论文标题

具有端到端数据完整性的验证文件系统的设计和实现

The Design and Implementation of a Verified File System with End-to-End Data Integrity

论文作者

Song, Daniel W., Mamouras, Konstantinos, Chen, Ang, Dautenhahn, Nathan, Wallach, Dan S.

论文摘要

尽管进行了重大的研究和工程工作,但当今许多重要的计算机系统都遭受了错误。为了提高软件系统的可靠性,最近的工作应用了正式验证来证明此类系统的正确性,最近的成功包括经过认证的文件系统和经过认证的加密协议,尽管使用了完全不同的证明策略和工具链。为了统一这些概念,我们提出了第一个使用加密原语的认证文件系统来保护自己免受篡改。我们的经过认证的文件系统会防御可能希望篡改原始磁盘的对手。这样的“不受信任的存储”威胁模型捕获了存储设备的行为,这些存储设备可能会默默地返回错误的位,以及可能在运输中访问磁盘的对手。在本文中,我们介绍IFSCQ,这是一个具有强大完整性保证的认证加密文件系统。 IFSCQ结合并扩展了加密文件系统和正式认证的文件系统的工作,以证明我们的设计正确。这是第一个证明的文件系统,可抵抗强大的对手,可能会恶意损坏盘中数据和元数据,包括试图将磁盘滚动到早期版本的有效数据。 IFSCQ通过构造整个磁盘的默克散布树来实现这一目标,并证明篡改磁盘块将始终被检测到,如果出现它们。我们证明,IFSCQ在检测几种攻击时以合理的开销运行。

Despite significant research and engineering efforts, many of today's important computer systems suffer from bugs. To increase the reliability of software systems, recent work has applied formal verification to certify the correctness of such systems, with recent successes including certified file systems and certified cryptographic protocols, albeit using quite different proof tactics and toolchains. Unifying these concepts, we present the first certified file system that uses cryptographic primitives to protect itself against tampering. Our certified file system defends against adversaries that might wish to tamper with the raw disk. Such an "untrusted storage" threat model captures the behavior of storage devices that might silently return erroneous bits as well as adversaries who might have limited access to a disk, perhaps while in transit. In this paper, we present IFSCQ, a certified cryptographic file system with strong integrity guarantees. IFSCQ combines and extends work on cryptographic file systems and formally certified file systems to prove that our design is correct. It is the first certified file system that is secure against strong adversaries that can maliciously corrupt on-disk data and metadata, including attempting to roll back the disk to earlier versions of valid data. IFSCQ achieves this by constructing a Merkle hash tree of the whole disk, and by proving that tampered disk blocks will always be detected if they ever occur. We demonstrate that IFSCQ runs with reasonable overhead while detecting several kinds of attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源