-
1
-
-
0004200684
-
-
Technical Report ESD-TR-73-51, ESD/AFSC, Hanscom AFB, Bedford, MA, Oct.
-
J. P Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, ESD/AFSC, Hanscom AFB, Bedford, MA, Oct. 1972.
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.P.1
-
2
-
-
0022720442
-
Limits for automatic verification of finite-state concurrent systems
-
DOI 10.1016/0020-0190(86)90071-2
-
K. R. Apt and D. C. Kozen. Limits for automatic verification of finitestate concurrent systems. Information Processing Letters, 22(6):307-309, 1986. (Pubitemid 16589252)
-
(1986)
Information Processing Letters
, vol.22
, Issue.6
, pp. 307-309
-
-
Apt, K.R.1
Kozen, D.C.2
-
3
-
-
21644433634
-
Xen and the art of virtualization
-
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
7
-
-
0003962322
-
-
MIT Press, Cambridge, MA
-
Edmund M. Clarke, Orna Grumberg, and Doron Peled. Model Checking. MIT Press, Cambridge, MA, 2000.
-
(2000)
Model Checking
-
-
Edmund, M.1
Clarke, O.G.2
Peled, D.3
-
8
-
-
3042538605
-
Multiset rewriting and the complexity of bounded security protocols
-
Nancy A. Durgin, Patrick Lincoln, and John C. Mitchell. Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security, 12(2):247-311, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.2
, pp. 247-311
-
-
Nancy, A.1
Durgin, P.L.2
Mitchell, J.C.3
-
17
-
-
77955177472
-
-
Technical Report CMU-CyLab-10-005, Carnegie Mellon University
-
Jason Franklin, Sagar Chaki, Anupam Datta, and Arvind Seshadri. Scalable parametric verification of secure systems: How to verify reference monitors without worrying about data structure size. Technical Report CMU-CyLab-10-005, Carnegie Mellon University, 2010.
-
(2010)
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors Without Worrying about Data Structure Size.
-
-
Franklin, J.1
Chaki, S.2
Datta, A.3
Seshadri, A.4
-
18
-
-
77954754059
-
-
Technical Report CMU-CyLab-08-008, Carnegie Mellon University
-
Jason Franklin, Arvind Seshadri, Ning Qu, Sagar Chaki, and Anupam Datta. Attacking, repairing, and verifying SecVisor: A retrospective on the security of a hypervisor. Technical Report CMU-CyLab-08-008, Carnegie Mellon University, 2008.
-
(2008)
Attacking, Repairing, and Verifying SecVisor: A Retrospective on the Security of A Hypervisor
-
-
Franklin, J.1
Seshadri, A.2
Qu, N.3
Chaki, S.4
Datta, A.5
-
19
-
-
0026884434
-
Reasoning about systems with many processes
-
Steven M. German and A. Prasad Sistla. Reasoning about systems with many processes. Journal of the ACM, 39(3):675-735, 1992.
-
(1992)
Journal of the ACM
, vol.39
, Issue.3
, pp. 675-735
-
-
German, S.M.1
Prasad Sistla, A.2
-
20
-
-
11944266314
-
Verifying information flow goals in security-enhanced linux
-
Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, and Clement W. Skorupka. Verifying information flow goals in security-enhanced linux. Journal of Computer Security, 13(1):115-134, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 115-134
-
-
Guttman, J.D.1
Herzog, A.L.2
Ramsdell, J.D.3
Skorupka, C.W.4
-
21
-
-
0036039794
-
A system and language for building system-specific, static analyses
-
Seth Hallem, Benjamin Chelf, Yichen Xie, and Dawson Engler. A system and language for building system-specific, static analyses. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI '02), 2002.
-
(2002)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI '02)
-
-
Hallem, S.1
Chelf, B.2
Xie, Y.3
Engler, D.4
-
23
-
-
34547321335
-
Formal specification and verification of data separation in a separation kernel for an embedded system
-
Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, and John D. McLean. Formal specification and verification of data separation in a separation kernel for an embedded system. In Proceedings of the ACM Conference on Computer and Communications Security, pages 346-355, 2006.
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 346-355
-
-
Heitmeyer, C.L.1
Archer, M.2
Leonard, E.I.3
McLean, J.D.4
-
24
-
-
18944390941
-
The model checker SPIN
-
Gerard J. Holzmann. The Model Checker SPIN. IEEE Trans. Software Eng., 23(5):279-295, 1997.
-
(1997)
IEEE Trans. Software Eng.
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
-
25
-
-
58449099374
-
Finding concurrency-related bugs using random isolation
-
N. Kidd, T. Reps, J. Dolby, and M. Vaziri. Finding concurrency-related bugs using random isolation. In Proceedings of the 10th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI '09), 2009.
-
(2009)
Proceedings of the 10th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI '09)
-
-
Kidd, N.1
Reps, T.2
Dolby, J.3
Vaziri, M.4
-
26
-
-
72249120603
-
SeL4: Formal verification of an os kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. seL4: Formal verification of an os kernel. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP), 2009.
-
(2009)
Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP)
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
28
-
-
26444457396
-
On model checking dataindependent systems with arrays with whole-array operations
-
July
-
Ranko Lazić, Tom Newcomb, and Bill Roscoe. On model checking dataindependent systems with arrays with whole-array operations. Lecture Notes in Computer Science, 3525:275-291, July 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3525
, pp. 275-291
-
-
Lazić, R.1
Newcomb, T.2
Roscoe, B.3
-
31
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
Gavin Lowe. Towards a completeness result for model checking of security protocols. Journal of Computer Security, 7(1), 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Lowe, G.1
-
35
-
-
0347229432
-
-
Technical report, SRI International
-
P.G. Neumann, R.S. Boyer, R.J. Feiertag, K.N. Levitt, and L. Robinson. A provably secure operating system: The system, its applications, and proofs. Technical report, SRI International, 1980.
-
(1980)
A Provably Secure Operating System: The System, Its Applications, and Proofs
-
-
Neumann, P.G.1
Boyer, R.S.2
Feiertag, R.J.3
Levitt, K.N.4
Robinson, L.5
-
37
-
-
0033344294
-
Proving security protocols with model checkers by data independence techniques
-
A. W. Roscoe and P. J. Broadfoot. Proving security protocols with model checkers by data independence techniques. Journal Computer Security, 7(2-3):147-190, 1999.
-
(1999)
Journal Computer Security
, vol.7
, Issue.2-3
, pp. 147-190
-
-
Roscoe, A.W.1
Broadfoot, P.J.2
-
38
-
-
85041481084
-
The design and verification of secure systems
-
Asilomar, CA, December ACM Operating Systems Review
-
John Rushby. The design and verification of secure systems. In Proceedings of the Eighth ACM Symposium on Operating System Principles (SOSP), pages 12-21, Asilomar, CA, December 1981. (ACM Operating Systems Review, Vol. 15, No. 5).
-
(1981)
Proceedings of the Eighth ACM Symposium on Operating System Principles (SOSP)
, vol.15
, Issue.5
, pp. 12-21
-
-
Rushby, J.1
-
39
-
-
33750248123
-
Building a MAC-Based security architecture for the Xen open-source hypervisor
-
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramon Caceres, Ronald Perez, Stefan Berger, John Linwood Griffin, and Leendert van Doorn. Building a MAC-Based security architecture for the Xen open-source hypervisor. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), 2005.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC)
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Caceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.L.7
Van Doorn, L.8
-
42
-
-
0024051099
-
Proving properties of a ring of finite state machines
-
I. Suzuki. Proving properties of a ring of finite state machines. Information Processing Letters, 28:213-213, 1988.
-
(1988)
Information Processing Letters
, vol.28
, pp. 213-213
-
-
Suzuki, I.1
-
44
-
-
0018983212
-
Specification and verification of ucla unix security kernel
-
DOI 10.1145/358818.358825
-
Bruce J. Walker, Richard A. Kemmerer, and Gerald J. Popek. Specification and verification of the UCLA Unix security kernel. Communications of the ACM, 23(2):118-131, 1980. (Pubitemid 10465265)
-
(1980)
Communications of the ACM
, vol.23
, Issue.2
, pp. 118-131
-
-
Wlker, B.J.1
Kemmerer, R.A.2
Popek, G.J.3
-
46
-
-
84885668018
-
Using model checking to find serious file system errors
-
Junfeng Yang, Paul Twohey, Dawson R. Engler, and Madanlal Musuvathi. Using model checking to find serious file system errors. In Proceedings of the USENIX Symposium on Operating System Design and Implementation (OSDI), pages 273-288, 2004.
-
(2004)
Proceedings of the USENIX Symposium on Operating System Design and Implementation (OSDI)
, pp. 273-288
-
-
Yang, J.1
Twohey, P.2
Engler, D.R.3
Musuvathi, M.4
|