Join Nostr
2025-11-23 18:00:57 UTC
in reply to

Karl Auerbach on Nostr: Long ago (1970s) our group at SDC was working on formal verification of our security ...

Long ago (1970s) our group at SDC was working on formal verification of our security kernels and - at least we tried - network security protocol.

(Our group included some early luminaries - Val Schore, Jan Garwick, John Scheid, Marv Schaeffer, Hillary Ormand - and later on Whit Diffie as a consultant.)

We had to design and code according to patterns and inject a kind of assertion language into the code. (Pascal language.) The verification was to try to see whether that conformed to "the criteria".

Turns out that coming up with the criteria against which to prove that the code conforms with the criteria is really, really hard, even for simple security models because one has to deal with things like low frequency data channels - like signalling (a potential security leak) by modulation of things like virtual memory paging or processor caches. We had to exclude channels < 300 bits/second, even knowing that that's a pretty wide channel.