메뉴 건너뛰기




Volumn , Issue , 2010, Pages 365-379

Scalable parametric verification of secure systems: How to verify reference monitors without worrying about data structure size

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATED FORMAL VERIFICATION; AUTOMATED VERIFICATION; CODE SIZE; GUARDED COMMANDS; ITS DATA; LARGE DATA; MODEL CHECK; OPERATING SYSTEMS; PARAMETRIC VERIFICATION; RECENT PROGRESS; REFERENCE MONITORS; SECURE SYSTEM; SECURITY POLICY; SECURITY PROPERTIES; SMALL MODEL THEOREM; TEMPORAL SPECIFICATION;

EID: 77955216681     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2010.29     Document Type: Conference Paper
Times cited : (20)

References (46)
  • 2
    • 0022720442 scopus 로고
    • Limits for automatic verification of finite-state concurrent systems
    • DOI 10.1016/0020-0190(86)90071-2
    • K. R. Apt and D. C. Kozen. Limits for automatic verification of finitestate concurrent systems. Information Processing Letters, 22(6):307-309, 1986. (Pubitemid 16589252)
    • (1986) Information Processing Letters , vol.22 , Issue.6 , pp. 307-309
    • Apt, K.R.1    Kozen, D.C.2
  • 8
    • 3042538605 scopus 로고    scopus 로고
    • Multiset rewriting and the complexity of bounded security protocols
    • Nancy A. Durgin, Patrick Lincoln, and John C. Mitchell. Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security, 12(2):247-311, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.2 , pp. 247-311
    • Nancy, A.1    Durgin, P.L.2    Mitchell, J.C.3
  • 19
    • 0026884434 scopus 로고
    • Reasoning about systems with many processes
    • Steven M. German and A. Prasad Sistla. Reasoning about systems with many processes. Journal of the ACM, 39(3):675-735, 1992.
    • (1992) Journal of the ACM , vol.39 , Issue.3 , pp. 675-735
    • German, S.M.1    Prasad Sistla, A.2
  • 24
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • Gerard J. Holzmann. The Model Checker SPIN. IEEE Trans. Software Eng., 23(5):279-295, 1997.
    • (1997) IEEE Trans. Software Eng. , vol.23 , Issue.5 , pp. 279-295
    • Holzmann, G.J.1
  • 28
    • 26444457396 scopus 로고    scopus 로고
    • On model checking dataindependent systems with arrays with whole-array operations
    • July
    • Ranko Lazić, Tom Newcomb, and Bill Roscoe. On model checking dataindependent systems with arrays with whole-array operations. Lecture Notes in Computer Science, 3525:275-291, July 2004.
    • (2004) Lecture Notes in Computer Science , vol.3525 , pp. 275-291
    • Lazić, R.1    Newcomb, T.2    Roscoe, B.3
  • 31
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • Gavin Lowe. Towards a completeness result for model checking of security protocols. Journal of Computer Security, 7(1), 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Lowe, G.1
  • 37
    • 0033344294 scopus 로고    scopus 로고
    • Proving security protocols with model checkers by data independence techniques
    • A. W. Roscoe and P. J. Broadfoot. Proving security protocols with model checkers by data independence techniques. Journal Computer Security, 7(2-3):147-190, 1999.
    • (1999) Journal Computer Security , vol.7 , Issue.2-3 , pp. 147-190
    • Roscoe, A.W.1    Broadfoot, P.J.2
  • 38
    • 85041481084 scopus 로고
    • The design and verification of secure systems
    • Asilomar, CA, December ACM Operating Systems Review
    • John Rushby. The design and verification of secure systems. In Proceedings of the Eighth ACM Symposium on Operating System Principles (SOSP), pages 12-21, Asilomar, CA, December 1981. (ACM Operating Systems Review, Vol. 15, No. 5).
    • (1981) Proceedings of the Eighth ACM Symposium on Operating System Principles (SOSP) , vol.15 , Issue.5 , pp. 12-21
    • Rushby, J.1
  • 42
    • 0024051099 scopus 로고
    • Proving properties of a ring of finite state machines
    • I. Suzuki. Proving properties of a ring of finite state machines. Information Processing Letters, 28:213-213, 1988.
    • (1988) Information Processing Letters , vol.28 , pp. 213-213
    • Suzuki, I.1
  • 44
    • 0018983212 scopus 로고
    • Specification and verification of ucla unix security kernel
    • DOI 10.1145/358818.358825
    • Bruce J. Walker, Richard A. Kemmerer, and Gerald J. Popek. Specification and verification of the UCLA Unix security kernel. Communications of the ACM, 23(2):118-131, 1980. (Pubitemid 10465265)
    • (1980) Communications of the ACM , vol.23 , Issue.2 , pp. 118-131
    • Wlker, B.J.1    Kemmerer, R.A.2    Popek, G.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.