<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Kernel Security, Isolation, and Verification (KISV) Workshop on KISV Workshop</title>
    <link>https://kisv-workshop.github.io/</link>
    <description>Recent content in Kernel Security, Isolation, and Verification (KISV) Workshop on KISV Workshop</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language><atom:link href="https://kisv-workshop.github.io/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Organizers</title>
      <link>https://kisv-workshop.github.io/organizers/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>https://kisv-workshop.github.io/organizers/</guid>
      <description>Anton Burtsev, University of Utah
Vikram Narayanan, Palo Alto Networks
Program Committee Nathan Burow, MIT Lincoln Laboratory
Nathan Dautenhahn, Rice University
Amit Levy, Princeton University
Pierre Olivier, University of Manchester
Dan Williams Virginia Tech
Gerd Zellweger, Feldera</description>
      <content:encoded><![CDATA[<ul>
<li>
<p><strong>Anton Burtsev</strong>, University of Utah</p>
</li>
<li>
<p><strong>Vikram Narayanan</strong>, Palo Alto Networks</p>
</li>
</ul>
<h2 id="program-committee">Program Committee</h2>
<ul>
<li>
<p><strong>Nathan Burow</strong>, MIT Lincoln Laboratory</p>
</li>
<li>
<p><strong>Nathan Dautenhahn</strong>, Rice University</p>
</li>
<li>
<p><strong>Amit Levy</strong>, Princeton University</p>
</li>
<li>
<p><strong>Pierre Olivier</strong>, University of Manchester</p>
</li>
<li>
<p><strong>Dan Williams</strong> Virginia Tech</p>
</li>
<li>
<p><strong>Gerd Zellweger</strong>, Feldera</p>
</li>
</ul>
]]></content:encoded>
    </item>
    
    <item>
      <title>Organizers (2023)</title>
      <link>https://kisv-workshop.github.io/archive/2023/organizers/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>https://kisv-workshop.github.io/archive/2023/organizers/</guid>
      <description>Anton Burtsev, University of Utah
Vikram Narayanan, University of Utah
Program Committee Nathan Burow, MIT Lincoln Laboratory
Nathan Dautenhahn, Rice University
Trent Jaeger, Pennsylvania State University
Shravan Narayan, University of Texas, Austin
Ruslan Nikolaev, Pennsylvania State University
Pierre Olivier, University of Manchester
Gerd Zellweger, VMware Research</description>
      <content:encoded><![CDATA[<p><strong>Anton Burtsev</strong>, University of Utah</p>
<p><strong>Vikram Narayanan</strong>, University of Utah</p>
<h2 id="program-committee">Program Committee</h2>
<p>Nathan Burow, MIT Lincoln Laboratory</p>
<p>Nathan Dautenhahn, Rice University</p>
<p>Trent Jaeger, Pennsylvania State University</p>
<p>Shravan Narayan, University of Texas, Austin</p>
<p>Ruslan Nikolaev, Pennsylvania State University</p>
<p>Pierre Olivier, University of Manchester</p>
<p>Gerd Zellweger, VMware Research</p>
]]></content:encoded>
    </item>
    
    <item>
      <title>Program</title>
      <link>https://kisv-workshop.github.io/archive/2024/program/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>https://kisv-workshop.github.io/archive/2024/program/</guid>
      <description>November 3, 2024
13:00 - 13:05	Opening remarks
13:05 - 14:10	Keynote 1 by Deian Stefan (UCSD). Verus Using light-weight verification to secure the WebAssembly sandbox
14:10 - 14:30	Robust and Immediate Resource Reclamation with M³. Viktor Reusch (Barkhausen Institut), Nils Asmussen (Barkhausen Institut), Michael Roitzsch (Barkhausen Institut)
14:30 - 14:50	Kicking the Firmware Out of the TCB with the Miralis Virtual Firmware Monitor. Charly Castes (EPFL), Neelu S. Kalani (EPFL), Sofia Saltovskaia (EPFL), Noé Terrier (EPFL), Abel Vexina Wilkinson (EPFL), Edouard Bugnion (EPFL)</description>
      <content:encoded><![CDATA[<style>
.box {
    border-radius: 0.5em;
    background-color: #f0f0f0;
}

.dark .box {
    border-radius: 0.5em;
    background-color: #202325;
}

.important {
    text-align: center;
    padding-top: 1em;
    padding-bottom: 1em;
    line-height: 120%;
    font-size: 100%;
    margin: 0 auto;
}

.width50 {
    width: 90%;
}
</style>
<p><em>November 3, 2024</em></p>
<ul>
<li>
<p><strong>13:00 - 13:05</strong>	Opening remarks</p>
</li>
<li>
<p><strong>13:05 - 14:10</strong>	<strong>Keynote 1</strong> by Deian Stefan (UCSD). <strong>Verus Using
light-weight verification to secure the WebAssembly sandbox</strong></p>
</li>
<li>
<p><strong>14:10 - 14:30</strong>	<strong>Robust and Immediate Resource Reclamation with M³.</strong>
Viktor Reusch (Barkhausen Institut), Nils Asmussen (Barkhausen Institut),
Michael Roitzsch (Barkhausen Institut)</p>
</li>
<li>
<p><strong>14:30 - 14:50</strong>	<strong>Kicking the Firmware Out of the TCB with the Miralis
Virtual Firmware Monitor.</strong> Charly Castes (EPFL), Neelu S. Kalani (EPFL),
Sofia Saltovskaia (EPFL), Noé Terrier (EPFL), Abel Vexina Wilkinson (EPFL),
Edouard Bugnion (EPFL)</p>
</li>
<li>
<p><strong>14:50 - 15:10</strong> 	<strong>Bridge: A Leak-Free Hardware-Software Architecture
for Parallel Embedded Systems.</strong> Gongqi Huang (Princeton University), Leon
Schuermann (Princeton University), Amit Levy (Princeton University)</p>
</li>
<li>
<p><strong>15:10 - 15:30</strong> 	<strong>Veld: Verified Linux Drivers.</strong> Xiangdong Chen
(University of Utah), Zhaofeng Li (University of Utah), Jerry Zhang
(University of Utah), Anton Burtsev (University of Utah)</p>
</li>
</ul>
<p><strong><p style="text-align: center;">15:30 - 16:00	Coffee break (Overlaps with SOSP)</p></strong></p>
<ul>
<li><strong>16:00 - 17:00</strong> 	<strong>Keynote 2</strong> by Anish Athalye (MIT). <strong>Formally
Verifying Secure and Leakage-Free Systems: From Application
Specification to Circuit-Level Implementation.</strong></li>
</ul>
]]></content:encoded>
    </item>
    
    <item>
      <title>Program</title>
      <link>https://kisv-workshop.github.io/program/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>https://kisv-workshop.github.io/program/</guid>
      <description>October 13, 2025
9:00 - 9:05	Opening remarks Anton Burtsev and Pierre Olivier
9:05 - 10:05	Keynote 1: Why change the kernel when you have seL4? Gernot Heiser (University of New South Wales)
Abstract Breaking up monetlithic kernels (which I take means Linux) is no doubt a commendable exercise. Recent additions to computer architectures that provide intra-address-space protection are an enabler of this and come with relatively low overhead.</description>
      <content:encoded><![CDATA[<style>
.box {
    border-radius: 0.5em;
    background-color: #f0f0f0;
}

.dark .box {
    border-radius: 0.5em;
    background-color: #202325;
}

.important {
    text-align: center;
    padding-top: 1em;
    padding-bottom: 1em;
    line-height: 120%;
    font-size: 100%;
    margin: 0 auto;
}

.width50 {
    width: 90%;
}
</style>
<p><em>October 13, 2025</em></p>
<ul>
<li>
<p><strong>9:00 - 9:05</strong>	<strong>Opening remarks</strong> Anton Burtsev and Pierre Olivier</p>
</li>
<li>
<p><strong>9:05 - 10:05</strong>	<strong>Keynote 1: Why change the kernel when you have seL4?</strong>
Gernot Heiser (University of New South Wales)</p>
</li>
</ul>
<p><span style="font-size:90%"><strong>Abstract</strong> Breaking up monetlithic kernels (which
I take means Linux) is no doubt a commendable exercise. Recent additions to
computer architectures that provide intra-address-space protection are an
enabler of this and come with relatively low overhead.</p>
<p><span style="font-size:90%"> While interesting for exploring the design space,
these mechanisms have drawbacks, especially as using them limits a design to
recent processors.  Furthermore, they are not standardised across
architectures, making it more difficult to keep kernel code mostly portable.</p>
<p><span style="font-size:90%">But are these really necessary?  I argue they are
not, and the combination of good old dual-mode execution paired with page-based
virtual memory is all you need &mdash;  as long as you pick the right design. And
the right design got to be based on a microkernel, or rather The Microkernel,
i.e. seL4.</p>
<p><span style="font-size:90%">There are never-dying claims that this leads to
poor design. Our experience shows otherwise: kernel overheads are in the noise
with a highly-tuned microkernel and a good design.</p>
<p><span style="font-size:90%">Consequently, my recommendation is to avoid dealing
with fancy hardware extensions, and (a) de-privilege the (Linux) kernel by
running it on seL4 and (b) modularise the resulting user-mode code.</p>
<ul>
<li>
<p><strong>10:05am - 10:25am</strong> <strong>OS Kernel Isolation for Context-violation Bugs.</strong>
Yosuke Tanimoto, Hiroshi Yamada (TUAT)</p>
</li>
<li>
<p><strong>10:25am - 10:45am</strong> <strong>reInstruct: Toward OS-aware CPU microcode
reprogramming.</strong>
Yubo Wang, Ruslan Nikolaev (The Pennsylvania State University); Binoy Ravindran
(Virginia Tech)</p>
</li>
</ul>
<p><strong><p style="text-align: center;">10:45am - 11:15am	Coffee break</p></strong></p>
<ul>
<li><strong>11:15am - 12:15pm</strong> <strong>Keynote 2: CHERI: Opening a new design space for
operating systems.</strong> David Chisnall (University of Cambridge)</li>
</ul>
<p><span style="font-size:90%"><strong>Abstract</strong> The CHERI project began 15 years ago,
with a goal of enabling fine-grained compartmentalisation within a process.  It
rapidly became clear that fine-grained compartmentalisation required safe
sharing, and the only way to do sharing safely was to use existing
programming-language abstractions to represent the model.  This observation
made us extend CHERI to be able to support object-granularity memory safety
within a single security context, thereby enabling safe sharing of objects, not
pages.CHERI has since graduated from being purely a research project. RISC-V
International is finalising the specification for a CHERI RISC-V base
architecture and multiple companies have announced CHERI chips or IP
cores.</span></p>
<p><span style="font-size:90%">The invention of the memory-management unit (MMU)
allows process isolation and virtual machines, but also led to things like
cheap copy-on-write mechanisms, zygote models for fast process creation, shared
memory abstractions and a large space of operating-system design choices to
explore.  New points in this space are still being discovered and explored
today. CHERI has far less history, yet provides the same potentials.  This talk
will discuss two approaches to CHERI adoption in OS design: CheriBSD, which
provides a fully backwards-compatible memory-safe POSIX system, and CHERIoT
RTOS, which is a clean-slate design showing how CHERI enables new OS design
patterns.</span></p>
<ul>
<li>
<p><strong>12:15pm - 12:35pm</strong> <strong>Compartment, Crash, and Continue: Toward Resilient
Monolithic OS Kernels.</strong> Shih-Wei Li, Shih-Hung Tang, Yi-Lin Hsu (National
Taiwan University)</p>
</li>
<li>
<p><strong>12:35pm - 12:55pm</strong> <strong>Joyride: Rethinking Linux?s network stack design for
better performance, security, and reliability.</strong> Yanlin Du, Ruslan Nikolaev
(The Pennsylvania State University)</p>
</li>
</ul>
]]></content:encoded>
    </item>
    
    <item>
      <title>Program (2023)</title>
      <link>https://kisv-workshop.github.io/archive/2023/program/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>https://kisv-workshop.github.io/archive/2023/program/</guid>
      <description>The complete workshop proceedings are available in the ACM DL. October 23, 2023
08:30 - 08:35 Opening remarks 08:35 - 09:35 Keynote by Chris Hawblitzel (Microsoft). Verus: Fast Formal Verification of Rust Programs Using Ownership and Automated Theorem Proving. Session 1: Operating Systems
09:35 - 09:55 Leveraging Rust for Lightweight OS Correctness. Ramla Ijaz (Yale University), Kevin Boos (Theseus Systems), Lin Zhong (Yale University)
09:55 - 10:15 Atmosphere: Towards Practical Verified Kernels in Rust.</description>
      <content:encoded><![CDATA[<style>
.box {
    border-radius: 0.5em;
    background-color: #f0f0f0;
}

.dark .box {
    border-radius: 0.5em;
    background-color: #202325;
}

.important {
    text-align: center;
    padding-top: 1em;
    padding-bottom: 1em;
    line-height: 120%;
    font-size: 100%;
    margin: 0 auto;
}

.width50 {
    width: 90%;
}
</style>
<div class="important box width50">
The complete <b><a href="https://dl.acm.org/doi/proceedings/10.1145/3625275">
workshop
proceedings</a></b> are available
in the ACM DL.
</div>
<p><em>October 23, 2023</em></p>
<ul>
<li><strong>08:30 - 08:35</strong>    Opening remarks</li>
<li><strong>08:35 - 09:35</strong>    Keynote by Chris Hawblitzel
(Microsoft). <strong>Verus: Fast Formal Verification of Rust Programs Using
Ownership and Automated Theorem Proving.</strong></li>
</ul>
<p><strong><p style="text-align: center;">Session 1: Operating Systems</p></strong></p>
<ul>
<li>
<p><strong>09:35 - 09:55</strong>    <strong>Leveraging Rust for Lightweight OS
Correctness.</strong> Ramla Ijaz (Yale University), Kevin Boos (Theseus Systems),
Lin Zhong (Yale University)</p>
</li>
<li>
<p><strong>09:55 - 10:15</strong>    <strong>Atmosphere: Towards Practical
Verified Kernels in Rust.</strong> Xiangdong Chen (University of Utah), Zhaofeng Li
(University of Utah), Vikram Narayanan (University of Utah), Anton Burtsev
(University of Utah)</p>
</li>
</ul>
<p><strong><p style="text-align: center;">10:15 - 10:40    Coffee break</p></strong></p>
<p><strong><p style="text-align: center;">Session 2: Hardware</p></strong></p>
<ul>
<li>
<p><strong>10:40 - 11:00</strong>    <strong>Specifying the de-facto OS of a
production SoC.</strong> Ben Fiedler (ETH Zurich), Roman Meier (ETH Zurich), Jasmin
Schult (ETH   Zurich), Daniel Schwyn (ETH Zurich), Timothy Roscoe (ETH
Zurich)</p>
</li>
<li>
<p><strong>11:00 - 11:20</strong>    <strong>The K2 Architecture for Modular
Hardware Security Modules.</strong> Anish Athalye (MIT), Frans Kaashoek (MIT),
Nickolai Zeldovich (MIT), Joseph  Tassarotti (New York University)</p>
</li>
</ul>
<p><strong><p style="text-align: center;">Session 3: Secure Interfaces</p></strong></p>
<ul>
<li>
<p><strong>11:20 - 11:40</strong>    <strong>CIVSCOPE: Analyzing Potential
Memory Corruption Bugs in Compartment Interfaces by Establishing Lower Bound
and Upper Bound.</strong> Yi Chien (Rice University), Vlad-Andrei Bădoiu (University
Politehnica of Bucharest), Yudi Yang (Rice University), Yuqian Huo (Rice
University), Kelly Kaoudis (Trail of Bits), Hugo Lefeuvre (The University of
Manchester), Pierre Olivier (The University of Manchester), Nathan Dautenhahn
(Rice University)</p>
</li>
<li>
<p><strong>11:40 - 12:00</strong>    <strong>Encapsulated Functions: Fortifying
Rust’s FFI in Embedded Systems.</strong> Leon Schuermann (Princeton University),
Amit Levy (Princeton University), Arun Thomas (zeroRISC Inc.)</p>
</li>
</ul>
]]></content:encoded>
    </item>
    
  </channel>
</rss>
