-
1
-
-
72249107286
-
In 1986 Summer
-
M. Accetta, R. Baron, W. Bolosky, D. Golub, R. Rashid, A. Tevanian, and M. Young. Mach: A new kernel foundation for UNIX development
-
M. Accetta, R. Baron, W. Bolosky, D. Golub, R. Rashid, A. Tevanian, and M. Young. Mach: A new kernel foundation for UNIX development. In 1986 Summer USENIX, pages 93-112, 1986.
-
(1986)
USENIX
, pp. 93-112
-
-
-
2
-
-
67349218352
-
Balancing the load - leveraging a semantics stack for systems verification
-
E. Alkassar, M. Hillebrand, D. Leinenbach, N. Schirmer, A. Starostin, and A. Tsyban. Balancing the load - leveraging a semantics stack for systems verification. JAR, 42(2-4), 2009.
-
(2009)
JAR
, vol.42
, Issue.2-4
-
-
Alkassar, E.1
Hillebrand, M.2
Leinenbach, D.3
Schirmer, N.4
Starostin, A.5
Tsyban, A.6
-
3
-
-
47249106062
-
Formal pervasive verification of a paging mechanism
-
C. R. Ramakrishnan and J. Rehof, editors, Tools and Alg. for the Construction and Analysis of Systems TACAS, of, Springer
-
E. Alkassar, N. Schirmer, and A. Starostin. Formal pervasive verification of a paging mechanism. In C. R. Ramakrishnan and J. Rehof, editors, Tools and Alg. for the Construction and Analysis of Systems (TACAS), volume 4963 of LNCS, pages 109-123. Springer, 2008.
-
(2008)
LNCS
, vol.4963
, pp. 109-123
-
-
Alkassar, E.1
Schirmer, N.2
Starostin, A.3
-
4
-
-
84949686528
-
The MILS architecture for high-assurance embedded systems
-
J. Alves-Foss, P. W. Oman, C. Taylor, and S. Harrison. The MILS architecture for high-assurance embedded systems. Int. J. Emb. Syst., 2:239-247, 2006.
-
(2006)
Int. J. Emb. Syst
, vol.2
, pp. 239-247
-
-
Alves-Foss, J.1
Oman, P.W.2
Taylor, C.3
Harrison, S.4
-
6
-
-
0038489696
-
SLIC: A specification language for interface checking
-
Technical Report MSR-TR-2001-21, Microsoft Research
-
T. Ball and S. K. Rajamani. SLIC: A specification language for interface checking. Technical Report MSR-TR-2001-21, Microsoft Research, 2001.
-
(2001)
-
-
Ball, T.1
Rajamani, S.K.2
-
7
-
-
80054992065
-
Extensibility, safety and performance in the SPIN operating system
-
Dec
-
B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, and S. Eggers. Extensibility, safety and performance in the SPIN operating system. In 15th SOSP, Dec 1995.
-
(1995)
15th SOSP
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.E.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
8
-
-
0024772234
-
Kit: A study in operating system verification
-
W. R. Bevier. Kit: A study in operating system verification. IEEE Transactions on Software Engineering, 15(11):1382-1396, 1989.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.11
, pp. 1382-1396
-
-
Bevier, W.R.1
-
9
-
-
61949335369
-
A mathematical model of the Mach kernel: Atomic actions and locks
-
Technical Report 89, Computational Logic Inc, Apr
-
W. R. Bevier and L. Smith. A mathematical model of the Mach kernel: Atomic actions and locks. Technical Report 89, Computational Logic Inc., Apr 1993.
-
(1993)
-
-
Bevier, W.R.1
Smith, L.2
-
11
-
-
74249111569
-
A verified shared capability model
-
G. Klein, R. Huuck, and B. Schlich, editors, Elsevier, Jun
-
A. Boyton. A verified shared capability model. In G. Klein, R. Huuck, and B. Schlich, editors, 4th WS Syst. Softw. Verification SSV'09, ENTCS, pages 99-116. Elsevier, Jun 2009.
-
(2009)
4th WS Syst. Softw. Verification SSV'09, ENTCS
, pp. 99-116
-
-
Boyton, A.1
-
12
-
-
84888490569
-
The nucleus of a multiprogramming operating system
-
P. Brinch Hansen. The nucleus of a multiprogramming operating system. CACM, 13:238-250, 1970.
-
(1970)
CACM
, vol.13
, pp. 238-250
-
-
Brinch Hansen, P.1
-
13
-
-
84885230563
-
-
D. Cock. Bitfields and tagged unions in C: Verification through automatic generation. In B. Beckert and G. Klein, editors, VERIFY'08, 372 of CEUR Workshop Proceedings, pages 44-55, Aug 2008.
-
D. Cock. Bitfields and tagged unions in C: Verification through automatic generation. In B. Beckert and G. Klein, editors, VERIFY'08, volume 372 of CEUR Workshop Proceedings, pages 44-55, Aug 2008.
-
-
-
-
14
-
-
57049118010
-
Secure microkernels, state monads and scalable refinement
-
O. A. Mohamed, C. Muñoz, and S. Tahar, editors, 21st TPHOLs, of, Springer, Aug
-
D. Cock, G. Klein, and T. Sewell. Secure microkernels, state monads and scalable refinement. In O. A. Mohamed, C. Muñoz, and S. Tahar, editors, 21st TPHOLs, volume 5170 of LNCS, pages 167-182. Springer, Aug 2008.
-
(2008)
LNCS
, vol.5170
, pp. 167-182
-
-
Cock, D.1
Klein, G.2
Sewell, T.3
-
15
-
-
34548234229
-
Proving that programs eventually do something good
-
ACM
-
B. Cook, A. Gotsman, A. Podelski, A. Rybalchenko, and M. Y. Vardi. Proving that programs eventually do something good. In 34th POPL. ACM, 2007.
-
(2007)
34th POPL
-
-
Cook, B.1
Gotsman, A.2
Podelski, A.3
Rybalchenko, A.4
Vardi, M.Y.5
-
16
-
-
41149167181
-
-
J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve. Secure virtual architecture: A safe execution environment for commodity operating systems. In 16th SOSP, pages 351-366, Oct 2007.
-
J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve. Secure virtual architecture: A safe execution environment for commodity operating systems. In 16th SOSP, pages 351-366, Oct 2007.
-
-
-
-
17
-
-
84888484461
-
-
Personal communication
-
U. Dannowski. Personal communication.
-
-
-
Dannowski, U.1
-
19
-
-
33750992489
-
Running the manual: An approach to high-assurance microkernel development
-
Sep
-
P. Derrin, K. Elphinstone, G. Klein, D. Cock, and M. M. T. Chakravarty. Running the manual: An approach to high-assurance microkernel development. In ACM SIGPLAN Haskell WS, Sep 2006.
-
(2006)
ACM SIGPLAN Haskell WS
-
-
Derrin, P.1
Elphinstone, K.2
Klein, G.3
Cock, D.4
Chakravarty, M.M.T.5
-
20
-
-
63149115885
-
Kernel design for isolation and assurance of physical memory
-
ACM SIGOPS, Apr
-
D. Elkaduwe, P. Derrin, and K. Elphinstone. Kernel design for isolation and assurance of physical memory. In 1st IIES, pages 35-40. ACM SIGOPS, Apr 2008.
-
(2008)
1st IIES
, pp. 35-40
-
-
Elkaduwe, D.1
Derrin, P.2
Elphinstone, K.3
-
21
-
-
70350504088
-
Verified protection model of the seL4 microkernel
-
J. Woodcock and N. Shankar, editors, VSTTE 2008, Verified Softw, Theories, Tools & Experiments, of, Springer, Oct
-
D. Elkaduwe, G. Klein, and K. Elphinstone. Verified protection model of the seL4 microkernel. In J. Woodcock and N. Shankar, editors, VSTTE 2008 - Verified Softw.: Theories, Tools & Experiments, volume 5295 of LNCS, pages 99-114. Springer, Oct 2008.
-
(2008)
LNCS
, vol.5295
, pp. 99-114
-
-
Elkaduwe, D.1
Klein, G.2
Elphinstone, K.3
-
22
-
-
77958184237
-
Towards a practical, verified kernel
-
May
-
K. Elphinstone, G. Klein, P. Derrin, T. Roscoe, and G. Heiser. Towards a practical, verified kernel. In 11th HotOS, pages 117-122, May 2007.
-
(2007)
11th HotOS
, pp. 117-122
-
-
Elphinstone, K.1
Klein, G.2
Derrin, P.3
Roscoe, T.4
Heiser, G.5
-
23
-
-
34748826163
-
Language support for fast and reliable message-based communication in Singularity OS
-
Apr
-
M. Fähndrich, M. Aiken, C. Hawblitzel, O. Hodson, G. C. Hunt, J. R. Larus, and S. Levi. Language support for fast and reliable message-based communication in Singularity OS. In 1st EuroSys Conf., pages 177-190, Apr 2006.
-
(2006)
1st EuroSys Conf
, pp. 177-190
-
-
Fähndrich, M.1
Aiken, M.2
Hawblitzel, C.3
Hodson, O.4
Hunt, G.C.5
Larus, J.R.6
Levi, S.7
-
25
-
-
0005371666
-
Interface and execution models in the Fluke kernel
-
USENIX, Feb
-
B. Ford, M. Hibler, J. Lepreau, R. McGrath, and P. Tullmann. Interface and execution models in the Fluke kernel. In 3rd OSDI. USENIX, Feb 1999.
-
(1999)
3rd OSDI
-
-
Ford, B.1
Hibler, M.2
Lepreau, J.3
McGrath, R.4
Tullmann, P.5
-
26
-
-
4444318660
-
Terra: A virtual machine-based platform for trusted computing
-
Oct
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In 19th SOSP, Oct 2003.
-
(2003)
19th SOSP
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
27
-
-
84888506011
-
-
Green Hills Software, Inc. INTEGRITY-178B separation kernel security target version 1.0, 2008
-
Green Hills Software, Inc. INTEGRITY-178B separation kernel security target version 1.0. http://www.niap-ccevs.org/cc-scheme/st/st vid10119-st.pdf, 2008.
-
-
-
-
28
-
-
84888539290
-
-
Greenhills Software, Inc. Integrity real-time operating system
-
Greenhills Software, Inc. Integrity real-time operating system. http://www.ghs.com/products/rtos/integrity.html, 2008.
-
(2008)
-
-
-
29
-
-
11944266314
-
Verifying information flow goals in security-enhanced Linux
-
J. D. Guttman, A. L. Herzog, J. D. Ramsdell, and C. W. Skorupka. Verifying information flow goals in security-enhanced Linux. Journal of Computer Security, 13(1):115-134, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 115-134
-
-
Guttman, J.D.1
Herzog, A.L.2
Ramsdell, J.D.3
Skorupka, C.W.4
-
30
-
-
0023292465
-
Extending the noninterference version of MLS for SAT
-
J. T. Haigh and W. D. Young. Extending the noninterference version of MLS for SAT. IEEE Trans. on Software Engineering, 13(2):141-150, 1987.
-
(1987)
IEEE Trans. on Software Engineering
, vol.13
, Issue.2
, pp. 141-150
-
-
Haigh, J.T.1
Young, W.D.2
-
32
-
-
63749084343
-
Hypervisors for consumer electronics
-
G. Heiser. Hypervisors for consumer electronics. In 6th IEEE CCNC, 2009.
-
(2009)
6th IEEE CCNC
-
-
Heiser, G.1
-
33
-
-
34547321335
-
Formal specification and verification of data separation in a separation kernel for an embedded system
-
ACM
-
C. L. Heitmeyer, M. Archer, E. I. Leonard, and J. McLean. Formal specification and verification of data separation in a separation kernel for an embedded system. In CCS '06: Proc. 13th Conf. on Computer and Communications Security, pages 346-355. ACM, 2006.
-
(2006)
CCS '06: Proc. 13th Conf. on Computer and Communications Security
, pp. 346-355
-
-
Heitmeyer, C.L.1
Archer, M.2
Leonard, E.I.3
McLean, J.4
-
34
-
-
33846506004
-
Software verification with Blast
-
T. A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Software verification with Blast. In SPIN'03, Workshop on Model Checking Software, 2003.
-
(2003)
SPIN'03, Workshop on Model Checking Software
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
35
-
-
77951450625
-
Reducing TCB size by using untrusted components - small kernels versus virtual-machine monitors
-
Sep
-
M. Hohmuth, M. Peter, H. Härtig, and J. S. Shapiro. Reducing TCB size by using untrusted components - small kernels versus virtual-machine monitors. In 11th SIGOPS Eur. WS, Sep 2004.
-
(2004)
11th SIGOPS Eur. WS
-
-
Hohmuth, M.1
Peter, M.2
Härtig, H.3
Shapiro, J.S.4
-
36
-
-
72249093966
-
The VFiasco approach for a verified operating system
-
Jul
-
M. Hohmuth and H. Tews. The VFiasco approach for a verified operating system. In 2nd PLOS, Jul 2005.
-
(2005)
2nd PLOS
-
-
Hohmuth, M.1
Tews, H.2
-
37
-
-
84888555844
-
-
Iguana. http://www.ertos.nicta.com.au/software/kenge/iguana-project/ latest/.
-
Iguana
-
-
-
38
-
-
84888498912
-
-
Information Assurance Directorate. U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness, Jun 2007. Version 1.03, skpp hr v1.03
-
Information Assurance Directorate. U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness, Jun 2007. Version 1.03. http://www.niap-ccevs.org/cc-scheme/pp/pp.cfm/id/pp skpp hr v1.03/.
-
-
-
-
39
-
-
0004301215
-
Programming languages - C
-
ISO/IEC, Technical Report 9899:TC2, ISO/IEC JTC1/SC22/WG14, May
-
ISO/IEC. Programming languages - C. Technical Report 9899:TC2, ISO/IEC JTC1/SC22/WG14, May 2005.
-
(2005)
-
-
-
40
-
-
61949206747
-
Operating system verification - an overview
-
Feb
-
G. Klein. Operating system verification - an overview. Sādhanā, 34(1):27-69, Feb 2009.
-
(2009)
Sādhanā
, vol.34
, Issue.1
, pp. 27-69
-
-
Klein, G.1
-
41
-
-
70450191606
-
Experience report: SeL4 - formally verifying a high-performance microkernel
-
Aug
-
G. Klein, P. Derrin, and K. Elphinstone. Experience report: seL4 - formally verifying a high-performance microkernel. In 14th ICFP, Aug 2009.
-
(2009)
14th ICFP
-
-
Klein, G.1
Derrin, P.2
Elphinstone, K.3
-
42
-
-
70350325124
-
Types, maps and separation logic
-
S. Berghofer, T. Nipkow, C. Urban, and M. Wenzel, editors, Proc. TPHOLs'09, of, Springer
-
R. Kolanski and G. Klein. Types, maps and separation logic. In S. Berghofer, T. Nipkow, C. Urban, and M. Wenzel, editors, Proc. TPHOLs'09, volume 5674 of LNCS. Springer, 2009.
-
(2009)
LNCS
, vol.5674
-
-
Kolanski, R.1
Klein, G.2
-
43
-
-
84888524478
-
-
L4HQ
-
L4HQ. http://l4hq.org/arch/arm/.
-
-
-
-
44
-
-
33745802808
-
Formal certification of a compiler back-end, or: Programming a compiler with a proof assistant
-
J. G. Morrisett and S. L. P. Jones, editors, ACM
-
X. Leroy. Formal certification of a compiler back-end, or: Programming a compiler with a proof assistant. In J. G. Morrisett and S. L. P. Jones, editors, 33rd POPL, pages 42-54. ACM, 2006.
-
(2006)
33rd POPL
, pp. 42-54
-
-
Leroy, X.1
-
45
-
-
0027874073
-
Improving IPC by kernel design
-
Dec
-
J. Liedtke. Improving IPC by kernel design. In 14th SOSP, pages 175-188, Dec 1993.
-
(1993)
14th SOSP
, pp. 175-188
-
-
Liedtke, J.1
-
46
-
-
0030243542
-
Towards real microkernels
-
Sep
-
J. Liedtke. Towards real microkernels. CACM, 39(9):70-77, Sep 1996.
-
(1996)
CACM
, vol.39
, Issue.9
, pp. 70-77
-
-
Liedtke, J.1
-
47
-
-
0030651295
-
Achieved IPC performance (still the foundation for extensibility)
-
May
-
J. Liedtke, K. Elphinstone, S. Schönberg, H. Härtig, G. Heiser, N. Islam, and T. Jaeger. Achieved IPC performance (still the foundation for extensibility). In 6th HotOS, pages 28-31, May 1997.
-
(1997)
6th HotOS
, pp. 28-31
-
-
Liedtke, J.1
Elphinstone, K.2
Schönberg, S.3
Härtig, H.4
Heiser, G.5
Islam, N.6
Jaeger, T.7
-
48
-
-
48249125979
-
Formal construction of the mathematically analyzed separation kernel
-
IEEE Computer Society
-
W. B. Martin, P. White, A. Goldberg, and F. S. Taylor. Formal construction of the mathematically analyzed separation kernel. In ASE '00: Proc. 15th IEEE Int. Conf. on Automated software engineering, pages 133-141. IEEE Computer Society, 2000.
-
(2000)
ASE '00: Proc. 15th IEEE Int. Conf. on Automated software engineering
, pp. 133-141
-
-
Martin, W.B.1
White, P.2
Goldberg, A.3
Taylor, F.S.4
-
49
-
-
38049029613
-
Using XCAP to certify realistic system code: Machine context management
-
Proc. TPHOLs'07, of, Springer, Sep
-
Z. Ni, D. Yu, and Z. Shao. Using XCAP to certify realistic system code: Machine context management. In Proc. TPHOLs'07, volume 4732 of LNCS, pages 189-206. Springer, Sep 2007.
-
(2007)
LNCS
, vol.4732
, pp. 189-206
-
-
Ni, Z.1
Yu, D.2
Shao, Z.3
-
50
-
-
0348126394
-
Isabelle/HOL - A Proof Assistant for Higher-Order Logic
-
of, Springer
-
T. Nipkow, L. Paulson, and M. Wenzel. Isabelle/HOL - A Proof Assistant for Higher-Order Logic, volume 2283 of LNCS. Springer, 2002.
-
(2002)
LNCS
, vol.2283
-
-
Nipkow, T.1
Paulson, L.2
Wenzel, M.3
-
53
-
-
34748819865
-
-
Rockwell Collins, Inc
-
Rockwell Collins, Inc. AAMP7r1 Reference Manual, 2003.
-
(2003)
AAMP7r1 Reference Manual
-
-
-
54
-
-
85041481084
-
Design and verification of secure systems
-
J. M. Rushby. Design and verification of secure systems. In 8th SOSP, pages 12-21, 1981.
-
(1981)
8th SOSP
, pp. 12-21
-
-
Rushby, J.M.1
-
56
-
-
70449824733
-
SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
Oct
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In 16th SOSP, pages 335-350, Oct 2007.
-
(2007)
16th SOSP
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
57
-
-
0042484535
-
State caching in the EROS kernel - implementing efficient orthogonal peristence in a pure capability system
-
Nov
-
J. S. Shapiro, D. F. Faber, and J. M. Smith. State caching in the EROS kernel - implementing efficient orthogonal peristence in a pure capability system. In 5th IWOOOS, pages 89-100, Nov 1996.
-
(1996)
5th IWOOOS
, pp. 89-100
-
-
Shapiro, J.S.1
Faber, D.F.2
Smith, J.M.3
-
59
-
-
34748842601
-
Reducing TCB complexity for security-sensitive applications: Three case studies
-
Apr
-
L. Singaravelu, C. Pu, H. Härtig, and C. Helmuth. Reducing TCB complexity for security-sensitive applications: Three case studies. In 1st EuroSys Conf., pages 161-174, Apr 2006.
-
(2006)
1st EuroSys Conf
, pp. 161-174
-
-
Singaravelu, L.1
Pu, C.2
Härtig, H.3
Helmuth, C.4
-
60
-
-
85084160641
-
The Flask security architecture: System support for diverse security policies
-
Aug
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau. The Flask security architecture: System support for diverse security policies. In 8th USENIX Security Symp., Aug 1999.
-
(1999)
8th USENIX Security Symp
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
61
-
-
47049113643
-
-
H. Tews, T. Weber, and M. Völp. A formal model of memory peculiarities for the verification of low-level operating-system code. In R. Huuck, G. Klein, and B. Schlich, editors, Proc. 3rd Int. WS on Systems Software Verification (SSV'08), 217 of ENTCS, pages 79-96. Elsevier, Feb 2008.
-
H. Tews, T. Weber, and M. Völp. A formal model of memory peculiarities for the verification of low-level operating-system code. In R. Huuck, G. Klein, and B. Schlich, editors, Proc. 3rd Int. WS on Systems Software Verification (SSV'08), volume 217 of ENTCS, pages 79-96. Elsevier, Feb 2008.
-
-
-
-
63
-
-
67349283417
-
Formal verification of C systems code: Structured types, separation logic and theorem proving
-
H. Tuch. Formal verification of C systems code: Structured types, separation logic and theorem proving. JAR, 42(2-4):125-187, 2009.
-
(2009)
JAR
, vol.42
, Issue.2-4
, pp. 125-187
-
-
Tuch, H.1
-
65
-
-
34548205807
-
Types, bytes, and separation logic
-
M. Hofmann and M. Felleisen, editors, Jan
-
H. Tuch, G. Klein, and M. Norrish. Types, bytes, and separation logic. In M. Hofmann and M. Felleisen, editors, 34th POPL, pages 97-108, Jan 2007.
-
(2007)
34th POPL
, pp. 97-108
-
-
Tuch, H.1
Klein, G.2
Norrish, M.3
-
66
-
-
34848851727
-
-
US National Institute of Standards, ISO Standard 15408
-
US National Institute of Standards. Common Criteria for IT Security Evaluation, 1999. ISO Standard 15408. http://csrc.nist.gov/cc/.
-
(1999)
Common Criteria for IT Security Evaluation
-
-
-
67
-
-
0018983212
-
Specification and verification of the UCLA Unix security kernel
-
B. J. Walker, R. A. Kemmerer, and G. J. Popek. Specification and verification of the UCLA Unix security kernel. CACM, 23(2):118-131, 1980.
-
(1980)
CACM
, vol.23
, Issue.2
, pp. 118-131
-
-
Walker, B.J.1
Kemmerer, R.A.2
Popek, G.J.3
-
69
-
-
20344381511
-
Scale and performance in the Denali isolation kernel
-
Dec
-
A. Whitaker, M. Shaw, and S. D. Gribble. Scale and performance in the Denali isolation kernel. In 5th OSDI, Dec 2002.
-
(2002)
5th OSDI
-
-
Whitaker, A.1
Shaw, M.2
Gribble, S.D.3
-
70
-
-
70350303809
-
Mind the gap: A verification framework for low-level C
-
S. Berghofer, T. Nipkow, C. Urban, and M. Wenzel, editors, Springer
-
S. Winwood, G. Klein, T. Sewell, J. Andronick, D. Cock, and M. Norrish. Mind the gap: A verification framework for low-level C. In S. Berghofer, T. Nipkow, C. Urban, and M. Wenzel, editors, Proc. TPHOLs'09, volume 5674. Springer, 2009.
-
(2009)
Proc. TPHOLs'09
, vol.5674
-
-
Winwood, S.1
Klein, G.2
Sewell, T.3
Andronick, J.4
Cock, D.5
Norrish, M.6
-
71
-
-
0016069660
-
HYDRA: The kernel of a multiprocessor operating system
-
W. Wulf, E. Cohen, W. Corwin, A. Jones, R. Levin, C. Pierson, and F. Pollack. HYDRA: The kernel of a multiprocessor operating system. CACM, 17:337-345, 1974.
-
(1974)
CACM
, vol.17
, pp. 337-345
-
-
Wulf, W.1
Cohen, E.2
Corwin, W.3
Jones, A.4
Levin, R.5
Pierson, C.6
Pollack, F.7
|