new bodies of Rust code related to libsel4, the seL4 Core Platform, and CapDL; information about how to integrate, extend, and contribute to this work; and our vision and roadmap moving forward. -
- - - -- Talk -
- --The seL4 Microkit is an operating system framework on top of seL4 that aims to provide minimal abstractions to make it easier to build statically structured systems on seL4, while still leveraging the kernel’s benefits of security and performance. Since the 2022 seL4 Summit, seL4CP has become more mature and is seeing wider use. At Trustworthy Systems, seL4CP is the basis of much of our work, including the seL4 Device Driver Framework and other OS services such as a virtual machine monitor. The goal of this talk is to give you an understanding of seL4CP and surrounding developments by covering three topics: -
-- Talk -
- --A natural way to perform hardware abstraction in SeL4 is to create a dedicated driver component. Writing such hardware driver components in SeL4 Core Platform for Rust is currently a manual process. Assuming a Rust library to perform register manipulation, etc. already exists (say, as an implementation of embedded-hal traits), it is still necessary to: -
--1. Design an RPC protocol that clients will use to access the hardware driver; -
--2. Implement the driver-side protocol; -
--3. Implement the client-side protocol, adapting any libraries already written to interface with the hardware drivers to use this RPC protocol instead. -
--This talk describes a way to use traits from HAL crates, such as embedded-hal to make the code implementing these protocols easily reusable. As an added benefit our approach allows code reuse in two more ways: Existing implementations of HAL traits for specific hardware can be turned into dedicated Core Platform components with a minimum of additional boilerplate; and hardware-agnostic libraries written on top of embedded-hal traits can be used in client components without writing adapters. -This approach is suitable for interactions with a networking stack (smoltcp) and other devices such as UART, and can be extended to other peripherals (timers, SPI, I2C). Our approach should make running Core Platform on various devices more straightforward. -
--We will present conclusions and examples developed as part of this work. -
- - - -- Panel -
- --Chairman, seL4 Foundation -
- --In my first job as an industrial automation engineer, I loved how disciplines came together: Electronics, mechanics, programming, and robotics - like Lego, using building blocks to create something new. -
--After my studies in Electrical Engineering and Computer Science, I worked for three years in research of HW/SW co-design for IoT systems. Since 2011, I have been in the defense security industry, first as a firmware engineer and later as a lead systems architect. -
--I was responsible for a framework for various security products: 100G link encryption, VPN, VoIP, and secure radio communication. I was also part of a team that developed a secure notebook for governmental agencies, including a new operating system for highly classified information. -
--In 2018 I co-founded Gapfruit to bring academic security research to real-world products. -
--I still love to create. -
- --Kent is an operating-systems engineer specialized in formally verifiable trustworthy systems using seL4. His interests include systems engineering and how using different operating system architectures can help construct trustworthy applications. -
--His work at Kry10 is focused on designing and developing the new Kry10 secure platform which includes a new device operating system, KOS, that leverages seL4 and the BEAM to make it easier to build and maintain embedded software that still needs to be secure and robust even if it’s connected to the internet. -He previously worked at the Trustworthy Systems Research Group where he helped oversee the technical development of seL4 as an OS engineer. He is currently a member of the seL4 Foundation’s technical steering committee. -
- --Juliana Furgala is an associate technical staff member in the Secure Resilient Systems and Technology Group. Currently she is researching secure and recoverable satellite systems. Interested in the pursuit of technology built with security in mind, she aims to develop lasting technology that can stand the test of adversaries, not just the test of time. Her recently published research focuses on the needs of embedded and real-time systems, specifically related to operating system development. -
--To lower the barrier of entry into STEM fields, she is involved in a variety of academic and outreach efforts. One such activity was founding LL EduCATE, a volunteer group that develops accessible, hands-on courses to introduce middle and high school students to the possibilities of STEM. The first course, an Introduction to Engineering Concepts was created for both independent student study and collaborations with educators. -
--Juliana received her BS degree in computer science in 2019 from Tufts University. She is currently pursuing an MS degree in cybersecurity at Georgia Institute of Technology. -
- -
-
Moderator
-
-Todd's research is focused on tools and techniques to develop safe, -secure, real-time, and dependable systems built on solid foundations. He -has designed and specified system architectures, hardware, and software, -and has developed tools, standards, and processes for enhancing design -flows. -
--Galois develops technology to guarantee the trustworthiness of systems -where failure is unacceptable. We apply cutting edge computer science -and mathematics to advance the state of the art in software and hardware -trustworthiness. -
- -- Talk -
- -- The royalty-free, open-source RISC-V is an ideal ISA for the high-assurance seL4 microkernel since the formal proof requires definitive understanding of its underlying architecture. DornerWorks’ use-case generally utilizes virtualization with seL4 to provide a secure platform which allows for cyber-retrofit, rapid deployment, and cyber resilience. Virtualization is an area where RISC-V is immature. The hypervisor (H) extension has been ratified, but there are still no commercially available silicon processors that support the extension. The Rocket Chip is a soft-core RISC-V implementation which can be instantiated on an FPGA and is essentially equivalent to a real silicon processor. DornerWorks bridged the gap between the seL4 VMM running on QEMU and running on actual silicon by getting a seL4 VMM running, for the first time, on a Rocket Chip instantiation which has the hypervisor extensions implemented. This presentation will provide an overview of the Rocket Chip, the RISC-V H extension, the effort that went into getting the seL4 VMM to run on Rocket Chip, and thoughts on the next steps for seL4 virtualization on RISC-V platforms. -
- - - -- Talk -
- --seL4 has a formally-proven kernel, but the safe and secure operation of a system built on seL4 depends on the correct operation of the user-level tasks that implement the system policies, services, and device drivers needed by the application, as well as on the correct operation of the application tasks. Running an seL4 system on a processor with CHERI extensions brings the extra assurance of the capability architecture to these user-level tasks, and thus increases the assurance of the overall application. -
--Our project builds on initial work done at Arm Research to port the seL4 kernel to the Arm Morello CHERI processor. The project aims to support a mixture of user-level tasks compiled as Hybrid code (that is, where capabilities are explicitly defined in the source code), and PureCap code (that is, where all pointers are dereferenced as capabilities). The seL4 user-level libraries must be ported to support these compilation options. SeL4 virtual machines will also be extended to support capability-aware operating systems, such as CheriBSD4, Morello Android5, and Morello Linux6. -
--This paper will report on the progress of the project, and discuss the requirements and design options for the communication of CHERI capabilities between seL4 tasks, and the implications this has on the seL4 IPC mechanisms. -
- - - -- Talk -
- --Despite the fact that numerous components and subsystems have been developed on top of or with seL4 over the past few years, sponsored mainly by DoD SBIR grants, seL4 does not have a high-assurance network stack. In earlier work on the HACMS project, Galois integrated an off-the-shelf TCP stack into a seL4 platform. Many other organizations have done something similar, either by shiming in existing low-assurance network code that has poor provenance and no rigorous assurance, or by using the Linux environment to provide networking features. To the best of our knowledge, there is currently no high assurance network stack readily available for embedded systems. -
--To mitigate this gap, we started with an existing and widely used Rust network stack smoltcp and are providing an incremental assurance, that is by no means complete, but provides a path towards a high assurance stack in the future. -
--This summer, we used Prognosis framework, offering automated closed-box learning and analysis of models of network protocol implementations, for model based veritication of TCP protocol in smoltcp, and Kani Rust verifier to verify TCP protocol logic and packet format correctness via symbolic execution. We have found protocol violations or misimplementations in the library, and have been working with the smoltcp developers to mitigate these violations. Furthermore, we integrated Continuous Verification suite with the smoltcp library, to automatically validate the code after each commit. -
- - - -- Talk -
- --The IOMMU Stage-2 only scheme (the view of IOMMU Stage-2 is as same as the MMU's) is simple, and seems good at most of time, but in order to go further for a more unrestricted and finely controlled Stage-1, we can apply the classic virtio scheme for IOMMU. The only extra important thing that needs to be done in virtio-smmu backend is managing relationships between messages in virtqueue and IOMMU or VSpace capabilities. -
--But what if we use a different page table granularity for SMMU than for MMU? As we know, the IO-mapping request from Guest OS could be as small as one normal page, but seL4 doesn't allow reusing huge or large frames in the same region at the same time. If we already distribute the region into one huge or several large frames, meanwhile, we can not re-segment it into small pages for IO-mapping. Even if leaving capability control aside, we have to use the scheme of Stage1 plus Stage2, and realize Stage1 construction for IO page table which is redundant already exists in VM's OS. -
--Now we have the complete Components'&VMs' IOMMU SID/CB capability management, derivation, and configuration. And most importantly, a proven IOMMU nested sw approach which has the advantages of both performance, flexibility and reliability, with few restrictions, with minimal effort and minimum changes using existing capability systems. -
--By hosting the installation/uninstallation of the Stage-1 context root, bring multiple benefits: -
--1. Not only has finely controlled Stage-1, but also rarely relies on VMM with little restriction and much more flexibility, such as, -
--2. We can separate out Guest OS internal IO page management, and keep them the same as the native IOMMU drivers. -
-3. Not only can native drivers be highly reused, but also the performance is almost the same as without virtualization -
- - - -- Talk -
- --We are completing the implementation of a minimal, pure IPv6 network stack optimized to run on IoT endpoints connected to a network through a Layer 2 Ethernet interface. This implementation supports only the minimal set of protocols (IEEE 802.3, ICMP, IP, and UDP) to provide efficient UDP-based communication between an IoT endpoint and any other host. -
--We believe our implementation will provide high performance and reliability through a strict application of separation of concerns and elimination of all unnecessary data copies while keeping the codebase amenable to verification. -
--In this talk, we report on our progress implementing and verifying this networking stack. -
- - - -- Gold Sponsor Talk -
- --This talk provides a brief introduction of NIO – a global smart EV company, and discusses how automotive industry evolves towards software defined vehicle, and how OS could play a key role in this transition, and shares what NIO’s vision and progress of building a vehicle OS using seL4. -
- - - -- Gold Sponsor Talk -
- --In today's digital age, when cyber threats are everywhere, the importance of building robust and secure systems cannot be overstated. This presentation dives deep into the initiatives undertaken by the Secure Systems Research Center (SSRC). We'll shed light on our collaborations, projects, and the novel solutions we've pioneered to tackle pressing cyber challenges. The SSRC is a pillar among the ten research centers that comprise the Technology Innovation Institute (TII). Situated in Abu Dhabi, TII aims to lead the way in tech research, focusing on critical areas in the digital world today. In this presentation, we will discuss our latest work and how tools like the seL4 microkernel help make our systems even more secure. By the end of this session, attendees will gain a panoramic view of SSRC's achievements over the past year. We'll also offer a glimpse into the future, outlining our strategic plans and emphasizing SSRC's commitment to pushing the barriers of tech security. -
- - - -- Update and discussion -
-- This session will include a community update from Kent McLeod, Kry10, and SIG updates from Matt Brecknell, Kry10, Yanyan Shen, NIO, and Everton DeMatos, TII. There will also be opportunity for discussion. -
-
- Kent McLeod, KOS engineering lead, Kry10
-
- Kent is an operating-systems engineer specialized in formally verifiable trustworthy systems using seL4. His interests include systems engineering and how using different operating system architectures can help construct trustworthy applications. -
-- His work at Kry10 is focused on designing and developing the new Kry10 secure platform which includes a new device operating system, KOS, that leverages seL4 and the BEAM to make it easier to build and maintain embedded software that still needs to be secure and robust even if it’s connected to the internet. -
-- He previously worked at the Trustworthy Systems Research Group where he helped oversee the technical development of seL4 as an OS engineer. He is currently a member of the seL4 Foundation’s technical steering committee. -
-
- Matthew Brecknell, Verification Engineer, Kry10
-
- Matthew is a formal verification practitioner. He has made significant contributions to the seL4 verification story, and is a member of the seL4 Foundation Technical Steering Committee. At Kry10, Matthew is developing the next generation of high-assurance remotely-managed seL4-based devices. -
-
Everton de Matos, TII
-
- Everton de Matos serves as Lead Security Research Engineer at the Technology Innovation Institute (TII) within the Secure Systems Research Center (SSRC). He earned his Ph.D. in Computer Science from the Pontifical Catholic University of Rio Grande do Sul (PUCRS). During his doctoral studies, he was honored with a Fulbright scholarship, allowing him to further his research at the University of Southern California (USC). Presently, Everton's focus lies in security for embedded systems, specifically within the context of the seL4 Microkernel. He boasts numerous contributions to significant conferences and journals. His primary areas of interest encompass embedded systems security, the Internet of Things, virtualization, and context-aware security. -
- - -- Talk -
- -- Virtualization technology was widely used in X86 Cloud Server. There are various mature finetunes work was done for GuestOS Performance and High Availability Recovery. -
--In comparison, Virtualization in ARM Edge device(ARMv8 AACH64) was not so widely used. And its HW IP device usage model was very different from the Cloud scenario. The performance and HA is a challenge here. -
--In our advance research project, we explored some ways to improve that, e.g. -
--1) Support sel4 kernel fastpath virtual interrupt(for SPI/PPI/SGI/LPI) to shorten the long interrupt process route. -
--With this, Linux 5.10 GuestOS(cyclictest) average schedule latency will be reduced from 30us- ->7us, close to RAW Linux 5.10 which was 5us -
--Note: Most++ COST ARMv8 SoC only have GICv3 interrupt controller IP, GOS interrupt direct inject was only supported in GICv4. -
--2) Support Virtual Machine Monitor (VMM) with vCPU symmetric multiprocessing (SMP) extension to speedup co-current helper services to GuestOS VMExits. -
--3) Support Virtual Machine Monitor (VMM) with HA Recovery extension to make Linux GuestOS recovery to working mode less than 1000 ms while crashing. -
--Note: Linux GOS basic system can recover less in 500ms, Linux GOS with an actual complex application may recover less in 1000 ms. -
- -- Talk -
- --Cog Systems, Inc. specializes in developing secure solutions leveraging virtualization on connected mobile devices. Cog Systems has developed a Virtualized Mobile Device (VMD) architecture and has placed the seL4 microkernel and Virtual Machine Manager (VMM) at its heart. Thus, the VMD is built on a Type-1 hypervisor which manages physical device hardware and acts as a very small Trusted Computing Base (TCB). -
--In 2017 Cog Systems developed a single domain virtualized device on an HTC One A9 smartphone, and successfully validated it against the National Information Assurance Partnership (NIAP) Protection Profile (PP) for Mobile Device Fundamentals (MDF) and Virtual Private Network (VPN). This allowed Cog Systems to register the device with the National Security Agency (NSA) as an Approved Component under its Commercial Solutions for Classified (CSfC) process. Cog Systems is currently leveraging our VMD to develop a next-gen commercial virtualized smartphone - again planned for NIAP evaluation, CSfC inclusion, and commercial availability to the US government. -
--At the 2020 seL4 Summit, Cog Systems presented this effort as a case study in applying seL4 to a product commercialization effort. Since then, the project has experienced multiple and varied challenges, and has not yet been completed. Cog Systems feels there is value in giving a follow-up presentation to discuss the progress, setbacks, and lessons learned in the past few years. -
- - - -- Talk -
- -- The use of Trusted Execution Environments (TEEs) is becoming increasingly common in the design of secure systems. TEEs provide a secure execution environment for sensitive applications and data, ensuring that they are protected from attacks and unauthorized access. TEEs are typically implemented as a separate execution environment within a system, with their own hardware and software resources that are isolated from the rest of the system. The trend towards the use of TEEs is driven by the increasing sophistication of cyber-attacks and the need for more robust security solutions. As such, the use of TEEs is becoming increasingly important in the design of secure systems, and technologies such as seL4 and RISC-V are playing a key role in their development. -
-- In this talk, we will present our efforts on using seL4 on RISC-V to build a TEE service. We will discuss the challenges we faced during the development process and the solutions we implemented to address them. Additionally, we will provide an in-depth overview of our TEE architecture by discussing its features and demonstrating its functionality through real-world use cases. Our experimentation tests with the PolarFire Icicle kit have played a crucial role in enhancing our understanding of the platform and refining our implementation. Furthermore, we will discuss our ongoing efforts to improve and expand upon the TEE service and its potential applications, as well as outline our future research and development directions in this domain. -
- - - -- Talk -
- --This application-in-development leverages the seL4 proofs to provide assurance for the trustworthy and remote attestation of a Linux VM. By focusing on a Linux VM running on an ODROID XU4 platform, this work demonstrates the potential of seL4-based remote attestation across different hardware architectures and platforms. -
--The principles of remote attestation demand that the mechanisms of attestation are trustworthy. The seL4 guarantees properties of confidentiality and integrity, and these can be jointly understood as the seL4 enforcing the isolation of processes. This isolation allows the use of virtual machine introspection without fear of the virtual machine escape exploits to which previous software solutions are vulnerable. Here, the tools that introspect are trusted to measure a target because they are isolated from that target. -
--This attestation is layered in order to confine the adversary, and the layering is implemented at the architectural level using CAmkES. The adversary is confined to either corrupt the attestation tools or to rapidly corrupt and restore the target, bypassing the attestation tools. The seL4 permits an argument for the infeasibility of these strategies. However, the principles of remote attestation also demand that comprehensive information be generated over the target. Without a comprehensive measurement of the Linux environment, the adversary gains the option of hiding their corruption. -
--In support of a comprehensive measurement suite, an introspection library was implemented for a narrow range of Linux kernels. The library required a pathway for using arbitrary kernel modules in an arbitrary version of Linux, but the range of applicable kernels is narrow due to changes in how Linux manages its memory. The library facilitated the measurements of kernel modules, kernel and user processes, and kernel read-only data. Much more is required for a comprehensive measurement. -
--The principles also demand fresh information and constrained disclosure, which are simple matters of cryptography. Finally, the principles demand semantic explicitness, and this is largely considered in adjacent work that implements the Copland attestation language in CakeML extracted from Coq theorems. That work is integrated into this system. A way to use the latest versions of CakeML in seL4 threads independent from HOL4 was required. -
--It remains to implement a more comprehensive suite of measurements for the Linux kernel and the target program, and to demonstrate layered attestation on the bare metal of the ODROID XU4. If the measurements suffice to detect corruption, the appraiser will learn of this. Possible future work includes implementing this work for a wider range of Linux kernels and hardware platforms or formalizing a composition of seL4 kernel-level proofs and proofs over the attestation tools. -
- - - -- - The seL4 summit aims at gathering the seL4 community to - learn, share, and connect: -
-- - The seL4 summit covers the complete seL4 ecosystem, consisting of the verified - microkernel, as well as all seL4-related technology, tools, infrastructure, - products, projects, and people. - -
- -- - The seL4 summit 2023 will be in Minneapolis, USA. - -
- --We solicit proposals on any seL4-related topic, in particular in the areas of: -
-- - If you would like to propose a talk, please upload an abstract of one page or less for your - proposed talk by 24 April 2023 on the submission portal. Abstracts should indicate why the talk fits in the seL4 summit - scope. Notifications of accepted presentations will be made by 2 June 2023. - -
-- If you'd love to hear about some specific work from other people in the community, we encourage you to reach out to them to incite them to submit a proposal :-) else you can also let us know at summit@sel4.systems. -
- -- If you have questions, please do not hesitate to contact the seL4 Foundation summit team at: summit@sel4.systems. -
- -- The seL4 Summit is the annual international summit on the seL4 microkernel, the world's most highly assured OS kernel, as well as on all seL4-related technology, tools, infrastructure, products, projects, and people. -
-- It aims to gather all the seL4 community to learn, share, and connect: -
-- The seL4 Summit is organised by the seL4 Foundation, in a location aimed to be on a different continent each year, as far as possible. -
-- An open call for presentations invites submissions of short abstracts about cool work on seL4, and a Program Committee made of a wide range of representatives of the seL4 community is in charge of the technical content (reviewing submission, selecting invited speakers, defining the program). -
-- The seL4 Summit 2023 was held in Minneapolis, USA, 19 - 21 September 2023, at the Elliot Park Hotel. The summit was organised by the Linux Foundation. -
--
- We were very fortunate to welcome five industry leaders to participate at the seL4 Summit 2023, in a session OS on seL4: so many options!. Gapfruit, Kry10, Magnetite (MIT), and UNSW presented their views on the priorities and vision for their OS on seL4. The panel was moderated by Todd Carpenter from Galois. -
- -- Videos of the seL4 summit 2023 are available on the seL4 YouTube channel! Links and slides can be found on the summit Program and Abstracts pages. Thanks to all the speakers for making the seL4 summit 2023 a great success! -
--
- Our awesome team comes from various parts of the seL4 ecosystem: users, contributors, committers, experts, advocates, researchers, and engineers. -
-- We are grateful to the following sponsors for their financial support of the seL4 summit 2023. -
-- For any questions regarding the summit, please contact summit@sel4.systems. -
-- All times are local time in Minneapolis, USA (GMT-5). -
-Day 1 19 September 2023 | -|||||
---|---|---|---|---|---|
- | Session chair | -||||
9:00 - 9:10 | -Announcements | -Welcome | -- | - | Darren Cofer & Ihor Kuz |
-
9:10 - 10:00 | -Keynote | -Scoping assurance activities with seL4 Gage B, - NCSC - |
- - | - | Darren Cofer | -
Break | -|||||
10:15 - 10:45 | -Talk | -Dynamic seL4 based systems: designing for verifiability Matthew Brecknell, - Kry10 - |
- - | - | Gerwin Klein | -
10:45 - 11:15 | -Talk | -Formally Stepping Into The Unverified World Sandy Frost, - Los Alamos National Laboratory - |
- - | - | |
Break | -|||||
11:30 - 12:00 | -Talk | -Reducing the reliance on verification experts for seL4 proofs Gerwin Klein, - Proofcraft - |
- - | - | Matthew Brecknell | -
12:00 - 12:30 | -Talk | -More multiprocessing on seL4: Are efficient SMP virtual machines possible on verifiable seL4 kernels? Kent McLeod, - Kry10 - |
- - | - | |
Lunch | -|||||
13:30 - 14:00 | -Talk | -System Information Flow Analysis Ihor Kuz, - Kry10 - |
- - | - | Robbie VanVossen | -
14:00 - 14:30 | -Talk | -Advancements for Virtualization Support in seL4:CAmkES and seL4cp Markku Ahvenjärvi, - TII - |
- - | - | |
Break | -|||||
14:45 - 15:15 | -Talk | -The seL4 Device Driver Framework Lucy Parker, - UNSW - |
- - | - | Nick Spinale | -
15:15 - 15:45 | -Talk | -R&D Update from TS Gernot Heiser, - UNSW - |
- - | - | |
Break | -|||||
16:00 - 16:15 | -Talk | -seL4: Experiences, Improvements and Optimizations Chris Guikema, - DornerWorks - |
- - | - | Axel Heider | -
16:15 - 16:30 | -Talk | -From Zero to a Native xHCl Driver Josh Felmeden, - Capgemini Engineering - |
- - | - | |
16:30 - 16:45 | -Talk | -Crashing For Reliability Ihor Kuz, - Kry10 - |
- - | - | |
16:45 - 17:00 | -Update | -seL4 Foundation update June Andronick, - seL4 Foundation - |
- - | - | |
Break | -|||||
17:00 - 17:15 | -Gold Sponsor | -Building a Platform for Critical Devices in the “Real World” Boyd Multerer, - Kry10 - |
- - | - | June Andronick | -
Break | -|||||
Networking event: drinks and nibbles 18:00 | -|||||
Day 2 20 September 2023 | -|||||
- | Session chair | -||||
9:00 - 9:50 | -Keynote | -CantripOS: An OS for Ambient ML Applications Sam Leffler, - Google - |
- - | - | Ihor Kuz | -
9:50 - 10:00 | -Announcements | -- - |
- - | - | |
Break | -|||||
10:15 - 10:45 | -Talk | -Magnetite: Rust-Based OS Services for seL4 Juliana Furgala, - MIT Lincoln Laboratory - |
- - | - | Lucy Parker | -
10:45 - 11:15 | -Talk | -Showcase: Microkernel OS, TPMs, and WASM in Ilo T Environments Sid Hussmann, - Gapfruit - |
- - | - | |
Break | -|||||
11:30 - 12:00 | -Talk | -Rust support in seL4 userspace: update and roadmap Nick Spinale, - Colias Group - |
- - | - | Kent McLeod | -
12:00 - 12:30 | -Talk | -The seL4 Microkit Ivan Velickovic, - UNSW - |
- - | - | |
Lunch | -|||||
13:30 - 14:00 | -Talk | -Leveraging Rust for Core Platform Ben Hamlin, - Galois - |
- - | - | Todd Carpenter | -
14:00 - 14:30 | -Panel | -OS on seL4: so many options! - Gernot Heiser, UNSW - SidHussmann, - Gapfruit - Kent McLeod, Kry10 - Juliana Furgala, - MIT Lincoln Laboratory - |
- - | - | |
Break | -|||||
14:45 - 15:15 | -Talk | -seL4 VMM on the RISC-V Rocket Chip Robbie VanVossen, - DornerWorks - |
- - | - | Gernot Heiser | -
15:15 - 15:45 | -Talk | -seL4 on Arm Morello Martin Atkins, - Mission Critical Applications - |
- - | - | |
Break | -|||||
16:00 - 16:30 | -Talk | -Incremental assurance for a Rust network stack Michal Podhradsky, - Galois - |
- - | - | Gerwin Klein | -
16:30 - 16:45 | -Talk | -Toward a Verified, Minimal IPv6 Network Stack Implementation Wyeth Greenlaw Rollins, - Lewis & Clark College - |
- - | - | |
16:45 - 17:00 | -Talk | -IOMMU (take the ARM SMMUv3 for instance) solution for seL4 Lei Mao, - Horizon Robotics - |
- - | - | |
17:00 - 17:15 | -Gold Sponsor | -OS for Software Defined Vehicle Qiyan Wang, - NIO - |
- - | - | June Andronick | -
17:15 - 17:30 | -Gold Sponsor | -Secure Systems in Focus: Challenges, Solutions, and Future Directions Everton de Matos, - TII - |
- - | - | |
Break | -|||||
Dinner 19:00 | -|||||
Day 3 21 September 2023 | -|||||
- | Session chair | -||||
9:00 - 9:30 | -Update | -SIG update + Community update/discussion Yanyan Shen, - NIO - Matthew Brecknell, - Kry10 - Everton de Matos, - TII - Kent McLeod, - Kry10 - |
- - | - | Darren Cofer | -
9:30 - 10:00 | -Talk | -seL4 Virtualization (ARMv8 Edge Device) Guest OS Performance & HA Recovery Lei Mao, - Horizon Robotics - |
- - | - | |
Break | -|||||
10:15 - 10:30 | -Talk | -Building a Commercial Virtualized Mobile Device with seL4 - Part 2 Jason Sebranek, - Cog Systems - |
- - | - | Ihor Kuz | -
10:30 - 10:45 | -Talk | -seL4 on RISC-V: Building a Trusted Execution Environment Everton de Matos, - TII - |
- - | - | |
10:45 - 11:00 | -Talk | -Trustworthy Measurements of a Linux Kernel and Layered Attestation via the seL4 Michael Neises, - University of Kansas - |
- - | - | |
Break | -|||||
11:30 - 11:45 | -Plenary | -BoFs teasers - | -- | - | Darren Cofer & Ihor Kuz |
-
11:45 - 12:30 | -- Plenary - | -BoF Room 1 - | -- | - | - |
11:45 - 12:30 | -BoF Room 2 - | -- | - | - | |
Lunch | -|||||
13:30 - 14:15 | -- | - Plenary - | -BoF Room 1 - | -- | - |
13:30 - 14:15 | -BoF Room 2 - | -- | - | ||
14:15 - 14:30 | -Plenary | -Report from BoFs + Discussion - | -- | - | Darren Cofer & Ihor Kuz |
-
Break | -|||||
14:45 - 16:30 | -Training | -
- A quick start to seL4 with the Core Platform Ivan Velickovic, - UNSW - |
- - | - | - |
- Further information on the Call for Presentations. -
-- Summit submissions are now closed. Please contact summit@sel4.systems if you have any questions. -
-- Keynote -
- --Formal methods have been successfully deployed at scale in production environments at large internet -companies, but barriers remain to their adoption by defense companies developing national security -systems. The goal of the INSPECTA project (part of the DARPA PROVERS program which has just started -in 2024) is to improve the security of defense and aerospace systems by dramatically improving the -usability, flexibility, and accessibility of formal methods-based development and verification tools. We -will leverage memory-safe programming languages (Rust), a provably secure microkernel (seL4), and new -formal methods tools and make them accessible to the defense industry workforce. These open source -technologies will be integrated into an aerospace CertDevOps workflow automation processes and -applied to the development of mission critical systems to demonstrate their usability, practicality, and -effectiveness. We will demonstrate the tools and workflow by addressing emerging security -requirements for the Air Launched Effects (ALE) mission computing platform. This will include re- -architecting the mission sotfware as a collection of virtual machines running legacy code and selected -high-criticality components, producing an architecture model for the system, porting selected software -to Rust, building software to run on seL4, and verifying critical safety and security properties. This -presentation will provide an overview of the PROVERS program objectives, the INSPECTA workflow to be -developed, and the assurance evidence to be produced. -
-- Talk -
- -- In this talk we will give an overview of Proofcraft's recent milestones, as well as ongoing and future plans for the formal verification of seL4 to support more platforms, architectures, configurations, and features. -
-- In particular, we will report on the completion of the functional correctness proof of seL4 on AArch64. AArch64 is now on par with Arm 32-bit, RISC-V 64-bit and Intel x86 64-bit with respect to functional correctness, the strongest assurance that can be given about the correctness of software. Functional correctness is also the cornerstone of even stronger overall assurance, such as the security properties of integrity and confidentiality, which are next inseL4's AArch64 verification roadmap. -
-- We will further report on where the verification of the seL4 extensions for mixed-criticality systems (MCS) is at, and share our plans for DARPA's PROVERS program where, as part of the INSPECTA team, we are aiming at increasing verification automation and scope while reducing the reliance on formal methods experts. -
-- Talk -
- -- In this talk we will present Proofcraft's roadmap for producing a verified static multikernel configuration of seL4, allowing the use of multiple CPU cores with one kernel per core. In this roadmap, we are planning to increase formal assurance incrementally, providing a tractable path to multicore verification -with early usable results for the seL4 community. -
-- Formally proving correctness on a multicore platform requires the ability to model fully concurrent execution, and then prove that any interactions either do not occur or are safe. This requires a new formal model of execution, supporting concurrency reasoning. -
-- We will report on our progress in building such a framework, with the aim to maximise the reuse of existing proofs. We will also present how starting with a static multikernel design is the fastest path to providing the community with an seL4 kernel that allows utilisation of multiple processor cores, opening the path to building multicore seL4-based systems that come with a formal proof of correctness. -
-- Talk -
- -- Neutrality(1) is building the Atoll hypervisor as a high-assurance platform for the secure multitenant virtualisation of workloads which are likely targets of well-resourced attackers. Atoll will use seL4 configured as a multikernel to provide verified isolation between multi-vCPU VMs on datacenter-class hardware containing hundreds of CPU cores, terabytes of main memory, and 100GbE-class self-virtualising (SR-IOV) NICs. This project places seL4 on a wholly new playing field, with orders-of-magnitude increases in hardware performance and the associated scaling challenges, while retaining the full verified assurance of the seL4/ARM stack. In particular, Atoll will provide fully-verified Integrity and Confidentiality between customer VMs, while efficiently handling commercial-scale workloads. -
-- In this talk, we will give an overview of Atoll’s design, and explain how it addresses the challenges unique to this application domain. In particular we will motivate the choice of the multikernel as the ultimate design rather than as a stepping stone on the way to a verified SMP kernel, the benefits and challenges that arise from this choice, and other details of likely interest to others building multi-processor systems on seL4. In particular we will discuss the implications for verification, including on our own verification plan, and where we expect to coordinate with and contribute to the overall seL4 proof roadmap. -
-- (1) https://neutrality.ch/ -
-- Talk -
- -- Lions OS is a new, seL4-based, open-source operating systems aimed at the embedded/IoT/cyberphysical space. Based on the Microkit, Lions OS features a static system architecture, i.e. all (potential) components and their (maximum) connectivity are known at system build time. Lions OS is characterised by a highly modular design, driven by the principles of strong separation of concerns and strict adherence to the KISS principle – keep it simple, stupid! The “radical simplicity” design, when done right, enables excellent performance despite the many context switches resulting from the fine-grained modularity. Critically, this modularity, coupled with keeping each module as simple as possible, should enable formal verification of Lions OS. -
-- Taking the KISS principle to the extreme, Lions OS radically departs from the idea of universal policies, adaptable to many different use cases, that characterise most existing OSes. In contrast, Lions OS keeps all policies minimal and specific to the particular use case; it achieves use-case diversity by isolating each policy in an individual module that can be easily rewritten/replaced when a different policy is required. -
-- In the talk I will explain the principles of Lions OS and its design, looking at concrete examples. I will present performance data that show that the approach can work and provide an overview of our current work on verification. This will be complemented by Ivan Velickovic’s talk covering Lions OS from a developer’s point of view, and Rob Sison’s and Courtney Darville’s talks on verifying Lions OS. -
- -- Talk -
- -- LionsOS is a new Operating Systems developed at Trustworthy Systems aimed at embedded, IoT, and cyberphysical systems. LionsOS is based on the seL4 Microkit and is desgined to formally verifiable, performant, and adaptable to a wide class of use-cases. -
-- Gernot's talk will discuss the principles and design of LionsOS, while this talk will be focused on aspects of LionsOS from a developer's perspective. -
-- We will dive into what it is like to use LionsOS by showcasing the tooling and surrounding infrastructure that has been created for developing a LionsOS-based system. This will cover topics such as I/O, virtualisation, debugging, profiling, as well as how to put all these pieces together. -
- -- Talk -
- -- Several frameworks, such as CAmkES and the seL4 Microkit, have been built on top of seL4 to enable the development of performant and provably secure operating systems. Most of these have static architectures and use system descriptions that define a complete system including all components and the resources they can access. The system specification is then passed to tools like CapDL, which generate the described system with the correct capability distribution. An important attribute of frameworks like CAmkES and Microkit is that they do not allow this initial distribution to evolve, preventing the runtime transmission of capabilities within an initialized system. This makes them well-suited for static analysis and verification, but comes with the caveat that some behaviours become more difficult or even impossible to represent. In particular, static frameworks are unsuitable for dynamic systems that adhere to complex security policies, especially ones that depend on runtime behaviour, or require functionality such as the ability to create new, sandboxed components, or temporarily transfer privileges between components at runtime. -
-- The Secure Multiserver Operating System (SMOS) project aims to create a secure, dynamic OS framework on top of seL4. Our goal is to enable the development of systems as dynamic as mainstream operating systems like Linux, that allow you to, for example, download and run arbitrary executables, while leveraging the security properties of seL4 to ensure that a global security policy is always correctly upheld. This talk will focus on the key principles behind the design of SMOS, the progress we have made on its implementation, and an overview of some of the challenges we have encountered, both in development and in correctly enforcing a variety of arbitrary, often complex security policies at runtime. -
- -- Talk -
- -- Upstream hypervisor support has expanded in recent years to support additional configurations on x86, ARM, and RISC-V. Every upstream example simply runs Linux, which is an excellent use case for highly functional, general purpose computing platforms, however there are other guest Operating Systems that solve different use cases. Running seL4 in Hypervisor mode allows for the untrusted code in Linux to be sandboxed and isolated from trusted components in the system. What if the guest Operating System was fully trusted? Deos is a DO-178C DAL A certified RTOS for Avionics Applications, an area seL4 has struggled to break into. DornerWorks expanded seL4 Hypervisor support to run Deos under the CAmkES VM. This presentation will overview the changes that needed to be made to support a certifiable RTOS guest, how a Hypervisor effects the safety certification considerations of Deos, and the next steps needed to create a certifiable system with seL4. -
- -- Talk -
- -- ROS (Robotic Operating System), a modular componentized architecture for robot applications, has made it possible to quickly develop and deploy systems utilizing autonomous or human guided robots. Focusing on ease of use and portability, ROS has enabled a community of developers to create autonomy solutions that were previously restricted to well-funded companies. However, ROS depends on many services included in a full Linux distribution to function properly. Beyond the Operating System itself, these distributions contain many unvetted software packages, which when used in high assurance environments, such as factory automation, could present an unacceptable amount of overhead and potential vulnerabilities. -
-- Even in less critical environments, a compromised robot could surreptitiously spy on an end user or subtly/overtly cause harm to the environment in which it operates. While securing such systems with seL4 seems like an obvious solution, the lack of support for common software APIs and middleware presents a significant hurdle. Once this is overcome wider adoption of seL4 and more resilient robotic systems would be enabled. This presentation will show how the cyber-retrofit approach is being used to enable secure autonomous operation of an x86 based ground vehicle, how this approach is being extended to enable native seL4 ROS applications, and the barriers to further system hardening. -
- -- Talk -
- -- We have developed a minimal networking stack (Ethernet, IP, UDP, and ICMP) with the overarching goal of proving that it implements its specification correctly. We target our implementation for the embedded market and therefore we have chosen to develop our solution around the seL4 Microkit and the seL4 Device Driver Framework. -
-- In this talk, we report on our experience developing, testing, and characterizing the performance of our implementation using the seL4 ecosystem. We have containerized our development environment to simplify building our application and to support users with differing platforms. In addition to relying on automated theorem prover assistants and model checkers, we have written many unit and integration tests to help write correct software. Using a network benchmark, we show that our solution exhibits competitive, if not superior, performance characteristics both in terms of average behavior and variance. -
- -- Talk -
- -- This talk presents an experience report on migrating seL4-based systems from the CAmkES VMM to the Microkit VMM. Microkit is a simple framework and SDK created to enable more efficient designs and lower the barrier to entry to seL4. The presentation will compare and contrast MicroKit with CAmkES and highlight a few reasons to start using Microkit. In addition, it will examine how MicroKit can make learning and developing seL4-based systems easier and breakdown roadblocks encountered by new users when porting to a new platform. Finally, we will present our gap analysis between the two VMMs and highlight what still needs to be addressed so users can start developing real-world products. -
- -- Update -
- -- In this talk, June Andronick, CEO of the seL4 Foundation, will give a brief overview of the latest updates and future plans for the seL4 Foundation. -
-- The seL4 Foundation is home to the ecosystem of software, developers and adopters for safety- and security-critical systems based on seL4. It was formed in April 2020 as a neutral and community-based organisation that ensures long-term, independent support for seL4 and its ecosystem, and fosters strong community participation and ownership in the ecosystem. It raises funds for continuing and accelerating development, facilitates interoperability, standardisation and sharing of cost for the benefit of all. Its aim is to ensure that seL4 is not only the world’s best secure operating-system technology, but is readily deployable and supported by a diverse and stable ecosystem of services and products. -
-- Talk -
- -- The Kry10 operating system supports some dynamic behaviours, including incremental updates to running systems. To ensure that the OS always enforces the access controls specified by device owners, we must verify the privileged OS components that manage system resources across updates. Verification will soon be further complicated by the addition of support for multikernel systems, because the OS will need to coordinate resource management across cores. -
-- Concurrency is therefore fundamental to our approach. There is concurrency between the resource managers on different cores, and also between each resource manager and the apps and kernels in the system. We hope to use the structure of the system to avoid fine-grained reasoning as much as possible. But we want a framework which will allow us to prove that such structural reasoning is sound, rather than forcing us to assume it. -
-- Though our plans might be grand, our first steps must be small. In particular, we need experience with techniques and frameworks for reasoning about concurrency. -
-- In this talk, we present our initial experiments with concurent user-space verification. We use the Iris separation logic framework to build an abstract model of a simple system in which components interact using shared memory and notifications, and we prove a simple correctness property. We explain the limitations of this experiment, and how we plan to address them in our next steps. -
- -- Talk -
- -- At the heart of every modern server platform sits an embedded system called theboard management controller (BMC) that is responsible for the low-levelfunctioning of the platform. Despite their critical nature, they are generallynot built as trustworthy systems. We have embarked on a journey tocyber-retrofit BMC firmware with seL4 as the kernel. In this talk, we present anupdate on our efforts -- generate trustworthy hardware/software I2C drivers. I2C is a low-level protocol used by BMCs to communicate with many peripherals(e.g. the power regulators). Unlike memory-mapped devices with one-to-oneinterfaces with the BMC, multiple I2C devices may share the same bus. Quirks ofone device can influence the whole assemblage. Therefore, to produce a correctdriver for I2C (and other bus-based protocols), we need to consider thespecifications of not only the controller but all devices on the bus. -
-- We present Efeu, a framework that allows us to specify both the host-side driverand the peripherals. The specifications are composed of layers, which enableefficient modeling of different devices (including those with quirks). Theentire system is then model-checked using SPIN to ensure interoperability. Fromthat, Efeu generates trustworthy drivers in software and hardware. The softwareimplementations target seL4, but could also address other operating systems.Furthermore, when I2C communication speed or CPU usage is a concern, Efeu allowsgenerating hybrid hardware/software drivers, where the hardware part can bematerialized on programmable hardware such as Field Programmable Gate Arrays(FPGAs). We evaluated Efeu-generated I2C stacks on a Zynq MPSoC and show thatmodel-checking the whole system and generating the full stack is not onlypractical but that the resulting implementations can saturate the I2C bus andachieve competitive performance with off-the-shelf solutions. -
- -- Talk -
- -- The seL4 Device Driver Framework (sDDF) provides a lightweight library of device drivers and supporting virtualising components which allow clients to securely access and share devices. Each sDDF component is designed to handle one primary concern, and as a result, components have minimal knowledge of the system as a whole and instead communicate only with their direct neighbours. Components are event driven and and require a signal to be scheduled to process incoming data. A signalling protocol is the decision process a component goes through when deciding whether to signal its neighbour. -
-- If a component signals its neighbour unconditionally when data is available, the system progresses without deadlock, however this often results in a large number of unnecessary signals - meaning the receiver was already awake, or had already been signalled but was yet to be scheduled. Designing a signalling protocol that avoids these unnecessary signals, but does not skip any necessary ones can be challenging, since the experimental absence of deadlocks does not necessarily imply deadlock freedom, and if a deadlock is encountered, it can be hard to replicate and understand. -
-- Using formal methods, and in particular model checking, vastly improves the development process of signalling protocols, since the tool can verify for deadlock freedom whilst also producing detailed traces (interleavings of executions) when a deadlock is found. This talk details how the model checker SPIN was used to develop and analyse sDDF signalling protocols, ultimately resulting in a verified protocol that reduces the number of unnecessary signals by 47% when compared to unconditionally signalling. -
- -- Talk -
- -- The development and maintenance of Rust support in seL4 userspace has been an official seL4 Foundation project since last year’s summit. This project’s scope includes libraries for interacting with the seL4 API, higher-level libraries for use in seL4 userspace (e.g. support for asynchronous programming and integration with the seL4 Device Driver Framework), Rust language runtimes for root tasks and Microkit protection domains, modular building blocks for custom seL4 userspace Rust language runtimes, a CapDL system initializer implementation, and an easy-to-use kernel loader. The past year has seen the expansion and refinement of this project’s library offerings, the release of relevant educational materials, and further integration with the rest of the seL4 software ecosystem. In this talk, we will cover progress since last year’s summit, demonstrate how to leverage this work in your own systems, and share our vision and goals for the path ahead. -
- -- Talk -
- -- We introduce Pancake, a new language for verifiable, low-level systems programming, especially device drivers. Pancake features a simple type system that makes it attractive to systems programmers, while at the same time aiming to ease the formal verification of code. Pancake has well-defined semantics which the compiler is proven to preserve, meaning that each generated binary code preserves the semantics of its original program. We have now extended Pancake with the shared memory capability which allows the programs to access device registers without escaping to C. -
-- We present the design of the language and its verified compiler, as well as demonstrating its usability, performance and current limitations through case studies of device drivers and related systems components for an seL4-based operating system. -
- -- Talk -
- -- When a digital system is undergoing cyber attack or is failing in some way, it is often necessary to take action different from its usual operating mode. These alternative modes of operation are called Reserve Modes. -
-- There are several challenges in implementing reserve modes in systems. The first challenge is developing a mechanism for defining and loading all modes into a system at boot time and enabling alternative modes as necessary. The second challenge is making these changes without affecting or disturbing parts of the system not involved in the reserve modes. The final and hardest challenge is being able to perform such system level changes with assurance that the reserve modes will be enabled as required and operate as expected, without modification. -
-- This presentation introduces Assured Reserve Modes on the seL4-based Kry10 OS. Assured Reserve Modes are a mechanism for providing reserved modes that successfully address the above challenges - implementing reserved mode functionality and providing assurance that they work correctly. We explain the concept of reserve modes and provide examples of reserve modes and their benefits, present the Assured Reserve Mode design and implementation, and discuss how to provide the assurance that they require. -
- -- Talk -
- -- Assured Reserve Modes are a mechanism that we’ve developed for the seL4-based Kry10 OS that allows a system to switch between pre-configured operating modes at runtime in response to security, safety, and other routine operational events. In this presentation we show the operation of assured reserve modes in action. -
-- We present the Kry10 OS design and implementation of assured reserve modes, demonstrating their application to a representaive industrial control system (based on the Fischertechnik Training Factory 4.0). The system is exposed to security and safety incidents, which it will detect and then switch into appropriate reserve modes in order to mitigate, resolve, or contain the problem. -
-- This presentation is a companion to the Assured Reserve Modes presentation that describes the assured reserve mode model and mechanism itself. -
- -- Talk -
- -- Container solutions have been instrumental throughout cloud computing, influencing how developers build and automate their application deployments. A core benefit behind containers is that they provide a standardised abstraction layer of an application's underlying OS infrastructure. These abstractions help isolate an application's code and system dependencies, whilst conveniently packaging said dependencies into images that can be easily revision controlled and managed in CI/CD pipelines. When applying this technology to embedded systems, containers offer the potential for simplifying application development workflows, whilst also providing a useful CI/CD mechanism for deploying software updates to deployed devices. seL4 is uniquely suited to power a modern generation of embedded devices and using containers brings with it modern software development practices that makes it easier to manage fleets of devices. -
-- Deploying containers on embedded systems is not necessarily new and has been demonstrated across various embedded Linux deployments. At Kry10 we recognise the value of using containers and see the conveniences it can bring to a developers workflow and the capabilities it provides for developing update-able and maintainable systems. We've implemented first-class container support in Kry10 OS that allows developers to define and package native and VM-based applications. In this talk, I'll present the design and implementation behind our seL4-based container support. I'll step through how container builds are used to package and deploy different types of applications on Kry10 OS, starting from simple native applications, and as the needs and runtime requirements of the application grow, moving onto more complex microVM-style applications. -
- -- Talk -
- -- The utilization of seL4, a high-assurance microkernel, in a Trusted Execution Environment (TEE) on RISC-V hardware, presents a robust solution for secure computing. This year, we build upon our foundational work with new insights into the performance impacts and enhancements of our TEE. -
-- We present empirical data on the CPU, memory, and I/O performance impacts of having a seL4 TEE on a PolarFire RISC-V platform and run different TEE services performance measurements. The insights into performance nuances, such as the minimal overhead introduced by the seL4 TEE and its operational efficiency in handling cryptographic tasks, solidify the practical benefits of our architecture. Furthermore, we outline ongoing advancements and future directions in enhancing the seL4-based TEE. -
- -- Talk -
- -- A formally-verified microkernel is a great start, and an OS needs more than a microkernel. Over the past years, we have been building a vehicle operating system and toolsets based on seL4 from scratch. It is very challenging, especially when dependability is the top priority. In this talk, we would like to share our experiences along the journey, with an emphasis on the following topics: (1) POSIX or not, that is not a question. To leverage the existing code base and 3rd party libraries, a layered approach is adopted: The system has a core system call layer and a POSIX layer based on the core layer. System components use the core layer. Applications and 3rd party libraries use the POSIX interfaces. (2) Tooling is especially important for development efficiency and system usability. System status monitoring and comprehensive logging are critical since we rely on them to analyze issues remotely. Additionally, a building and integration tool is specifically designed to manage the building and releasing process of the OS and applications. (3) Resource management needs more thoughts. Seasoned system developers are surprised by another form of resource leakage: capability slot leakage. Access control to resources that are not managed by the kernel directly through capabilities also deserves some discussion. (4) Product-level maturity is paramount. We wish that the major OS components could be verified, but at least for now, realistically, various levels of testing are used to stabilize and mature the new OS. -
- -- Talk -
- -- Since 2021, a small team at Capgemini have been making contributions toward the seL4 infrastructure, assisting developers in getting started with seL4. Previously, building atop CAmkES, we presented a Developer Kit (from zero to "hello world"), a framework to access the U-boot driver suite, and initial efforts in preparing a native xHCI driver (USB 3.0). Now, we present the conclusion of these efforts. -
-- We transition our entire suite of contributions from CAmkES to Microkit. A greater range of USB device classes are now supported. A simple native HDMI driver is introduced. And we leverage sDDF and VMM, in permitting the secure routing of a selected physical USB device into a guest host. While our primary focus has been the Avnet MaaXBoard, many of these contributions would be readily portable to other platforms. More generally, as our focus on seL4 infrastructure reaches a conclusion, we describe our journey with seL4 thus far, summarising our overall contributions and experiences. -
-- Talk -
- -- In 2017 Cog Systems developed a single domain virtualized device on an HTC One A9 smartphone, and successfully validated it against the National Information Assurance Partnership (NIAP) Protection Profile (PP) for Mobile Device Fundamentals (MDF) and registered the device with the National Security Agency (NSA) as an Approved Component under its Commercial Solutions for Classified (CSfC) process. In the past few years we have been building the next-gen version of this solution. -
-- At the 2020 seL4 Summit, Cog Systems presented this effort as a case study in applying seL4 to a product commercialization effort. Since then, the project has experienced multiple and varied challenges, and has not yet been completed. At the 2023 Summit we gave a follow-up presentation detailing the progress, setbacks, and lessons learned of the past few years. Now, in the 2024 continuation of the series, Cog Systems will provide an update and share some of the technical, logistical, and financial challenges we encountered while building a commercial smartphone product with seL4. -
- -- Talk -
- -- Compiling the seL4 kernel itself might be simple, but once more and more of the seL4 ecosystem is involved, transitive dependencies from Python to Haskell complicate things. To tackle this complexity, we added yet another layer on top, a declarative build system that allows to provide all the (transitive-) dependencies from one hand: Nix. -
-- This talk introduces you to the seL4-nix-utils, a collection of Nix expressions to compile but also ease integration and project bring-up with seL4. After a brief introduction to the mechanism behind Nix, we outline the provided Nix expressions and their use-cases. The talk closes with a list of remaining pain-points and a reference to a hands-on you may try after the talk. -
- -- Keynote -
- -- The automotive industry is rapidly evolving, with software-defined vehicles (SDVs) at the forefront of this transformation. At NIO, we are leveraging the seL4 microkernel to redefine vehicle architecture, ensuring robust safety, reliability, and performance. This presentation will explore the vision behind integrating seL4 into our SDV platform. We will share the journey of delivering the seL4-based SkyOS-M within the ONVO vehicle on our latest NT3 platform, highlight the significant impact this integration has had on our vehicle design and functionality, and outline our future roadmap beyond the current launch. -
-- Talk -
- -- seL4 currently provides, formally verified, memory safety guarantees in the kernel and isolation guarantees between seL4's userspace tasks, but there is no safety within a single seL4 task or protection domain itself (e.g., VMs or single-address-space servers such as rumprun). According to a recent Microsoft study, memory safety vulnerabilities account for 70% of all software vulnerabilities. CHERI is a capability-based hardware-software architecture aiming to address memory-safety and software compartmentalisation issues. The goal of this project is to have a complete memory-safe C/C++ seL4-based software stack using CHERI on Morello, without having to re-write the existing seL4 C/C++ userspace libraries (currently over 250 KLoC, using sloc tool) from scratch or formally verify them. This talk will describe the progress of CHERIfying the existing seL4's userspace in order to have complete (spatial) memory and pointer safety. -
- -- Talk -
- -- Timing channels enable information leakage across address spaces, bypassing an operating system’s security boundaries. They can result from any shared microarchitectural state that depends on previous execution and affects a system’s timing. Closing timing channels (aka “time protection”) requires strict partitioning of microarchitectural state, which is not feasible (or extremely expensive) in current ISAs. -
-- At the 2022 seL4 summit, we presented the custom RISC-V fence.t instruction to temporally partition on-core processor state in CVA6, a simple in-order RV64GC processor. This year’s talk will propose a minimal ISA extension that enables hybrid spatial and temporal partitioning of a complete system-on-chip comprising complex out-of-order CPUs, last-level caches, and DRAMs, making system-wide microarchitectural state a first-class resource that can be managed by the OS. We will highlight hardware design implications in different system components and present preliminary experimental results detailing the efficacy and performance overheads of the proposed solution based on extended hardware systems running seL4. -
- -- Talk -
- -- This talk will give an overview of the status of ongoing and planned research and development at Trustworthy Systems to expand the scope of proofs about seL4-based operating systems in two directions: (1) downwards, to prove that the seL4 kernel implements time protection correctly at the abstract and C specification levels, and (2) upwards, to prove functional specifications of seL4's system calls and on that basis carry out SMT-based automated deductive verification of the user-level seL4 Microkit and Lions OS service components built on top of it. Here I will lay out the research and engineering challenges facing us on both these fronts and the planned subprojects for which we seek talented PhD students, postdocs and engineers to tackle them. -
- -- Talk -
- -- Modern operating systems—including seL4—are written to a fictional model of machine hardware from the 1960s and 1970s: a set of homogeneous cores accessing a common physical address space containing main memory, plus memory-mapped devices. However, modern SoCs and server platforms are really a complex network of heterogeneous cores and intelligent devices, many of which are running their own firmware and "operating systems". The result is a catastrophe of system design, including a plethora of security exploits like remote over-the-air compromises due to weaknesses in WiFi modem firmware. Link: https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_11.html. -
-- We are building Kirsch, a new OS that solves this problem by embracing and formally capturing the heterogeneity and multiple trust domains of modern hardware. To this end, Kirsch formally models what each hardware context can access using a decoding net representation of the platform (Link "Putting out the hardware dumpster fire", https://doi.org/10.1145/3593856.3595903), which induces a trust relationship between contexts. This trust relationship is the basis for reasoning about isolation, protection and authorization in the system. An seL4 instance can run from, and manage, a region of RAM which is explicitly isolated from untrusted contexts in the system, by using the trust an access information we formally derived. Kirsch thus recovers the power of the seL4 correctness proofs, and we can finally use the seL4 kernel to run truly isolated processes and virtual machines. -
- -- - The seL4 summit aims at gathering the seL4 community to - learn, share, and connect: -
-- - The seL4 summit covers the complete seL4 ecosystem, consisting of the verified - microkernel, as well as all seL4-related technology, tools, infrastructure, - products, projects, and people. - -
- -- - The seL4 summit 2024 will be in Sydney, Australia. - -
- --We solicit proposals on any seL4-related topic, in particular in the areas of: -
-
-
- If you would like to propose a talk, please upload an abstract of one page or less for your
- proposed talk by 22 April 2024 29 April 2024 on the submission portal. Abstracts should indicate why the talk fits in the seL4 summit
- scope. Notifications of accepted presentations will be made by 7 June 2024.
-
-
- If you'd love to hear about some specific work from other people in the community, we encourage you to reach out to them to incite them to submit a proposal. :-) Alternatively, let us know at summit@sel4.systems. -
- -- The community loves to hear about the deployment of seL4. So, if you: -
-- you are welcome to a 5-min slot at the summit to talk about it, regardless of whether you are submitting an abstract for a full presentation! Simply send a short description by email to summit@sel4.systems by . -
-- If you have questions, please do not hesitate to contact the seL4 Foundation summit team at: summit@sel4.systems. -
- -- The seL4 Summit is the annual international summit on the seL4 microkernel, the world's most highly assured OS kernel, as well as on all seL4-related technology, tools, infrastructure, products, projects, and people. -
-- It aims to gather all the seL4 community to learn, share, and connect: -
-- The seL4 Summit is organised by the seL4 Foundation, aiming for a location on a different continent each year, to the extent possible. -
-- An open call for presentations invites submissions of short abstracts about cool work on seL4, and a Program Committee made of a wide range of representatives of the seL4 community is in charge of the technical content (reviewing submission, selecting invited speakers, defining the program). -
-- The seL4 summit will cover the complete seL4 ecosystem, consisting of the verified microkernel, as well as all seL4-related technology, tools, infrastructure, products, projects, and people. -
-- Tickets include: -
-- Register here -
-- The early bird cut-off date is 15 September 2024. -
-- The seL4 Summit 2024 will be held in Sydney, Australia in 15-17 October 2024 at Holiday Inn Sydney Potts Point. -
-- Further information about location, venue and travel is available on the Linux Foundation registration site. -
-- Check out the summit Program and Abstracts for our list of speakers and presentations. -
--
- See the Schedule on LF Events. -
-
- Share your seL4 work, experience and thoughts at the seL4 summit 2024 in Sydney by submitting a presentation proposal by 22 April 2024 29 April 2024. Find all the submission information in the Call for Presentations.
-
- 18 October 2024 -
-- Room G10 in the Electrical Engineering Building -
-- Register for the LionsOS, Rust or both tutorials -
-
- Training day @ UNSW is free, but please register by 15 September 2024 30 September 2024 so that we can account for numbers. Lunch is not included but there are plenty of coffee and food outlets on campus.
-
- Ivan Velickovic, - UNSW Sydney -
-- 10:00 - 12:30 -
-- LionsOS is a new Operating Systems developed at Trustworthy Systems aimed at embedded, IoT, and cyberphysical systems. LionsOS is based on the seL4 Microkit and is desgined to formally verifiable, performant, and adaptable to a wide class of use-cases. -
-- LionsOS, by design, is not a conventional OS and hence it may be overwhelming for users who want to get started and are not familiar with the ideas and goals of LionsOS. -
-- This hands-on tutorial aims to ease people into creating a LionsOS-based system. We will be using the components and tools provided by LionsOS to, step-by-step, transform a minimal boilerplate system to a functional system involving various drivers, virtual machines and other components. -
-- See the training in the program. -
-What to bring:
-- Nick Spinale, - Colias Group, LLC -
-- 14:00 - 16:30 -
-- - - - Rust has been an officially supported language for use in seL4 userspace since last year's summit. In this workshop, participants will be led through a tutorial that demonstrates how to leverage Rust and its ecosystem to rapidly build memory-safe components for seL4-based systems. This tutorial will cover a range of scenarios, including Microkit protection domains as well as building on seL4 directly. -
-- See the training in the program. -
-What to bring:
-- A number of informal social activities are being organised by local Sydney-siders. Check out the list and contact the organisers to register your interest. -
-- Our awesome team comes from various parts of the seL4 ecosystem: users, contributors, committers, experts, advocates, researchers, and engineers. -
- -- We are grateful to the following sponsors for their financial support of the seL4 summit 2024. -
-- See here if - you are interested in sponsoring the seL4 summit 2024. -
-- For any questions regarding the summit, please contact summit@sel4.systems. -
-- All times are local time in Sydney, Australia (GMT+11). -
-- See the Schedule on LF Events. -
-- A number of informal social activities are being organised by local Sydney-siders. Check out the list and contact the organisers to register your interest. -
-Day 1 15 October 2024 | -|||
---|---|---|---|
- | Session chair | -||
9:00 - 9:10 | -Announcements | -Welcome | -Ihor Kuz | -
9:10 - 10:00 | -Keynote | -Industrial Scale Proof Engineering for Critical Trustworthy Applications (INSPECTA) Darren Cofer, - Collins Aerospace - |
- |
Break | -|||
10:30 - 11:00 | -Talk | -seL4 Verification: Status and Plans Gerwin Klein, June Andronick, Rafal Kolanski, Gerwin Klein, Corey Lewis, Michael McInerney, - Proofcraft - |
- Matthew Brecknell | -
11:00 - 11:30 | -Talk | -seL4 multikernel roadmap and concurrency verification Gerwin Klein, Corey Lewis, - Proofcraft - |
- |
11:30 - 12:00 | -Talk | -The Neutrality Atoll Hypervisor and the seL4 Multikernel David Cock, Mathieu Mirmont, Stevens Le Blond, - Neutrality - |
- |
Lunch | -|||
13:30 - 13:45 | -Talk | -Lions OS: Secure, fast, adaptable! Gernot Heiser, - UNSW Sydney - |
- Everton de Matos | -
13:45 - 14:15 | -Talk | -In and Around Lions OS Ivan Velickovic, - UNSW Sydney - |
- |
14:15 - 14:30 | -Talk | -The Secure Multiserver Operating System Framework Alwin Joshy, Kevin Elphinstone, Gernot Heiser, Craig McLaughlin, - UNSW Sydney - |
- |
14:30 - 15:00 | -Talk | -Running Certified Operating Systems under the seL4 Hypervisor Chris Guikema, - DornerWorks - |
- |
Break | -|||
15:30 - 16:00 | -Talk | -Securing ROS Systems with seL4 Nathan Studer, Alex Pavey, Zach Clark, DornerWorks, Dariusz Mikulski, Cristian Balas, Yale Empie, - US Army - Ground Vehicle Robotics - |
- Gernot Heiser | -
16:00 - 16:15 | -Talk | -Experience Developing Code for the seL4 Environment Caitlyn Wilde, Wyeth Greenlaw Rollins, Alain Kägi, - Lewis & Clark College - |
- |
16:15 - 16:30 | -Talk | -Transitioning from CAmkES VMM to MicroKit VMM Leigha VanderKlok, - DornerWorks - |
- |
16:30 - 16:45 | -Update | -seL4 Foundation Update June Andronick, - seL4 Foundation | |
Cocktail reception @ Verandah Public 18:00 | -|||
Day 2 16 October 2024 | -|||
- | Session chair | -||
9:00 - 10:00 | -Panel | -- - |
- Nick Spinale | -
Break | -|||
10:30 - 11:00 | -Talk | -First steps towards verification of user-space systems Matthew Brecknell, - Kry10 - |
- Gerwin Klein | -
11:00 - 11:30 | -Talk | -Generating Trustworthy Hardware/Software I2C Drivers for Board Management Controllers Daniel Schwyn, Zikai Liu, Timothy Roscoe, - ETH Zurich - |
- |
11:30 - 11:45 | -Talk | -Using Model Checking to Develop and Verify Inter-Component Signalling Protocols Courtney Darville, - UNSW Sydney - |
- |
11:45 - 12:00 | -Talk | -Rust Support in seL4 Userspace: Overview and Update Nick Spinale, - Colias Group, LLC - |
- |
12:00 - 12:15 | -Talk | -Pancake: a language for verified systems programming Miki Tanaka, Johannes Åman Pohjola, Gernot Heiser - UNSW Sydney - |
- |
Lunch | -|||
13:45 - 14:15 | -Talk | -Assured Reserve Modes Ihor Kuz, - Kry10, Lance Joneckis, Idaho National Laboratory - |
- Robbie VanVossen | -
14:15 - 14:30 | -Talk | -Assured Reserve Modes in Action Ihor Kuz, - Kry10, Lance Joneckis, Idaho National Laboratory - |
- |
14:30 - 14:45 | -Talk | -Supporting container applications on Kry10 OS Alison Felizzi, - Kry10 - |
- |
14:45 - 15:00 | -Talk | -Exploring an seL4-based Trusted Execution Environment in a RISC-V Platform Everton de Matos, - TII - |
- |
Break | -|||
15:30 - 16:00 | -Talk | -Bridging Academia and Industry Yanyan Shen, Dhammika Elkaduwe, - NIO - |
- June Andronick | -
16:00 - 16:30 | -Talk | -seL4 Infrastructure: USB and Beyond Bill Ellis, James Nevell, Stephen Williams, Josh Felmeden, Daniel Storer, Tom Harvey, - Capgemini - |
- |
16:30 - 16:45 | -Talk | -Building a Commercial Virtualized Mobile Device with seL4 – Part 3 Jason Sebranek, - Cog Systems, Inc. - |
- |
16:45 - 17:00 | -Talk | -Doing Nix for seL4: Towards more Infrastructure-as-Code Wanja Zaeske, - Deutsches Zentrum für Luft- und Raumfahrt (DLR) - |
- |
Dinner @ The Butler 18:00 | -|||
Day 3 17 October 2024 | -|||
- | Session chair | -||
9:00 - 9:50 | -Keynote | -seL4 in Software-Defined Vehicles: Vision, Roadmap, and Impact at NIO Ning Qu, - NIO - |
- Ihor Kuz | -
9:50 - 10:00 | -Announcements | -- - |
- |
Break | -|||
10:30 - 11:00 | -Talk | -Enhancing seL4’s C/C++ userspace memory safety using CHERI Hesham Almatary, - Capabilities Limited - |
- Lucy Parker | -
11:00 - 11:15 | -Talk | -Hardware Support for Time Protection Nils Wistoff, ETH Zurich, Gernot Heiser, UNSW Sydney, Luca Benini, ETH Zurich & University of Bologna - |
- |
11:15 - 11:45 | -Talk | -Verification Status of Time Protection and Microkit-based OS Services Robert Sison, - UNSW Sydney - |
- |
11:45 - 12:15 | -Talk | -seL4 as a CPU Driver for an OS for Real Computers Roman Meier, Zikai Liu, Ben Fiedler, Timothy Roscoe, - ETH Zurich - |
- |
Lunch | -|||
13:30 - 13:45 | -Plenary | -Discussion, BoF Teasers | -Ihor Kuz/Nick Spinale | -
14:00 - 15:00 | -Plenary | -BoFs | -|
Break | -|||
15:30 - 16:30 | -Plenary | -BoFs | -Ihor Kuz/Nick Spinale | -
16:30 - 16:45 | -Plenary | -Report from BoFs + Discussion | -|
16:45 - 17:00 | -Concluding remarks | -- - |
- |
Day 4 18 October 2024 Training day @ UNSW | -|||
10:00 - 12:30 | -Training | -Using LionsOS Ivan Velickovic, - UNSW Sydney |
- - |
14:00 - 16:30 | -Training | -Using Rust in seL4 Userspace Nick Spinale, - Colias Group, LLC - | - |
- A number of informal social activities are being organised by local Sydney-siders. Check out the list and contact the organiser to register your interest. -
-- This list is in chronological order. Note that some activities require advanced bookings, by 20 September 2024. -
-- Gernot plans to take a group on a walk, most likely in the stunning Blue Mountains, which are about a 1.5 hours drive from Sydney. Please contact Gernot Heiser for further details. -
-- When: Sunday 13 Oct 2024 -
-- Bring: -
-- Contact: Gernot Heiser -
-- June will take a group on the iconic Bondi to Coogee walk, with optional dinner to follow at Coogee for people who are interested. -
-- When: Monday 14 Oct 2024, starting at 3:30pm -
-- Where: Bondi Beach -
-- Cost: Free, with the option of buying dinner at Coogee -
-- Bring: -
-- Contact: June Andronick -
-- Birg will organise a guided tour of The Rocks, which gives an account of Sydney's colonial heritage. -
-- Bookings are required by 4 October 2024. Min group size 12. Max group size 20. -
-- When: Monday 14 Oct 2024, meet at 3:15pm, tour 3:30-5pm -
-- Where: The Rocks Walking Tours -
-- Cost: $35 AUD per person -
-- Bring: -
-- Contact: Birgit Brecknell -
-- Peter will lead a guided tour of the Australian National Maritime Museum. The tour will include onboard experiences of the major vessels: -
-- Please contact Peter Chubb for further details, including how to make your booking. -
-- Bookings are required by 4 October 2024. -
-- When: Saturday 19 Oct 2024, 11am. If there is more interest, Peter will also lead a tour on Saturday 12 Oct 2024, 11am. -
- Where: Australian National Maritime Museum -
-- Cost: $25 AUD per person -
-- Bring: -
-- Contact: Peter Chubb. -
-- The submissions portal is now closed. Further information on the Call for Presentations. -
-- Please contact summit@sel4.systems if you have any questions. -
-- Alongside growing the seL4 ecosystem, protect and promote the seL4 brand - and provide longevity to seL4, one of the aims of the - seL4 foundation is to provide an avenue for - funding on-going research, - on-going engineering as well as sharing the cost of "big-ticket" - verification items, through its membership revenue, and through specific - fund-raising to address particular needs. -
-- Together, we can change the world of critical systems, - to achieve real security! - -
- -- By joining the adventure, you can support: -
-- You can contribute to seL4 though the Linux Foundation's - crowdfunding portal. -
-- Alternatively, for larger donations, we can raise an invoice through - the Linux Foundation, - please contact us if you - want to take this route. -
- - -The Technical Steering Committee (TSC) of the seL4 Foundation is - responsible for overseeing all technical aspects of the seL4 project - (technical direction, code of conduct, procedures, workflows, - quality control, etc). It is made up of seL4 developers, proof engineers, - and technical leaders. - Their role is described in detail in the - seL4 - Foundation Technical Charter. -
- - --After the constituting meeting, TSC meetings are planned to be public, and minutes will be -made publicly available from this page.
--If you have an issue that you'd like to bring to the attention of the TSC, -please email any of its members listed above.
--The following meetings and decisions have so far been recorded:
--TSC members are the technical leadership of the foundation. New members can -join the TSC by decision (vote) of the TSC, and potential new members can be nominated -by any current TSC member. -
--New members are generally expected to be active current contributors with the technical - knowledge required for the role and a vision for the future of the seL4 ecosystem.
--There are separate roles for repository write access (Committer), organisational admin -access (SysAdmin), and the ability to approve pull request and manage issues (Reviewer). -
-If you would like to nominate someone for any of these roles, please email the chair (Gerwin Klein) of the TSC.
- - -- We encourage the use of the seL4® name and logo - in your work, following the usage rules below. -
-- The Linux Foundation has registered seL4® as a - trademark in the United States and other countries. Please use ® - with the first mention of seL4 in all materials. In addition to the - guidelines below, the Trademark Usage Guidelines of the LF Projects, LLC, - available at - https://lfprojects.org/policies/trademark-policy/, - also apply to any use of the seL4 trademarks and logos.
-- The usage guidelines - at https://lfprojects.org/policies/trademark-policy/ - apply to the seL4 mark and logos. In addition: -
-- Do not modify the seL4 trademark or logos, e.g., do - not add other characters, or change the colors, orientation or any - other visual aspect of any logos.
-- Do not use the seL4 trademark in a misleading - way. This includes: -
-- For many libraries and language bindings it makes sense to include - the seL4 mark in the name of your project. -
-- You may do so in the following forms. Do - use a capital L in seL4: -
-- Do not use e.g. seL4-<project> or - seL4-<language>-bindings. -
-- If for some reason a different form is preferable, this can often be - accommodated. To use such a different form, obtain written - permission from trademark@sel4.systems. -
-- If your project is a generally useful part of the ecosystem of - components, libraries, and frameworks around the seL4 kernel, - consider hosting it under the seL4 Foundation GitHub organisation - at github.com/seL4. Contact - one of the members of the TSC of the - foundation if you would like to do so with a description of the - project, its current state and plans for the future. -
-- Projects and repositories hosted under the seL4 Foundation GitHub - organisation may use the seL4 mark more freely in their name. -
-- We look to our community to help us retain the value of the seL4 - trademark and promote the seL4 brand. -
-- If you have questions about these guidelines or would like to report - concerns regarding the use or misuse of the seL4 trademark, or to - obtain written permission for a proposed use, please - contact trademark@sel4.systems. -
-- The seL4 Foundation and/or Linux Foundation Projects may release new versions - of the seL4 trademark guidelines or The Linux Foundation Projects Trademark - Usage Guidelines from time to time. -
- - -- This page provides an seL4 logo pack for download. - Use it to show off your work with the seL4 kernel! -
- -- Please note the trademark use rules that apply to - the use of this logo. -
-- We have taken an exciting step to expand the seL4 - community, by setting up the seL4 Foundation, - similar to foundations for other open-source projects, such as - the Linux Foundation's Cloud Native Computing Foundation, - RISC-V and others. It forms an open, transparent and - neutral organisation tasked with growing the seL4 ecosystem. It - brings together developers of the seL4 kernel, developers - of seL4-based components and frameworks, and those - adopting seL4 in real-world systems. Its focus is on - coordinating, directing and standardising development of the - seL4 ecosystem in order to reduce barriers to adoption, raising - funds for accelerating development, and ensuring clarity of - verification claims. -
-- JOIN NOW - HERE! -
- - - -- To learn more about the seL4 Foundation: -
-- For details, please see: -
-- This page defines in high-level language what the seL4 proofs - demonstrate, what we assume, and what the proof implies. It is - aimed at an audience with a technical background, but does not - assume any expertise in formal verification. -
-- Formal proofs can be tricky. They prove exactly what you have - stated, not necessarily what you mean or what you want. -
-- Our proof statement in high-level natural language is the - following: -
-- The binary code of the ARM and RISCV64 versions of the seL4 microkernel - correctly implement the behaviour described in its abstract - specification and nothing more. Furthermore, the specification - and the seL4 binary satisfy the classic security properties - called integrity and confidentiality. -
-- Integrity means that data cannot be changed without permission, - and confidentiality means that data cannot be read without - permission. -
-- Our proof even goes one step further and shows that data cannot - be inferred without permission – up to a certain - degree. So-called information side channels are - known to exist. The proof only covers those information inference - channels that are present in the formal model: the - confidentiality proof covers all in-kernel storage - channels, but excludes timing channels which must be - dealt with empirically. -
-- Note that this proof statement is much stronger that previous - versions you might have seen. Previously, in 2009, we had only - proved functional correctness between the C code of the kernel - and its specification. Now we have additionally shown binary - correctness, that is, the compiler and linker need not be - trusted, and we have shown that the specification indeed implies - strong security properties as intended. -
-- As with all proofs, there are still assumptions that must be met - (described below), and there may still be user expectations on - kernel behaviour that are not captured by the properties proved - so far. Nevertheless, this degree of strong evidence for security - and correct functionality has never been achieved before for an - OS kernel and is currently unrivalled. -
-- With a proof in formal logic, it is important to understand what - its basic assumptions are, because this is where fault can still - occur. Our proof about the seL4 microkernel goes down to the - level of the binary code. -
-- Note that we do not need to trust the compiler and - linker any more. Their output is formally verified for seL4 by an - automatic tool if the kernel is compiled with moderate - optimisation levels. The same proof for more aggressive - optimisations is under development. -
-- The reduced proof assumptions mean that we do not need to trust - the compiler or linker, but there may still be faults remaining - in specific low-level parts of the kernel (TLB, cache handling, - handwritten assembly, boot code). These parts are thoroughly - manually reviewed. -
-- We have made these assumptions to fit into the carefully limited - scope and the limited resources of a major research project. - These specific assumptions are not a limitation of the general - formal verification approach. In theory, it is possible to - eliminate all of them: there are at least two prominent research - groups that have demonstrated successful formal verification of - assembly code and low-level hardware management functions and we - have ourselves proved an earlier version of the boot code correct - down to the level of a precise, executable specification. There - are still significant scientific challenges in unifying all of - these into a single framework, but it is clear at this point that - it can be done. -
-- With all the purity and strength of mathematical proof it is easy - to get carried away. There is a fundamental theoretical limit of - formal verification: there will always be some bottom level of - assumptions about the physical world left and these assumptions - have to be validated by other means. Mathematical proof is proof - as long as it talks about formal concepts. It is when assumptions - connect to reality where things may still fail. Albert Einstein - is quoted as saying "As far as the laws of mathematics refer to - reality, they are not certain; and as far as they are certain, - they do not refer to reality." For instance, if the hardware is - faulty, or if a cosmic ray randomly changes memory, the - correctness predictions of our proof do not apply. Neither do any - traditional tests or verification methods help against cosmic - rays, but it is important to keep in mind that even with - mathematical proof, there are no absolute guarantees about the - physical world. -
-- There are two other assumptions that we do not include in the - list above, because they are of a different kind: -
-- The first is a fundamental question of formal logic. If this is - not true, mathematics in general has a much bigger problem than - one verified OS kernel. The second is more interesting, but - equally unlikely to be false. -
-- From security properties down to C code, we use the proof - assistant Isabelle/HOL. - This prover belongs to the so-called LCF family of provers and is - engineered to minimise the code that needs to trusted for the - proof to be correct. In particular, it supports external proof - checking by a separate small checking tool. There is no absolute - guarantee that the proof is correct, but when you come right down - to it, humans are good at creating proofs, computers are very - good at checking them. It is an easy problem for computers. - If you are worried about the proof, be worried about the - assumptions in the first part. They are much more likely to cause - problems. -
-- From C code to binary code, we employ a set of automated - widely-used verification tools. These are: SONOLAR, Z3, - Isabelle/HOL, and HOL4. The combination of these tools still - achieves a very high standard of assurance for this last - verification step and work is underway to cast even this step - entirely in Isabelle/HOL. -
-- We have already covered the properties that are proved directly: - functional correctness, integrity, and confidentiality. These are - high-level properties that every OS should provide, that very few - manage to provide, and that no OS has better evidence for than - seL4. -
-- The formal proof of functional correctness implies the absence of - whole classes of common programming errors. Provided our - assumptions above are true, some of these excluded common errors - are: -
-- The list goes on. There are other techniques that can also be - used to find some of these errors. Here, the absence of such bugs - is just a useful by-product of the proof. To be able to complete - our proof of functional correctness, we also prove a large number - of so-called invariants: properties that we know to always be - true when the kernel runs. To normal people these will not be - exciting, but to experts and kernel programmers they give an - immense amount of useful information. They give you the reasons - why and how data structures work, why it is OK to optimise and - leave out certain checks (because you know they will be always be - true), and why the code always executes in a defined and safe - manner. -
-- Even after binary and security proofs, we are still just at the - beginning of verifying entire systems. See our current research - projects for more things to come. Contact TS if you would - like to collaborate, for instance by connecting your formally - verified application to the seL4 proof, or by building an entire - verified system. -
- - -- - While seL4 is mature enough to be deployed in the real world, - there’s plenty of fundamental research work left on seL4 itself, and - there is far more research left on how to achieve real-world - trustworthy computer systems. More on both below, describing the - Trustworthy Systems group's - research agenda (as of May 2021), - looking for further funding to tackle these challenges. This is - largely extracted from this blog. - - -
- -- The seL4 kernel is mature in many ways, good enough to be - deployed in real-world systems. It is already in daily use in the - real world, and is being designed into many more systems. But there - is still more research to be done. -
- -- Right now, seL4 solves a number of fundamental security problems, - and it provides the best possible solution to these problems. In - particular, it provides the strongest possible spatial isolation, in - that it guarantees that memory cannot be accessed without explicit - authorisation. It also provides strictly controlled communication - between subsystems, in that two subsystems (provably) cannot - communicate through system calls or memory unless explicitly - authorised. And it does this with unbeaten performance. This is more - than any other real-world OS can give you. -
- -- What seL4 cannot (yet) do, and no other OS can either, is to provide - temporal isolation guarantees. This comes in two guises, the - integrity and the confidentiality aspect. -
- -- Here, integrity means the ability to guarantee timeliness of - real-time systems, especially mixed-criticality systems (MCS), where - critical, high-assurance real-time tasks operate concurrently to - untrusted code. seL4’s new MCS model provides temporal integrity to - a significant class of MCS, and its verification is - on-going. However, it does not yet fully solve the - problem. Specifically, we found that there are important use cases - for which the present MCS model is not sufficient. On-going research - is addressing this, leading to further improvements of the model. -
- -- Furthermore, we have not yet developed the formal framework for - reasoning about timing guarantees on top of the MCS model. This is, - of course, what is needed for making high-assurance MCS a reality, - and is a significant research challenge, which is presently - unfunded. Again, while we’re ahead of any other system, the world’s - emerging cyberphysical systems need more. -
- -- Much more work remains on the confidentiality side: Here the - problem is to guarantee that there is no information leakage through - covert timing channels; this kind of leakage is a serious real-world - problem, as demonstrated in the Spectre - attacks. Timing channels have long been put into the too-hard - basket by most people. Triggered by Spectre there is now a flurry of - activity, but most are band-aid solutions addressing symptoms. In - contrast, we are working on a principled, fundamental approach to a - complete prevention of timing channels. We call this approach time - protection, in analogy to the established memory protection. The - feedback from the research community has been strong: the work has - already won three best-paper awards, yet we are only at the - beginning of this line of work. -
- -- Specifically we have designed some basic OS mechanisms for providing - time protection, and have shown that they can be effective on the - right hardware, but also that contemporary hardware is - deficient. Presently, with support by the Australian Research - Council and the US Air Force, we are working on proving that these - mechanisms are effective on suitable hardware. This work has - progressed well and needs further funding. -
- -- We are also working with the RISC-V community on defining - appropriate hardware support to allow time protection to do its - job. But much more research is needed on the OS side, as so far we - have some basic mechanisms, that work in very restricted use - cases. It’s far from having an OS model that addresses the large - class of systems where timing channels are a security threat. This - work is presently unfunded. -
- -- And finally, we have not yet solved the problem of verifying seL4 - for multicore platforms. While there exist kernels with a multicore - verification story, these kernels have performance that makes them - unsuitable for real-world use. Thanks to our past research we now - understand how to verify multicore seL4, but we need funding to do - it. -
- - - -- Beyond seL4, there’s the wider Trustworthy Systems agenda: creating - a societal shift towards mainstream adoption of software - verification. We have made some progress here, with verification - uptake increasing in academia and industry, but it’s far from - mainstream. -
- -- To enable this shift, the team has more concrete research - goals. These include: -
- -- These are all research challenges that remain unsolved, are of high - importance for the security and safety of real-world systems and - which the Trustworthy Systems group is in a prime position to - address. We have the track record and credibility to deliver, and - need funding to do it. -
- - -- We have a separate website for technical seL4 documentation, which - we call the Docsite. The - docsite is community maintained - its source is hosted on GitHub and - can be edited using standard GitHub procedures - as documented - on the docsite itself. -
- -- The best way to learn to use seL4 is to follow our tutorials. We - provide a series of hands-on tutorials that cover the basics of - seL4, the kernel and core library APIs, user-level frameworks, and - virtualisation. -
- -- If you want to know how to use seL4, then this is where you should - start. See - the Tutorials - page on our docsite. -
- -- If you prefer unstructured learning and want to dive in and explore - on your own then follow the links on the - docsite's Getting - Started page. -
- -- After getting a solid seL4 background you can move on to building - seL4-based systems. Next steps include working on one of - our suggested - projects or helping to expand - the collection - of libraries and components available to build seL4-based - systems. -
- -- We've written a lot about the seL4 kernel: from overview papers, - historical background, and project retrospectives, to detailed - documentation of the kernel API, user-level libraries and - components, and system frameworks. -
- -- Besides the kernel implementation and the systems aspects of seL4, - we've also written about the seL4 proofs: from overview papers - explaining the models and the proofs, details of proof techniques - developed and used for the proof, insights gained through doing the - proofs, to detailed documentation of the proofs themselves. -
- -- See - the Documentation - page on our docsite for information about all of these. -
- - -- seL4 is being used as the basis of several (University-level) - courses, including: -
-- Advanced - Operating Systems at UNSW. This course provides an extensive - seL4-based assignment that teaches students how to build an - operating system on seL4. The course material (all lecture slides, the - project and related code) are publicly available. Videos of lectures covering seL4 are available from the - UNSW - CSeLearning COMP9242 YouTube channel. -
-- Advanced Topics - in Software Verification at UNSW. While not directly about - seL4, this course teaches Isabelle/HOL and the program - verification techniques used to develop seL4's proof. Following - this, or a similar, course is necessary if you intend to - contribute to the seL4 proofs. -
- This page discusses the issues a business will need to consider for a “transition to seL4”, whether creating a - new product or upgrading an existing product.
-Ultimately, - the best approach is to contact us - to discuss your needs and aims, but - brainstorming through the considerations described below is a good - first step in any case. This will also give you an idea of the - role that seL4 can play in securing software systems across a range of - industry verticals. -
-- More information about this process is available in - this article or in - these slides. -
-- You might also have questions on the licence and its implications. - For this, read Gernot’s licensing blog and - contact us if you have - any questions! -
-Now to the considerations.
-The first step is to identify the security and - safety requirements of your system (what are the assets that need protecting), and the threat - model (what are the attacks or failures that threaten those assets).
-seL4’s power and added value lie in the proved isolation that - it provides. Being an OS kernel, its duty is to control - access to resources and communication between entities. - By using seL4, you - get the highest assurance that components can be properly - isolated from each other, with communication only possible - through explicitly provided channels.
-This first step, therefore, helps to identify what it is that - you would like to isolate in your system. Typically this comes down to protecting some small - but critical component(s) that perform sensitive operations from a large and untrustworthy, but still useful, code base.
-An example is a critical control loop which takes inputs from a number of sensors, including cameras with complex drivers and image processing software.
-
- The next step is to check which hardware platform (and exact - configuration) your product is or will be running on and whether - this platform is already supported by seL4. You will also need - to check whether seL4 is verified on this configuration and - need to know what your assurance and certification requirements - are and whether the proofs can support these.
-If the answer to some of these questions is “no”, you can - check whether it’s on the roadmap - of seL4, and - contact us to - discuss extending seL4’s support.
-Keep in mind that even if a particular configuration is not (yet) verified, it will still be highly robust, owing to sharing the design and much of its code with verified configurations.
- -- Beside the kernel, your system is likely to require a number of other OS components: - remember that seL4 is just a microkernel, and will require a number of - OS services to run. You can check the list of available components - and if the ones you need are missing, - contact us, or better yet - contribute.
-- Systems are rarely built from scratch, even a new product typically incorporates significant amounts of legacy software. And frequently the aim is to increase an existing product's resilience to cyber attacks.
-The usual approach here is what we call an incremental cyber retrofit, which we describe in detail in - this article. In a nutshell, the idea is to gradually adapt the - existing architecture.
-The first step is to put the complete legacy system into a virtual machine (VM) running - on seL4. This in itself adds no security (only a little bit of overhead), but it serves as a starting point for incremental modularisation.
-The next step is to extract and isolate coarse-grain subsystems, moving from a system with a single VM to one with multiple communicating VMs.
-In subsequent steps this is repeated and refined until individual trusted components are placed into their own, isolated, sandboxes running - natively on seL4.
- - --After this you should have a much more robust system that can take advantage of seL4's proved properties to provide significantly better resilience to cyber attack.
- - -foundation@sel4.systems
--Discussion about using and developing seL4 (questions, suggestions, updates, etc.) -
-
-We also host an open video
-chat hangout every two weeks (dates/times shown in calendar above) to bring seL4 developers together. There is no strict
-agenda, anybody can join for technical discussions about seL4, related
-repositories and projects, or general questions and answers. Members from the
-technical steering committee (TSC) will try to be there, but these are not
-TSC meetings where formal decisions are made.
-A calendar
-feed is available.
-
-RFC (request for comments) proposing new features for seL4 -
- - --Github -
- - -support@sel4.systems
inquiries about professional support contractssel4@sel4.systems
communication that cannot be done on the public channelsmoderation@sel4.systems
requests or queries about community moderation. See seL4 Code of Conductwebmaster@sel4.systems
-There is now a YouTube channel run by the seL4 -Foundation. It presently has two playlists, one with the recordings of the seL4 -material from this year’s UNSW Advanced Operating Systems course, and one with -seL4 Summit talks from Trustworthy Systems.
- -More to come, enjoy.
- -Announcing the releases of seL4, CAmkES and CapDL under the seL4 Foundation. -Below you can find links to release notes with updates to other supporting -projects to come before the end of the year. Versioned Releases:
- -The 3rd seL4 Summit will -take place (virtually) on 15–18 November (US East Coast time). The program -features a tutorial and 3 days packed with great talks and panels.
- -Presentations will be streamed according to the schedule and available for -download right after, and there will be an on-line discussion forum.
- -Registration is only $80US
- -We’re happy to announce the newest member of the seL4 Foundation: -Minneapolis-based company Adventium Labs. -Adventium Labs develops solutions for safe and secure software-intensive complex -systems, with specialties in separation architectures, model-based system -engineering, and mathematical analysis technologies. They are leveraging these -capabilities to extend seL4 into safety and security critical industries, -including medical devices, defense and commercial avionics, and industrial -control.
- -RISC-V (RV64) is the third ISA with verified seL4. The functional correctness -proof of seL4 on the RV64 ISA has completed. Congratulations to the awesome -Proof Engineering Team of the Trustworthy Systems group on achieving this major -milestone for seL4! And many thanks to HENSOLDT Cyber for making it possible.
- -What we have now is the refinement proof from the seL4 formal spec to the C -implementation, putting RV64 on the same level as x64 in terms of seL4 -verification. The binary verification, which extends this refinement to the -binary code of the kernel is progressing, stay tuned for more news on that in -the foreseeable future.
- -More on this in this blog -post.
- -- - - - - The whitepaper "The seL4 Microkernel - An Introduction" provides an - introduction to and overview of seL4. We explain what seL4 is (and - is not) and explore its defining features. We explain what makes - seL4 uniquely qualified as the operating-system kernel of choice - for security- and safety- critical systems, and generally embedded - and cyber-physical systems. In particular, we explain seL4's - assurance story, its security- and safety-relevant features, and - its benchmark-setting performance. We also discuss typical usage - scenarios, including incremental cyber retrofit of legacy systems. - - You can download here. -
- -We’re happy to announce the first new member since the launch of the seL4 -Foundation: Sydney-based company Breakaway Consulting. -Through Founder and Managing Director Ben Leslie, Breakaway comes with 20 years -of experience in L4 microkernels and systems based on various L4 kernels. Prior -to founding Breakaway, Ben was a student with what is now the TS Group, and then -VP Engineering of Open Kernel Labs. Breakaway offers consulting services on -architecture, design and implementation of seL4-based systems.
- -- The Trustworthy Systems group is - excited to announce the creation of the seL4 - Foundation. Its aim is to provide a neutral and independent organisation - to ensure the longevity of seL4, and grow its ecosystem of adopters and - contributors. - - It has a high-profile Board - consisting of Gernot Heiser (Chair), June Andronick, Gerwin Klein, John - Launchbury, Sascha Kegreiß, Daniel Potts. - - It already has a number of members, including major adopters HENSOLDT Cyber - and Ghost Systems, and providers of services for seL4, Cog Systems and - DornerWorks. Please check the membership - page for details and how to join. - - The seL4 Foundation is set up under the Linux Foundation, which provides a - mature and well-known framework. -
- -- More information on the Blog - post about "The seL4 Foundation — What and Why", and in the press - releases from the - Linux Foundation. -
-The seL4 Foundation is pleased to welcome the Technology Innovation Institute.
- -Technology Innovation Institute’s (TII) Secure Systems Research Centre (SSRC) -has obtained seL4 Foundation membership that will enable the Centre to -participate in and contribute to driving the open source for a robust -hypervisor technology. The critical technology will help build a secure -software stack for many edge devices, such as secure communicators and -drones. Through the membership, TII will research, contribute to and advance -next-generation high-end edge device environments that focus on resilience, -isolation, trust, and security.
- -- In July, we announced that the assurance story for seL4 on RISC-V - keeps building, with the completion of the proof that seL4 enforces integrity, following the earlier - proofs of functional correctness and binary correctness for seL4 on RISC-V. -
-- The next step in the assurance stack is now also completed for RISC-V with - the proof that seL4 enforces confidentiality, i.e. that seL4 provably - enforces information flow control, when it is correctly configured to do so. -
-- "This completes the 3 big CIA security properties for seL4 on RISC-V: - confidentiality, integrity and availability. While integrity ensures there is - no unauthorised interference with private data, confidentiality ensures there - is no unauthorised access to private data”, says Gernot Heiser, chair of the - seL4 Foundation. -
- - - - - -- We thank Ryan - Barry of the Trustworthy Systems group at UNSW, main author of these proofs! We - also gratefully acknowledge funding from the Australian Reseach Council through grant - DP190103743 which has enabled this work. The proof is available on GitHub. -
- -- - - - - The seL4 Foundation has awarded Interim - Endorsement to Proofcraft as a - Trusted Service Provider for commercial support, verification projects, - training and consulting on formal verification of seL4 and seL4-based systems. - More on our services and products page. -
- -- - - - - Following CSIRO's abandoning of Trustworthy Systems (TS) and the seL4 - technology TS developed, the seL4 community and the seL4 Foundation have grown - a lot. This has led to concerns that the broader participation might have the - potential to undermine the integrity of seL4. In his latest blog, Gernot - explains why there is no reason for such concern. seL4's open governance - and technical leadership is based on technical merit and established trust, - not money. -
- -The seL4 Foundation is pleased to welcome Proofcraft.
- -Founded by the seL4 verification leaders, -Proofcraft offers commercial support, verification -projects, training and consulting on formal verification in general, and -involving seL4 specifically. By applying mathematical machine-checked software -verification, Proofcraft increases critical software systems’ reliability, -safety and security, for a verified future!
- -- - - - Xcalibyte, a member of the seL4 Foundation, is hosting a webinar on Sep 16, - 2021, given by Gernot Heiser, seL4 Foundation Chairman & Scientia Professor, - UNSW Sydney, and Yuning Liang, CEO & co-founder, Xcalibyte. The topic will be - 'The seL4 Microkernel: Proved Security for Cyberphysical Systems'. -
-- To register: http://xcalscan.mikecrm.com/Uw4y9HU. -
- -- - The seL4 Foundation thanks Ghost for its - generous contribution. Ghost's commitment strengthens the seL4 - Foundation's mission to continue advancing the ecosystem, the code - base, and the verification efforts of seL4, the world's most - advanced and highly assured operating-system kernel. -
- -- As a founding member of the Foundation, Ghost is developing - self-driving cars using seL4, aiming to make the first formally - proven safety-critical system on the road into a reality for - millions of drivers. -
- -- We warmly thank Ghost for its continued support! -
- -- - - - - The seL4 Foundation has awarded interim endorsement to the - seL4-based TRENTOS - secure operating system from Foundation member HENSOLDT Cyber. This is the - first time a product is endorsed, and marks a new milestone for the Foundation - and the growth of the seL4 ecosystem. -
- -- HENSOLDT Cyber's training module for TRENTOS has also received interim - endorsement, which constitutes another milestone as the first endorsed - training provided from outside the Trustworthy Systems group. -
- -- Details on interim-endorsed services and products are on our services and products - page. -
- -The seL4 Foundation welcomes Lotus Cars.
- -Lotus is a leader in the Global Premium Sport Car market. We stand out as a -brand dedicated to pure driving experience. Committed to advancing technology -with precision and passion, Lotus continues to spearhead research into areas -such as autonomous driving, connectivity, intelligence, electrification. Emira, -Evija, Evora are representative models that in recent years drive Lotus’ -world-wide reputation. Going forward, Lotus’ approach will be based on the -principle of “EAS-IP” (Electrify, Amplify, Simplify, Intensify and Personify), a -globally R&D strategy, and excellent autonomous driving solutions to create a -novel, technology-based driving experience for future global users.
- -In joining the seL4 Foundation, Lotus is committed to the development and -deployment of the seL4 microkernel in the field of autonomous driving, advance -Lotus’ automotive operating system to meet the overall functional safety goals -of the system, and realize the launch of safe and reliable autonomous driving -products.
- -- - - - - On 6 August DARPA brought the - “SMACCMcopter” - to DEF CON - and invited the assembled hacker elite to attack it. The - SMACCMcopter was the research vehicle of the Air Team at - DARPA's HACMS - program. The Trustworthy Systems - team worked - with project partners to deploy seL4 and leverage formal - methods to protect the drone from cyber attacks. -
-- The result? Predictably, sel4's verified security enforcement - defeated - the hackers - comprehensively. As DARPA - said: “Formal methods FTW!” -
- -The seL4 Foundation is pleased to Kansas State University -as Associate Member.
- -KSU has for years been collaborating for years on seL4-based projects with a -number of Foundation members under multiple DARPA projects and we are looking -forward to their continued involvement.
- -- - - On 29th July 2009, the original functional correctness proof of seL4 was - completed, a widely-recognised research breakthrough and the first big - milestone in seL4's history. We obviously had a party then, and have since - celebrated its anniversary, calling it, tongue-in-cheek, “International Proof - Day”. -
-- On the fifth anniversary we open-sourced seL4, which was another major - milestone, which we referred to as “seL4 Freedom Day”. -
-- Today marks the 12th anniversary of the proof, and the 7th anniversary of - open-sourcing, and from now on we'll refer to the date simply as "seL4 Day”. -
-- The seL4 community is now definitely global. Still we would normally have a - physical party in Sydney, but won't be able to due to the renewed Covid-19 - restrictions — so we'll all be remote ;-) -
-- Happy seL4 Day everyone!
-- A virtual toast to you all, and a big thank-you to all for your continued - support! -
- -- - - - - The assurance story for seL4 - on RISC-V keeps building. We first formally - proved functional correctness: that - the seL4 C code on RISC-V platforms behaves exactly as its specification - says. We then established binary correctness: that - the machine code running on the processor behaves exactly as the C code, and - by extension, as the specification says. We now have established the - crucial integrity property for seL4 on RISC-V: that the - specification, and by extension the kernel binary, prevents an application - running on top from modifying data without authorisation. In seL4 speak: seL4 - provably enforces capability-based access control. -
- -- “The integrity property is crucial for security: it is key to enforce - the isolation of components running on top of the - kernel”, says Gerwin Klein, seL4 verification expert and chair of the - seL4 Foundation technical steering committee. “This is what allows - critical components, like the network controller that has access to - software-controlled brakes in a modern car, to securely run alongside - untrusted software, like the entertainment system. With integrity proved, you - know that an attack on or from a vulnerable untrusted part of the system - cannot compromise the critical parts.” -
- - - - - -- Integrity had been proved in the original seL4 verification on the - Arm32 architecture. It is now also established for RISC-V - architecture, making it the only 64-bit architecture that has an OS - with such a comprehensive verification and security story. We thank - Ryan - Barry of Trustworthy Systems, main author of these proofs! We - also gratefully acknowledge funding from the - Australian Reseach Council through grant - DP190103743 which has enabled this work. -
- -- See Gernot's - blog for more details. - The - proof is available on GitHub. -
- -The seL4 Foundation is pleased to welcome Technical University of Munich as -Associate Member.
- -The TUM, home of the Isabelle theorem prover used in the verification of seL4, has been a -collaborator of the Trustworthy Systems team for many years.
- -The seL4 Foundation Second State as a member.
- -Second State is the creator and maintainer of WasmEdge, a CNCF / Linux -Foundation project, which provides a high-performance, lightweight, -cross-platform, polyglot, and secure software runtime/sandbox for edge -computing. Based on the WebAssembly standard, WasmEdge could be 100 times faster -than Docker and hypervisor-based solutions. It supports multiple programming -languages, including DSLs, and can be embedded into multiple hosting -environments.
- -Second State is currently porting WasmEdge to seL4. It will be one of the first -software runtimes in the seL4 ecosystem. By working with members in the seL4 -Foundation, Second State aims to create a real-time software sandbox for -automotive and industrial (ie smart factories) applications.
- -- With four new Premium Members joining the seL4 Foundation during - the past few weeks, we now welcome their representatives on the - seL4 Board. The new Board Members are: -
- -- - - | -- Dr. Feng Zhou represents Horizon - Robotics, where he is a Fellow. He has 15 years of academic - as well as 15 years of industry experience in video/image - compression & processing, computer vision, artificial - intelligence, and ASIC processor architecture. - | -
- - - | -- Ian Xu represents Li Auto, - where he serves as Vice President, leading Computing - Platform design and development including hardware, OS and - run-time environment. His experience is in the design and - development of networking and wireless communication products. - | -
- - - | -- Dr Matthew P. Grosvenor - represents Jump Trading, - where he specializes on measurement and optimization of - high-performance and low-latency network systems. Matthew is a - former member of the Trustworthy Systems research group that - developed seL4. - | -
- - | -- Qiyan Wang represents NIO, where he - leads a global R&D team responsible for Vehicle Operating - System, Connected Vehicle Cloud, Vehicle Digital Architecture, - Cyber Security, and Vehicle Software Integration and - Validation. - - | -
- The four new members join five continuing members on - the seL4 Board, taking the size of - the Board to nine. -
-The seL4 Foundation welcomes Jump Trading as a -Premium Member.
- -Jump is a research-based organization that is committed to applying cutting edge -technology to trading global financial markets. Jump has the full spectrum of -technology challenges from machine learning models and HPC at massive scale to -cybersecurity and trusted compute requirements that come from being a major -market participant in many asset classes. Jump was founded in 1999 and has over -20 global offices including Sydney, Shanghai and Singapore in Asia.
- -The seL4 Foundation welcomes Li Auto Inc. as a Premium -Member.
- -Li Auto is an innovator in China’s new energy vehicle market. The Company -designs, develops, manufactures, and sells premium smart electric vehicles. -Through innovations in product, technology, and business model, the Company -provides families with safe, convenient, and refined products and services. Li -Auto is a pioneer to successfully commercialize extended-range electric vehicles -in China. Its first model, Li ONE, is a six-seat, large premium electric SUV -equipped with a range extension system and advanced smart vehicle solutions. The -Company started volume production of Li ONE in November 2019 and released the -2021 Li ONE in May 2021. The Company leverages technology to create value for -its users. It concentrates its in-house development efforts on its proprietary -range extension system, next-generation electric vehicle technology, and smart -vehicle solutions. Beyond Li ONE, the Company aims to expand its product line by -developing new vehicles, including BEVs and EREVs, to target a broader consumer -base.
- -Li Auto’s team will develop a secure highly extensible real-time open platform -for next generation self-driving vehicles based on the micro-kernel OS seL4. The -platform will enable an ecosystem for third party application developers.
- -The seL4 Foundation welcomes Horizon Robotics as a Premium -Member.
- -Horizon Robotics is a global leader in the development of artificial -intelligence computing platforms. Its mission is to make driving safer and more -convenient as drivers transition to intelligent and self-driving vehicles. -Founded in Beijing in 2015, Horizon Robotics develops next-generation autonomous -driving technology integrating edge-AI processors, algorithms, and toolkits. -Horizon has reinvented the automotive-grade AI processor with Horizon Journey -SOC and its Brain Processing Unit AI engine (Horizon BPU), to offer the ultimate -balance of high-performance, low power, and cost effectiveness for inference at -the edge. Horizon’s state-of-the-art AI toolkit and model zoo enable developers -to optimize and deploy their own neural network models to Journey BPU with ease. -Horizon also offers vision perception algorithms to accelerate -time-to-production in the dynamic and highly competitive ADAS/AD market.
- -The evolution of automotive E/E architecture continues rapidly. With complicated -hardware consolidation, software consolidation and separation happen -simultaneously. “To address the challenges of safety, security and -realtime in autonomous software, a fundamental high quality state-of-the-art -microkernel is needed. We are looking forward to working with members of seL4 -Foundation to build mixed-critical platform and solution for next-generation -autonomous driving vehicles.”
- -The seL4 Foundation welcomes Xcalibyte as a member.
- -Xcalibyte’s mission is to improve the quality of software by creating -easy-to-use tools that help developers build and deploy reliable and secure -code. Founded by world-class software experts with decades of experience in -compiler optimization and software development, Xcalibyte was established in -2018 and has offices in Shenzhen, Shanghai, Beijing and Hong Kong. Xcalibyte -enhances the speed and accuracy of code auditing, code evaluation, and code -defect detection. We use advanced static code analysis to help reduce costs, -improve productivity, and ensure software developers in China and all over the -world have the proper capabilities to develop better, more reliable software.
- -“As we are actively working with members of the seL4 Foundation, it makes -perfect sense for us to be part of the organisation. Our code analysis tools are -being used by community members and we are aiming to ensure they develop high -quality and secure code.”
- -The seL4 Foundation welcomes NIO Inc as a Premium member.
- -NIO is a pioneer in China’s premium electric vehicle market. We design, jointly -manufacture, and sell smart and connected premium electric vehicles, driving -innovations in next generation technologies in connectivity, autonomous driving, -and artificial intelligence. Redefining user experience, we provide users with -comprehensive, convenient, and innovative charging solutions and other -user-centric service offerings. NIO went public in the U.S. in 2018. So far, NIO -has launched 3 mass-production vehicle models: ES8, ES6, and EC6, and -accumulated deliveries to users are over 120,000. Starting September, NIO will -start delivering to users in Norway. NIO invests heavily in in-house R&D to -build full-stack cutting-edge technologies around intelligent and autonomous -driving EV. Its engineering teams are distributed across the globe, including -US, UK, Germany and China.
- -The Digital Systems department at NIO is missioned to develop the most advanced -software platform for the next-generation autonomous driving vehicles in the -industry from the ground up. This platform is internally named NIO Vehicle -Operating System (NVOS) and based off seL4. It involves solving a wide range of -technical challenges, such as seamless app development on heterogeneous hardware -chipsets, low-latency & high throughput data processing, powerful AI framework, -automobile-grade safety and security guarantee, and complete toolchains to -provide Android alike development experience.
- -The seL4 Foundation has released the following updates:
- -Various repositories with support libraries and tools have also been updated. -Please refer to the following release manifests:
- -The seL4 Foundation has appointed Dr June Andronick as (part time) CEO. June, -already a permanent board member as one of the founders of the seL4 technology, -continues to fulfil the role of Treasurer.
- -The seL4 Foundation welcomes New-Zealand based Kry10 -as our latest member.
- -“We believe that formal methods and proven code is the only viable option -for software, whether it is AI, Industrial controls, or really anything else. -seL4 is the first, and only real practical kernel to show the world how it -should be done,” says Boyd Multerer, CEO and Founder of Kry10.
- -“At Kry10, we are building a full-featured operating system on top of the -seL4 Kernel, along with tooling, services, key management and more. We are -aiming at industrial use, but it is suitable for consumer devices and more. -Combined with the Erlang BEAM VM for applications, we intend to deliver systems -with great security and minimal downtime, even across upgrades.”
- -- It has been heart-warming to see the response of the seL4 community to the - news of the dismantlement of the Trustworthy Systems group (TS), creator of - seL4. -
- -- The seL4 Foundation, as well as its members and ecosystem, want to reinforce - their commitment to the success and support of seL4. The TS team will be - rebuilding at UNSW and a number of Foundation-endorsed seL4 services providers as well as the newly - created Proofcraft verification - company are dedicated to support seL4 in the future. -
-- - With this recent news, it's never been more important to work together as a - community to support seL4 and the transition of the support and development to - the Foundation and its members. People have been asking how to help. Offers of - support keep coming. We are looking at various options for sustainable - support, with a priority of keeping the team together. There are options on - the table that we are exploring that may allow us to do that. Please help us - with that, the existing TS team is the best base for stable seL4 support. -
-- In the meantime, here are 4 concrete things that can be done now. Spread - the word to people who care about seL4’s future, and - contact us if you - want to discuss. -
-The community has expressed a need to more easily find seL4 experts to hire. The -Foundations has created a “Jobs in seL4 ecosystem” page -where members can post offers for positions with seL4 expertise.
- -Today, the seL4 Foundation and RISC-V -International announced that the verified seL4 microkernel -on the RV64 architecture has been proved down to the executable code by CSIRO’s -Data61, thanks to funding provided by HENSOLDT Cyber -GmbH. This guarantees that the seL4 microkernel on -RV64 will operate to specification even when built with an untrusted C compiler, -GCC.
- -Within and across open collaboration communities it is essential to work -together on areas of mutual interest. RISC-V and seL4 are pleased to announce -their progress and their alliances as they join forces to enable stronger -overall security, combining security-oriented architecture and operating system -design.
- -“We are excited to be one of the first architectures with secure operating -system kernels with such a strong formal verification story,” said Mark -Himelstein, CTO of RISC-V International. “RISC-V is continuing to increase the -security features that encompass the ISA and the secure seL4 kernel is a natural -complement.”
- -“This is another milestone for seL4, which continues to define the state of the -art in OS security,” added Prof Gernot Heiser, Chairman of the seL4 Foundation. -“Stronger aligning the two open ecosystems makes a lot of sense.”
- -“The verified seL4 microkernel forms the core of TRENTOS, our secure operating -system for our MiG-V chip, a RISC-V processor with supply chain security”, said -Sascha Kegreiß”, CTO of HENSOLDT Cyber GmbH. “This unique combination of -hardware and software security can protect critical assets from advanced -persistent cyber threats.”
- -”Translation validation ties all of our verification efforts together,” said Dr -Zoltan Kocsis, CSIRO Verification Engineer. “Bringing translation validation to -a modern, 64-bit processor presented significant scalability challenges but, in -the end, we were able to overcome them.”
- -For more details on binary verification of seL4 on RISC-V see Gernot’s blog: -seL4 on RISC-V Verified to Binary Code (and seL4 and RISC-V Foundations form an -alliance).
- -The seL4 Foundation is pleased to welcome ETH Zurich -as associate member, and is looking forward to further strengthening of ETH’s -engagement with seL4.
- -The seL4 Foundation now has an easy way for the general public to support -financially the development of seL4 and its open-source ecosystem, using the -Linux Foundation’s LFX -portal.
- -The seL4 Foundation welcomes Raytheon Technologies as -our latest member.
- -Members of the Raytheon Technologies team have been long-time core participants -in the seL4 ecosystem, predating the company’s formation in 2020, which brought -together Raytheon Company and United Technologies’ aerospace businesses, Collins -Aerospace and Pratt & Whitney. Collins Aerospace was a prime contractor in the -DARPA HACMS program, which demonstrated the seL4-based incremental cyber -retrofit of autonomous military vehicles. This was a major milestone in the -growth of seL4, demonstrating that it protects against cyber attacks on real -systems in operation. The same Raytheon Technologies team now leads the -follow-on DARPA CASE program, aiming at designed-in cyber-resiliency, including -the seL4-based framework for verified initialisation and configuration of -systems architectures.
- -The seL4 Foundation has extended Interim Endorsement -as Trusted Service Provider to HENSOLDT Cyber, for -consulting and development services for seL4-based systems. More on:
- - - -- The seL4 Foundation has commenced providing interim endorsement for - trusted service providers for seL4. These may apply - to consulting and development services as well as for training. In a - first step, the Foundation has given interim endorsement to the - following trusted service providers (in the order of approval): -
-- Interim endorsement is intended to lead to full certification; the Foundation - will work with interim endorsees and the general membership on developing - certification schemes. More detail. -
- - - -The seL4 Foundation welcomes Penten Pty Ltd as our -newest member. Penten is based in Canberra, Australia, and specialises in secure -communications technology and artificial intelligence. Penten has been -developing seL4-based products for a number of years, some of which are in daily -use in multiple defence forces.
- -Videos of the seL4 summit 2022 are now available on the seL4 YouTube channel! -Links and slides can be found on the summit -Program and -Abstracts pages. Thanks to all the -speakers for making the seL4 summit 2022 a great success!
- -- The seL4 Foundation welcomes the open-sourcing - of core components of KataOS created by our Member Google. KataOS is based on seL4 and implemented - mostly in the Rust programming - language. KataOS is to be combined with a secure hardware platform on the - RISC-V architecture. -
-- This is an exciting addition to the seL4 ecosystem that will ease deployment - of seL4-based systems. It also adds improved support for running - Rust programs on seL4, which is a hot topic in the seL4 community. -
- -The seL4 Foundation thanks Xcalibyte for becoming a -Bronze sponsor of the seL4 Summit 2022.
- -Xcalibyte’s mission is to improve the quality of software by creating -easy-to-use tools that help developers build and deploy reliable and secure -code. Founded by world-class software experts with decades of experience in -compiler optimization and software development, Xcalibyte was established in -2018 and has offices in Shenzhen, Shanghai, Beijing and Hong Kong. Xcalibyte -enhances the speed and accuracy of code auditing, code evaluation, and code -defect detection. We use advanced static code analysis to help reduce costs, -improve productivity, and ensure software developers in China and all over the -world have the proper capabilities to develop better, more reliable software.
- -- We are very fortunate to welcome four leaders at major funding agencies to participate in a session Funding agencies: priorities and - vision at the seL4 summit. They will each give their views - on the priorities and vision of their agency in terms of high-assurance systems. -
-The seL4 Foundation thanks DornerWorks for becoming -a Bronze sponsor of the seL4 Summit 2022.
- -DornerWorks helps product makers turn their ideas -into reality with FPGA, hardware, and embedded software engineering expertise. -Among other areas, DornerWorks specialises in seL4 microkernel-based -development.
- -Innovative companies are building products on a trusted software base with the -guidance of DornerWorks engineers. As a founding member of the seL4 Foundation, -DornerWorks can accelerate the integration of seL4 as the trusted software base -for your products.
- -If you are interesting in sponsoring the seL4 summit 2022, please contact -summit@sel4.systems.
- -The seL4 Foundation thanks Horizon Robotics for becoming -a Bronze sponsor of the seL4 Summit 2022.
- -Horizon Robotics is a leading provider of computing platforms for smart vehicles -with the mission to make human life safer and better.
- -Premium member of the seL4 Foundation, Horizon works with members of seL4 -Foundation to build mixed-critical platform and solution for next-generation -autonomous driving vehicles.
- -If you are interesting in sponsoring the seL4 summit 2022, please contact -summit@sel4.systems.
- -The seL4 Foundation welcomes SpacemiT as a member.
- -SpacemiT, a semiconductor innovation company focusing on high-performance RISC-V -architecture chips, announced that it has officially joined the seL4 Foundation. -SpacemiT will work closely with seL4 to promote RISC-V+seL4 and will also focus -on the security and performance of the operating system, thus assuring -confidence in the security of the RISC-V architecture.
- -This hybrid event will be held in Munich, Germany, 10-13 October 2022.
- -The seL4 summit will cover the complete seL4 ecosystem, consisting of the -verified microkernel, as well as all seL4-related technology, tools, -infrastructure, products, projects, and people.
- -Tickets include:
- -Mentorship program
- -As part of the registration process, attendees have the opportunity to opt-in to -a new, informal mentorship program. The purpose of this program is to foster -mentorship relationships within the seL4 community. The program committee will -match students and junior engineers who wish to participate as mentees with -volunteer mentors. Participating attendees will be introduced to their -counterparts during the summit, and will carry on afterwards with whatever level -of involvement suits both parties. Mentors are welcome to volunteer for any -level of involvement.
- - - -The seL4 Foundation is pleased to welcome Google as our latest member.
- -We are excited to see their interest in seL4 and look forward to seeing their work with seL4.
- -- Have a look at the seL4 summit Program! - We have an amazing line-up of cool seL4 work, with a combination of - technical research and development, experience reports of seL4 in the field, - technical discussions and Birds-of-a-feather sessions, as well as a whole - day of seL4 bootcamp with tutorials and training. -
-- - - -
- -The seL4 Foundation is pleased to welcome Lattice X.
- -LatticeX Foundation cultivates academic research, technology advancements and industrial -applications in the fields that foster the development of LatticeX ecosystem.
- -LatticeX is the vision of large-scale distributed network supporting the expansive economy -activities and broader business applications where users can recognize the sovereignty and privacy -of their own data, and leverage the ecosystem of sophisticated computing technologies to -collaboratively unearth the value of data and benefit from data-value transactions throughout.
- -Yuning Liang, LatticeX Foundation Security Advisor said: “We are so glad to join seL4 foundation. -Hopefully, we can specialise seL4 technology into the web 3.0 domain from cross chain bridge node OS -to hardware wallet OS for improving their security and stability.”
- -- A reminder that you have until Monday 9th of May 2022 to propose a talk - for the seL4 Summit 2022. -
-- -
- -- It is our pleasure to confirm that the seL4 Summit 2022 will be in: -
- -Munich, Germany in the week of Oct 10th, 2022
-- It will be hosted by seL4 Foundation member - Hensoldt Cyber. - It will be a hybrid in-person/online event. - If you'd like to propose a talk to be delivered - remotely, please notify it in the submission. -
- -- Remember that you have until Monday 9th of May 2022 to - propose a talk. -
- -Share your seL4 work
-Share your seL4 experience
-Share your seL4 thoughts
-Share your seL4 questions
-The Linux Foundation has registered seL4® as a trademark in the -United States and other countries. We encourage the use of the -seL4® name and logo in your -work, following the usage rules here.
- -Our second Annual General Meeting (AGM) 6 April 2022. As our membership now is -truly global, covering New Zealand, Australia, China, the Middle East, Central -and Western Europe, the US East, Central and West coasts, there is no time that -is not in the middle of the night for some members. Hence we will hold the AGM -in two sessions:
- -Share your seL4 work
-Share your seL4 experience
-Share your seL4 thoughts
-Share your seL4 questions
-- Check the full Call For Presentations. To propose a - talk, send an abstract of one page or less by Monday 9th of May - 2022 to summit@sel4.systems. -
- -- The seL4 Foundation is excited to have gathered a top notch team of people to - serve as PC members for the seL4 summit - 2022. They come from across the the seL4 ecosystem: users, contributors, - committers, experts, advocates, researchers, and engineers. -
-- Stay tuned for the Call for Presentation soon! -
-- - - -
- -The seL4 Foundation is pleased to welcome Olivier -Engelkes as Hensoldt -Cyber’s new representative on the seL4 Foundation Board.
- -Olivier is Head of Engineering at HENSOLDT Cyber GmbH, premium -member of the seL4 Foundation and Munich-based -company which develops embedded IT products that meet the highest security -requirements, combining an operating system based on verified seL4 with a RISC-V -processor that is protected from supply-chain attacks. Olivier replaces Sascha -Kegreiß as HENSOLDT Cyber’s representative on the seL4 Foundation -Board.
- -The seL4 Foundation is pleased to welcome the UK’s -National Cyber Security Centre (NCSC).
- -The NCSC, the UK’s technical authority on cyber security, uses the seL4 -Microkernel to enforce separation in a number of high-assurance situations. The -government organisation is actively exploring research opportunities to further -develop its seL4 use cases. NCSC Technical Director Dr Ian Levy said: “We’re -pleased to join the seL4 Foundation. seL4 is some of the most highly assured -software and its development plays an important role in the next generation of -high-assurance devices. We support the long-term stability of the seL4 -microkernel ecosystem and are looking at opportunities to develop our use cases -for it.”
- -The seL4 Foundation will be organising the fourth edition of the seL4 Summit, in -October 2022.
- -A Program Committee will be in charge of the technical side (more on that soon) -and an Hosting Team will be in charge of organising the event.
- -We are now calling for bids to be the Host team for the seL4 Summit 2022!
- -Bids should be sent to summit@sel4.systems before 22 February 2022.
- -More information here.
- -The seL4 Foundation has awarded Interim Endorsement to Kry10 as a Trusted -Service Provider.
- -More on our Services, Training and Products page.
- -Each year, DARPA leadership selects the Game Changer program that was the most -impactful in the preceding 10 years.
- -This year, the award goes to HACMS, the High-Assurance Cyber Military Systems -program, which has been instrumental in demonstrating how seL4 can be embedded -in real-world products (unmanned air and ground vehicles) and truly protect them -from cyber attacks.
- -The award was presented by DARPA Director Stefanie Tompkins to the three HACMS -program managers, Kathleen Fisher, John Launchbury, and Ray Richards. We truly -thank all three for their visionary leadership.
- -Our deep thanks to Darren Cofer as well, who masterfully lead the team, made of -Collins, Galois, Boeing, University of MN and the Trustworthy Systems group -(home of seL4 at the time) who demonstrated the technology on Boeing’s Unmanned -Little Bird helicopter, including cyber attacks during flight!
- -A true game changer indeed.
- -We are excited to share that NIO recently unveiled their -seL4-based SkyOS operating system, -designed for Software Defined Vehicles, which they have been working on relentlessly for the past two years. At the -seL4 Summit 2023 Qiyan Wang, NIO’s Global VP of Digital Systems, announced that NIO cars based on seL4 are planned for next year!
- -- The seL4 Microkit, - formerly known as the Core Platform, is an operating system framework on top - of seL4 provides a small set of simple abstractions that ease the design and - implementation of statically structured systems on seL4, while still - leveraging the kernel’s benefits of security and performance. The Microkit is - distributed as an SDK that integrates with the developer’s build system of - choice, significantly reducing the barrier to entry for new users of seL4. -
-- The seL4 Microkit was developed in collaboration between Breakaway Consulting Pty Ltd and Trustworthy Systems, UNSW, and is now - an official seL4 Foundation project, making it - part of the seL4 eco-system. -
- -For the last year, Nick Spinale, funded by the seL4 Foundation, has been -developing support for the Rust programming language in seL4 userspace.
- -Nick has created a comprehensive language support infrastructure that integrates -well with the rest of the seL4 ecosystem (capDL, Microkit, sel4test) and also -integrates well with what Rust programmers would expect from the language side. -This work has now been accepted by the seL4 Foundation -Technical Steering Committee and can be found on -GitHub. Nick’s talk at the recent seL4 -summit is on seL4’s Youtube channel. -A demo system that uses the device driver framework, asynchronous programming in -Rust and library support from the Rust ecosystem to implement a small web server -is available on GitHub.
- -The overall outcome will be to allow people to write safer user-level code on -top of seL4 without needing full formal verification, with a language that is -receiving increasing interest and that aligns extremely well with security and -safety critical embedded systems programming.
- -- Foundation member Proofcraft has - delivered a work - package towards the verification of the MCS variant of seL4. -
- -- Having earlier started the design-to-code refinement proof of MCS seL4, funded - by the Foundation, Proofcraft has now delivered the completion of the proof - framework, setting up all the infrastructure and hierarchy of theorems about - the approximately 500 C functions of the kernel. -
- -- This was made possible by a generous donation from Foundation member XCalibyte, for which the seL4 Foundation is - very grateful. We are looking for further funding that will - allow completion of the verification of the MCS variant. Once verified, MCS - will become the default configuration of seL4, bringing the highest levels of - assurance to mixed-criticality real-time systems. -
- - - -- Videos of the seL4 summit 2023 are now - available on the seL4 - YouTube channel! Links and slides can be found on the summit Program and Abstracts pages. Thanks to - all the speakers for making the seL4 summit 2023 a great success! -
- -The seL4 Foundation is pleased to welcome The University of -Kansas as Associate Member. KU -has collaborated with a number of seL4 Foundation members along the years, -including in the DARPA CASE project, which produced a set of formal methods -tools that can be applied throughout the design and build process to create -seL4-based high-assurance cyber-resilient systems.
- -The seL4 Foundation thanks NIO for sponsoring both the -reception and dinner for the seL4 Summit 2023. NIO -is also a gold sponsor of the summit.
- -Email us at summit@sel4.systems if you are -interested in sponsoring the seL4 summit. More on sponsorship -here.
- -- We are very fortunate to welcome five industry leaders to participate at the - seL4 Summit 2023, in a session OS on - seL4: so many options!. Gapfruit, Kry10, Magnetite (MIT), and UNSW will - present their views on the priorities and vision for their OS on seL4. The - panel will be moderated by Todd Carpenter from Galois. -
- -The seL4 Foundation thanks TII for becoming a Gold -sponsor of the seL4 Summit 2023.
- -The Technology Innovation Institute’s (TII) Secure -Systems Research Centre (SSRC) aims to -drive end-to-end security and resilience in cyber-physical and autonomous -systems that will ensure safety. The research center adopts an applied research -approach, emphasizing practical applications. By employing seL4 as both a -microkernel and a hypervisor, SSRC seamlessly aligns its dedication to security -with the foundational technology crucial to achieving its objectives. This -critical technology forms the cornerstone of secure software stacks for diverse -edge devices, including secure communicators and drones. TII’s research not only -contributes to but propels the evolution of cutting-edge high-end edge device -environments. TII’s SSRC focus centers on resilience, isolation, trust, and -security, all with the intention of fostering a more secure digital landscape.
- -Email us at summit@sel4.systems if you are -interested in sponsoring the seL4 summit. More on sponsorship -here.
- -The seL4 Foundation thanks Kry10 for becoming a Gold -sponsor of the seL4 Summit 2023.
- -Kry10 offers a full-featured operating system on top of the seL4 kernel, along -with tooling, services, key management and more. The Kry10 Platform is a fast -and easy way to build highly secure, next-generation cyber-physical devices. It -leverages the verification of seL4 to provide a secure, self-healing, truly -dynamic system with minimal downtime, even during upgrades.
- -Kry10 is an Endorsed Service Provider of the seL4 -Foundation, offering support to enable seL4-based secure projects to be -affordable, maintainable, and remotely manageable.
- -See here if you are -interested in sponsoring the seL4 summit 2023.
- -The seL4 Foundation thanks NIO for becoming our first -Gold sponsor of the seL4 Summit 2023.
- -NIO is a global EV company funded in 2015 and that went -public in the U.S. in 2018. NIO emphasizes user experience and technology -innovation. NIO is a strong supporter of seL4 and a premium member of the seL4 -Foundation. It has been investing heavily on building a full-fledge software -platform for modern vehicles based on seL4.
- -See here if you are -interested in sponsoring the seL4 summit 2023.
- -The seL4 Foundation thanks Collins Aerospace -for becoming a Silver sponsor of the seL4 Summit 2023.
- -Collins Aerospace, part of seL4 Foundation -member Raytheon Technologies, has been a long-time core -participant in the seL4 ecosystem. It was a prime contractor in the DARPA HACMS -program, which demonstrated the seL4-based incremental cyber retrofit of -autonomous military vehicles. This was a major milestone in the growth of seL4, -demonstrating that it protects against cyber attacks on real systems in -operation. The same team also led the follow-on DARPA CASE program, aiming at -designed-in cyber-resiliency, including the seL4-based framework for verified -initialisation and configuration of systems architectures.
- -The seL4 Summit 2023 will take place in -Minneapolis, home town of this Collins Aerospace team involved in seL4.
- -See here if you are -interested in sponsoring the seL4 summit 2023.
- -- Have a look at the program of - the seL4 summit 2023! We have a great - line-up of interesting seL4 work, with a combination of technical research and - development, experience reports of seL4 in the field, technical discussions - and birds-of-a-feather sessions, as well as a training session on getting - started with seL4. -
-- - - -
- -- We are pleased to announce that the two keynotes for the seL4 summit 2023 - will be Gage from NCSC and Sam Leffler from Google! Gage will talk about Scoping assurance activities with seL4 - and Sam about CantripOS: An OS for Ambient ML - Applications. -
- - - -- Gage is an Assurance Lead in NCSC with expertise in - cryptography, software assurance and verification. He is part of a larger - team that seeks to provide assurance and articulate risk for a wide range of - products and customers. Whilst he is not a product developer himself, he has - been responsible for presenting assurance cases for products that rely on - seL4 to uphold security requirements. -
-- Sam Leffler has worked at Google for nearly 15 years. He - was part of the original team that developed ChromeOS and the ChromeBook, - was responsible for the networking components of Project Loon, and worked on - various infrastructure projects before joining Project Sparrow to help build - the CantripOS embedded operating system. Prior to joining Google he was an - independent contractor focused on wireless networking and operating systems. - Before contracting he worked for VMware, Silicon Graphics, Pixar, Lucasfilm, - and the Computer System Research Group (CSR) at UC Berkeley where he was - responsible for the 4.2BSD release of the UNIX operating system. At CSRG he - co-designed and implemented many of the facilities found in contemporary - UNIX systems including sockets, networking support (IP/TCP), reliable - signals, and more. -
-We are pleased to have Galois now part of the seL4 -Foundation, following its acquisition of Adventium labs, which has been a -member since 2020 and user of seL4 technologies for -years before that. Galois develops technology to guarantee the trustworthiness -of systems where failure is unacceptable. They apply cutting edge computer -science and mathematics to advance the state of the art in software and hardware -trustworthiness. The seL4 Foundation looks forward to our continuing -collaboration.
- -The seL4 summit 2023 will be held in Minneapolis, -USA, 19 - 21 September 2023.
- -The seL4 summit will cover the complete seL4 ecosystem, consisting of the -verified microkernel, as well as all seL4-related technology, tools, -infrastructure, products, projects, and people.
- -Tickets include:
- -The early bird cut-off date is 18 August 2023.
- -The 2022 ACM Software System Award -recognises seL4 as the first industrial-strength, high-performance operating -system to have been the subject of a complete, mechanically-checked proof of -full functional correctness, proofs of enforcement of the core security -properties of integrity and confidentiality, a proof to the binary code of the -kernel, and the first sound and complete worst-case execution-time analysis of a -protected mode OS.
- -The award, recognising the development of a software system that has had a -lasting influence, goes to Gernot Heiser, University of New South Wales; Gerwin -Klein, Proofcraft; Harvey Tuch, Google; Kevin Elphinstone, University of New -South Wales; June Andronick, Proofcraft; David Cock, ETH Zurich; Philip Derrin, -Qualcomm; Dhammika Elkaduwe, University of Peradeniya; Kai Engelhardt; Toby -Murray, University of Melbourne; Rafal Kolanski, Proofcraft; Michael Norrish, -Australian National University; Thomas Sewell, University of Cambridge; and -Simon Winwood, Galois.
- -We are committed to make sure that seL4’s recognised “lasting influence” live on -for the decades ahead!
- -The seL4 Summit 2023 will be held 19 - 21 -September 2023 at the Elliot Park Hotel, -Minneapolis, USA.
- -The summit will be hosted by the Linux Foundation, and will be an in-person -event.
- -Registration details to follow soon!
- -Remember that you have until 24 April 2022 to propose a talk. -To propose a talk, upload an abstract of one page or less to the submission -portal.
- -The seL4 Foundation welcomes the Autoware Foundation as -a member.
- -The Autoware Foundation hosts the Autoware Project, the world’s leading -open-source software project for autonomous driving.
- -As a member of the seL4 Foundation, the Autoware Foundation will work with -members of the seL4 Foundation to implement a safe and secure Autonomous Driving -software stack based on Autoware, leveraging the formally-verified and -mixed-criticality capabilities of seL4.
- -- Check the full Call For - Presentations. To propose a talk, upload an abstract of one page or less - by 10 April 2023 to the submission portal. -
- -- We are thrilled to announce our program committee for the seL4 Summit 2023. Our awesome team comes - from various parts of the seL4 ecosystem: users, contributors, committers, - experts, advocates, researchers, and engineers. -
- -- It is our pleasure to confirm that the seL4 Summit 2023 will be in: -
-
-
- The summit will be hosted by the Linux Foundation, and will be an
- in-person event.
-
- We will announce a Call for Presentations in the coming weeks. Stay tuned! -
- -- The seL4 Foundation thanks Kry10 for - becoming a Gold sponsor of the seL4 - Summit 2024. -
-- Kry10 offers a full-featured operating system on top of the seL4 kernel, along - with tooling, services, key management and more. The Kry10 Platform is a fast - and easy way to build highly secure, next-generation cyber-physical devices. It - leverages the verification of seL4 to provide a secure, self-healing, truly - dynamic system with minimal downtime, even during upgrades. - -
-- Kry10 is an Endorsed Service Provider of the seL4 - Foundation, offering support to enable seL4-based secure projects to be - affordable, maintainable, and remotely manageable. -
-- See here - if you are interested in sponsoring the seL4 summit 2024. -
- -- The seL4 Foundation thanks Collins Aerospace for - becoming a Bronze sponsor of the seL4 - Summit 2024. -
-- Collins Aerospace, part of seL4 Foundation - member Raytheon Technologies, has been a long-time core - participant in the seL4 ecosystem. - It was a prime contractor in the DARPA HACMS - program, which demonstrated the seL4-based incremental cyber retrofit of - autonomous military vehicles. This was a major milestone in the growth of seL4, - demonstrating that it protects against cyber attacks on real systems in - operation. The same team also led the follow-on DARPA CASE program, aiming at - designed-in cyber-resiliency, including the seL4-based framework for verified - initialisation and configuration of systems architectures. -
-- Collins Aerospace is now leading the INSPECTA team as part of DARPA's PROVERS program, which aims at developing formal methods tools to guide software engineers through designing proof-friendly software systems and reduce the proof repair workload. -
-- See here - if you are interested in sponsoring the seL4 summit 2024. -
- - -- The seL4 Foundation thanks TII for - becoming a Bronze sponsor of the seL4 - Summit 2024. -
-- The Technology Innovation Institute’s (TII) Secure Systems Research Centre (SSRC) aims to drive end-to-end security and resilience in cyber-physical and autonomous systems that will ensure safety. The research center adopts an applied research approach, emphasizing practical applications. By employing seL4 as both a microkernel and a hypervisor, SSRC seamlessly aligns its dedication to security with the foundational technology crucial to achieving its objectives. This critical technology forms the cornerstone of secure software stacks for diverse edge devices, including secure communicators and drones. TII’s research not only contributes to but propels the evolution of cutting-edge high-end edge device environments. TII’s SSRC focus centers on resilience, isolation, trust, and security, all with the intention of fostering a more secure digital landscape. -
-- See here - if you are interested in sponsoring the seL4 summit 2024. -
- - - -- This year marks a very special seL4 day anniversary. -
-- 20 years ago, the L4.verified project started, with the ambitious aim to formally verify an entire microkernel of - the L4 family. seL4 was born. -
-- 15 years ago, on the 29th of July 2009, the original functional correctness proof of seL4 was completed, a - widely-recognised research breakthrough and the first big milestone in seL4's history. -
-- 10 years ago, on the 29th of July 2014, seL4 was open-sourced, an instrumental step towards its adoption in a number - of sectors. -
-- To celebrate these key anniversaries, a special panel will gather at the seL4 - summit 2024 to reflect on the journey over the past 20 years and discuss the future ahead. Stay tuned for more - info. -
-- -
-It’s been a long time coming – we’re pleased to announce the release of
- -Microkit 1.3.0 and rust-sel4-1.0.0 are the first official releases under the -seL4 foundation.
- -Enjoy!
- -- Have a look at the program of the seL4 summit 2024. - We have a great line-up of interesting seL4 work, with a combination of - technical research and development, experience reports of seL4 in the field, - technical discussions and birds-of-a-feather sessions. -
-
- Program at a glance. Go to the full program.
-
-
-
-
- We are pleased to announce that the two keynotes for the seL4 summit 2024 - will be Darren Cofer from - Collins Aerospace and - Ning Qu from - NIO. Darren will talk - about Industrial - Scale Proof Engineering for Critical Trustworthy Applications (INSPECTA) - and Ning about seL4 - in Software-Defined Vehicles: Vision, Roadmap, and Impact at NIO. -
-- - Darren Cofer is a Principal Fellow at Collins Aerospace. He - earned his PhD in Electrical and Computer Engineering from The University of - Texas at Austin. His area of expertise is developing and applying advanced - analysis methods and tools for verification and certification of - high-integrity systems. His background includes work with formal methods for - system and software analysis, the design of real-time embedded systems for - safety-critical applications, and the development of nuclear propulsion - systems in the U.S. Navy. Dr. Cofer has served as principal investigator on - many government-sponsored research programs, developing and using formal - methods for verification of safety and security properties. He served on - RTCA committee SC-205 developing new certification guidance for airborne - software (DO-178C) and was one of the developers of the Formal Methods - Supplement (DO-333). He is currently a member of SAE committee G-34 - developing certification guidance for the use of machine learning - technologies onboard aircraft. -
-- - Ning Qu is a veteran in the autonomous driving industry and - a seasoned technical leader with extensive experience in operating systems, - high-performance runtime frameworks, and hardware-software co-design. - Currently, Ning serves as the Senior Director of the SkyOS team at NIO, - where he spearheads the development of SkyOS—a comprehensive suite of - platform software (including hypervisor, operating systems, and middleware) - for Software Defined Vehicles, showcased at NIO IN 2023. Before joining NIO, - Ning managed Waymo's ML Runtime team, playing a pivotal role in SF - Rider-only driverless launch on the Jaguar EV. At Baidu, he built the Apollo - OS from the ground up, establishing the foundation for the Apollo project. - Notably, he architected and developed Cyber RT and led Baidu's fully - driverless launch in 2020. Ning holds a B.S. and Ph.D. from Peking - University and has served as a researcher at CMU. -
-- The seL4 Foundation thanks UNSW Sydney for - becoming a Bronze sponsor of the seL4 - Summit 2024. -
-- seL4 was created by the Trustworthy - Systems (TS) team, which is now part of the UNSW, a founding member of the seL4 Foundation. -
-- The team has a track record of designing and implementing systems software for - performance and reliability, and using rigorous formal methods to prove that - they meet their security and reliability goals. Their aims are to: -
-- The team works with government and commercial partners, as well as the broader - software engineering community, to drive this change. -
-- The seL4 Summit 2024 will take place - in Sydney, the hometown of Trustworthy - Systems and UNSW. -
-- See here - if you are interested in sponsoring the seL4 summit 2024. -
- -- The seL4 Foundation thanks Proofcraft - for becoming a Bronze sponsor of the seL4 - Summit 2024. -
-- Founded by the seL4 verification leaders, Proofcraft offers commercial support, - verification projects, training and consulting on formal verification in - general, and involving seL4 specifically. By applying mathematical - machine-checked software verification, Proofcraft increases critical software - systems' reliability, safety and security, for a verified future. -
-- The seL4 Summit 2024 will take place - in Sydney, the hometown of Proofcraft. -
-- See here - if you are interested in sponsoring the seL4 summit 2024. -
- - -The seL4 summit 2024 will be held in Sydney, -Australia, 15-17 October 2024.
- -The seL4 summit will cover the complete seL4 ecosystem, consisting of the -verified microkernel, as well as all seL4-related technology, tools, -infrastructure, products, projects, and people.
- -Tickets include:
- -The early bird cut-off date is 15 September 2024.
- -Local seL4 Sydney-siders will look into organising some informal activities for -Monday 14 October 2024, before the summit kicks off, for anyone who wants to -join. Gernot may also organise a bush walk for the weekend before the summit. -Stayed tuned for more info!
- -The seL4 Foundation is pleased to welcome Apple as our -latest member.
- -We are excited to see their interest in seL4 and look forward to seeing their -work with seL4.
- -We are extremely pleased to announce that the functional correctness proof for -seL4 on the 64-bit Arm architecture (AArch64) is complete!
- -We congratulate to our member Proofcraft for this -great achievement, which marks a major milestone in the development of the seL4 -microkernel and its ecosystem.
- -We also would like to express our immense gratitude to UK’s National Cyber -Security Centre (NCSC) for funding this work, which -is of great importance for the seL4 ecosystem.
- -For more information check Proofcraft’s news item.
- -- Check the full Call For - Presentations. To propose a talk, upload an abstract of one page or less - by 22 April 2024 to the - submission portal. -
-- Also note the open - invitation for a 5-minute slot to talk about your seL4 deployment. -
- -- We are thrilled to announce our program committee for the seL4 Summit 2024. - Our awesome team comes - from various parts of the seL4 ecosystem: users, contributors, committers, - experts, advocates, researchers, and engineers. -
- -- It is our pleasure to confirm that the - seL4 Summit 2024 will be in: -
-- Sydney, Australia, 15-17 Oct 2024. -
-- We look forward to welcoming the community in the birthplace of seL4. -
-- We will announce a Call for Presentations in the coming weeks. Stay tuned! -
-- The seL4 Foundation thanks Kry10 for - becoming a Gold sponsor of the seL4 - Summit 2024. -
-- Kry10 offers a full-featured operating system on top of the seL4 kernel, along - with tooling, services, key management and more. The Kry10 Platform is a fast - and easy way to build highly secure, next-generation cyber-physical devices. It - leverages the verification of seL4 to provide a secure, self-healing, truly - dynamic system with minimal downtime, even during upgrades. - -
-- Kry10 is an Endorsed Service Provider of the seL4 - Foundation, offering support to enable seL4-based secure projects to be - affordable, maintainable, and remotely manageable. -
-- See here - if you are interested in sponsoring the seL4 summit 2024. -
- -- The seL4 Foundation thanks Collins Aerospace for - becoming a Bronze sponsor of the seL4 - Summit 2024. -
-- Collins Aerospace, part of seL4 Foundation - member Raytheon Technologies, has been a long-time core - participant in the seL4 ecosystem. - It was a prime contractor in the DARPA HACMS - program, which demonstrated the seL4-based incremental cyber retrofit of - autonomous military vehicles. This was a major milestone in the growth of seL4, - demonstrating that it protects against cyber attacks on real systems in - operation. The same team also led the follow-on DARPA CASE program, aiming at - designed-in cyber-resiliency, including the seL4-based framework for verified - initialisation and configuration of systems architectures. -
-- Collins Aerospace is now leading the INSPECTA team as part of DARPA's PROVERS program, which aims at developing formal methods tools to guide software engineers through designing proof-friendly software systems and reduce the proof repair workload. -
-- See here - if you are interested in sponsoring the seL4 summit 2024. -
- - -- The seL4 Foundation thanks TII for - becoming a Bronze sponsor of the seL4 - Summit 2024. -
-- The Technology Innovation Institute’s (TII) Secure Systems Research Centre (SSRC) aims to drive end-to-end security and resilience in cyber-physical and autonomous systems that will ensure safety. The research center adopts an applied research approach, emphasizing practical applications. By employing seL4 as both a microkernel and a hypervisor, SSRC seamlessly aligns its dedication to security with the foundational technology crucial to achieving its objectives. This critical technology forms the cornerstone of secure software stacks for diverse edge devices, including secure communicators and drones. TII’s research not only contributes to but propels the evolution of cutting-edge high-end edge device environments. TII’s SSRC focus centers on resilience, isolation, trust, and security, all with the intention of fostering a more secure digital landscape. -
-- See here - if you are interested in sponsoring the seL4 summit 2024. -
- - - -- This year marks a very special seL4 day anniversary. -
-- 20 years ago, the L4.verified project started, with the ambitious aim to formally verify an entire microkernel of - the L4 family. seL4 was born. -
-- 15 years ago, on the 29th of July 2009, the original functional correctness proof of seL4 was completed, a - widely-recognised research breakthrough and the first big milestone in seL4's history. -
-- 10 years ago, on the 29th of July 2014, seL4 was open-sourced, an instrumental step towards its adoption in a number - of sectors. -
-- To celebrate these key anniversaries, a special panel will gather at the seL4 - summit 2024 to reflect on the journey over the past 20 years and discuss the future ahead. Stay tuned for more - info. -
-- -
-It’s been a long time coming – we’re pleased to announce the release of
- -Microkit 1.3.0 and rust-sel4-1.0.0 are the first official releases under the -seL4 foundation.
- -Enjoy!
- -- Have a look at the program of the seL4 summit 2024. - We have a great line-up of interesting seL4 work, with a combination of - technical research and development, experience reports of seL4 in the field, - technical discussions and birds-of-a-feather sessions. -
-
- Program at a glance. Go to the full program.
-
-
-
-
- We are pleased to announce that the two keynotes for the seL4 summit 2024 - will be Darren Cofer from - Collins Aerospace and - Ning Qu from - NIO. Darren will talk - about Industrial - Scale Proof Engineering for Critical Trustworthy Applications (INSPECTA) - and Ning about seL4 - in Software-Defined Vehicles: Vision, Roadmap, and Impact at NIO. -
-- - Darren Cofer is a Principal Fellow at Collins Aerospace. He - earned his PhD in Electrical and Computer Engineering from The University of - Texas at Austin. His area of expertise is developing and applying advanced - analysis methods and tools for verification and certification of - high-integrity systems. His background includes work with formal methods for - system and software analysis, the design of real-time embedded systems for - safety-critical applications, and the development of nuclear propulsion - systems in the U.S. Navy. Dr. Cofer has served as principal investigator on - many government-sponsored research programs, developing and using formal - methods for verification of safety and security properties. He served on - RTCA committee SC-205 developing new certification guidance for airborne - software (DO-178C) and was one of the developers of the Formal Methods - Supplement (DO-333). He is currently a member of SAE committee G-34 - developing certification guidance for the use of machine learning - technologies onboard aircraft. -
-- - Ning Qu is a veteran in the autonomous driving industry and - a seasoned technical leader with extensive experience in operating systems, - high-performance runtime frameworks, and hardware-software co-design. - Currently, Ning serves as the Senior Director of the SkyOS team at NIO, - where he spearheads the development of SkyOS—a comprehensive suite of - platform software (including hypervisor, operating systems, and middleware) - for Software Defined Vehicles, showcased at NIO IN 2023. Before joining NIO, - Ning managed Waymo's ML Runtime team, playing a pivotal role in SF - Rider-only driverless launch on the Jaguar EV. At Baidu, he built the Apollo - OS from the ground up, establishing the foundation for the Apollo project. - Notably, he architected and developed Cyber RT and led Baidu's fully - driverless launch in 2020. Ning holds a B.S. and Ph.D. from Peking - University and has served as a researcher at CMU. -
-- The seL4 Foundation thanks UNSW Sydney for - becoming a Bronze sponsor of the seL4 - Summit 2024. -
-- seL4 was created by the Trustworthy - Systems (TS) team, which is now part of the UNSW, a founding member of the seL4 Foundation. -
-- The team has a track record of designing and implementing systems software for - performance and reliability, and using rigorous formal methods to prove that - they meet their security and reliability goals. Their aims are to: -
-- The team works with government and commercial partners, as well as the broader - software engineering community, to drive this change. -
-- The seL4 Summit 2024 will take place - in Sydney, the hometown of Trustworthy - Systems and UNSW. -
-- See here - if you are interested in sponsoring the seL4 summit 2024. -
- -- The seL4 Foundation thanks Proofcraft - for becoming a Bronze sponsor of the seL4 - Summit 2024. -
-- Founded by the seL4 verification leaders, Proofcraft offers commercial support, - verification projects, training and consulting on formal verification in - general, and involving seL4 specifically. By applying mathematical - machine-checked software verification, Proofcraft increases critical software - systems' reliability, safety and security, for a verified future. -
-- The seL4 Summit 2024 will take place - in Sydney, the hometown of Proofcraft. -
-- See here - if you are interested in sponsoring the seL4 summit 2024. -
- - -The seL4 summit 2024 will be held in Sydney, -Australia, 15-17 October 2024.
- -The seL4 summit will cover the complete seL4 ecosystem, consisting of the -verified microkernel, as well as all seL4-related technology, tools, -infrastructure, products, projects, and people.
- -Tickets include:
- -The early bird cut-off date is 15 September 2024.
- -Local seL4 Sydney-siders will look into organising some informal activities for -Monday 14 October 2024, before the summit kicks off, for anyone who wants to -join. Gernot may also organise a bush walk for the weekend before the summit. -Stayed tuned for more info!
- -The seL4 Foundation is pleased to welcome Apple as our -latest member.
- -We are excited to see their interest in seL4 and look forward to seeing their -work with seL4.
- -We are extremely pleased to announce that the functional correctness proof for -seL4 on the 64-bit Arm architecture (AArch64) is complete!
- -We congratulate to our member Proofcraft for this -great achievement, which marks a major milestone in the development of the seL4 -microkernel and its ecosystem.
- -We also would like to express our immense gratitude to UK’s National Cyber -Security Centre (NCSC) for funding this work, which -is of great importance for the seL4 ecosystem.
- -For more information check Proofcraft’s news item.
- -- Check the full Call For - Presentations. To propose a talk, upload an abstract of one page or less - by 22 April 2024 to the - submission portal. -
-- Also note the open - invitation for a 5-minute slot to talk about your seL4 deployment. -
- -- We are thrilled to announce our program committee for the seL4 Summit 2024. - Our awesome team comes - from various parts of the seL4 ecosystem: users, contributors, committers, - experts, advocates, researchers, and engineers. -
- -- It is our pleasure to confirm that the - seL4 Summit 2024 will be in: -
-- Sydney, Australia, 15-17 Oct 2024. -
-- We look forward to welcoming the community in the birthplace of seL4. -
-- We will announce a Call for Presentations in the coming weeks. Stay tuned! -
-