-
1
-
-
80052139193
-
-
January
-
Andronick, J., Bourke, T., Derrin, P., Elphinstone, K., Greenaway, D., Klein, G., Kolanski, R., Sewell, T., Winwood, S.: Abstract formal specification of the seL4/ARMv6 API (January 2011), http://ertos.nicta.com.au/software/sel4/
-
(2011)
Abstract Formal Specification of the Sel4/armv6 API
-
-
Andronick, J.1
Bourke, T.2
Derrin, P.3
Elphinstone, K.4
Greenaway, D.5
Klein, G.6
Kolanski, R.7
Sewell, T.8
Winwood, S.9
-
2
-
-
80052182401
-
Towards proving security in the presence of large untrusted components
-
Klein, G., Huuck, R., Schlich, B. (eds.)
-
Andronick, J., Greenaway, D., Elphinstone, K.: Towards proving security in the presence of large untrusted components. In: Klein, G., Huuck, R., Schlich, B. (eds.) 5th SSV. USENIX, Vancouver (2010)
-
5th SSV. USENIX, Vancouver (2010)
-
-
Andronick, J.1
Greenaway, D.2
Elphinstone, K.3
-
4
-
-
74249111569
-
A verified shared capability model
-
Klein, G., Huuck, R., Schlich, B. (eds.) Elsevier, Amsterdam
-
Boyton, A.: A verified shared capability model. In: Klein, G., Huuck, R., Schlich, B. (eds.) 4th SSV. ENTCS, vol. 254, pp. 25-44. Elsevier, Amsterdam (2009)
-
(2009)
4th SSV. ENTCS
, vol.254
, pp. 25-44
-
-
Boyton, A.1
-
5
-
-
57049118010
-
Secure microkernels, state monads and scalable refinement
-
Mohamed, O.A., Muñoz, C., Tahar, S. (eds.) TPHOLs 2008. Springer, Heidelberg
-
Cock, D., Klein, G., Sewell, T.: Secure microkernels, state monads and scalable refinement. In: Mohamed, O.A., Muñoz, C., Tahar, S. (eds.) TPHOLs 2008. LNCS, vol. 5170, pp. 167-182. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5170
, pp. 167-182
-
-
Cock, D.1
Klein, G.2
Sewell, T.3
-
6
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
Dennis, J.B., Van Horn, E.C.: Programming semantics for multiprogrammed computations. CACM 9, 143-155 (1966)
-
(1966)
CACM
, vol.9
, pp. 143-155
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
7
-
-
70350504088
-
Verified protection model of the seL4 microkernel
-
Shankar, N., Woodcock, J. (eds.) VSTTE 2008. Springer, Heidelberg
-
Elkaduwe, D., Klein, G., Elphinstone, K.: Verified protection model of the seL4 microkernel. In: Shankar, N., Woodcock, J. (eds.) VSTTE 2008. LNCS, vol. 5295, pp. 99-114. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5295
, pp. 99-114
-
-
Elkaduwe, D.1
Klein, G.2
Elphinstone, K.3
-
8
-
-
85072519230
-
The foundations of a provably secure operating system (PSOS)
-
June
-
Feiertag, R.J., Neumann, P.G.: The foundations of a provably secure operating system (PSOS). In: AFIPS Conf. Proc., 1979 National Comp. Conf., New York, NY, USA, pp. 329-334 (June 1979)
-
(1979)
AFIPS Conf. Proc., 1979 National Comp. Conf., New York, NY, USA
, pp. 329-334
-
-
Feiertag, R.J.1
Neumann, P.G.2
-
9
-
-
11944266314
-
Verifying information flow goals in security-enhanced linux
-
Guttman, J., Herzog, A., Ramsdell, J., Skorupka, C.: Verifying information flow goals in security-enhanced linux. J. Comp. Security 13, 115-134 (2005)
-
(2005)
J. Comp. Security
, vol.13
, pp. 115-134
-
-
Guttman, J.1
Herzog, A.2
Ramsdell, J.3
Skorupka, C.4
-
10
-
-
79851479431
-
-
Morgan & Claypool Publishers, San Francisco
-
Jaeger, T.: Operating System Security. Morgan & Claypool Publishers, San Francisco (2008)
-
(2008)
Operating System Security
-
-
Jaeger, T.1
-
11
-
-
61949206747
-
Operating system verification - An overview
-
Klein, G.: Operating system verification - an overview. Sādhanā 34(1), 27-69 (2009)
-
(2009)
Sādhanā
, vol.34
, Issue.1
, pp. 27-69
-
-
Klein, G.1
-
12
-
-
72249120603
-
seL4: Formal verification of an OS kernel
-
ACM, Big Sky
-
Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: Formal verification of an OS kernel. In: 22nd SOSP, pp. 207-220. ACM, Big Sky (2009)
-
(2009)
22nd SOSP
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
13
-
-
70449657350
-
Noninterference for a practical DIFC-based operating system
-
Krohn, M., Tromer, E.: Noninterference for a practical DIFC-based operating system. In: IEEE Symp. Security & Privacy, pp. 61-76 (2009)
-
(2009)
IEEE Symp. Security & Privacy
, pp. 61-76
-
-
Krohn, M.1
Tromer, E.2
-
15
-
-
0002179618
-
-
Reprinted in
-
Reprinted in Operat. Syst. Rev. 8(1), 18-24 (1974)
-
(1974)
Operat. Syst. Rev.
, vol.8
, Issue.1
, pp. 18-24
-
-
-
16
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
Lipton, R.J., Snyder, L.: A linear time algorithm for deciding subject security. J. ACM 24(3), 455-464 (1977)
-
(1977)
J. ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
17
-
-
77953259463
-
Analysing the information flow properties of object-capability patterns
-
Degano, P., Guttman, J.D. (eds.) FAST 2009. Springer, Heidelberg
-
Murray, T., Lowe, G.: Analysing the information flow properties of object-capability patterns. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 81-95. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5983
, pp. 81-95
-
-
Murray, T.1
Lowe, G.2
-
18
-
-
78650740853
-
Modeling and security analysis of a commercial real-time operating system kernel
-
Hardin, D.S. (ed.) Springer, Heidelberg
-
Richards, R.J.: Modeling and security analysis of a commercial real-time operating system kernel. In: Hardin, D.S. (ed.) Design and Verification of Microprocessor Systems for High-Assurance Applications, pp. 301-322. Springer, Heidelberg (2010)
-
(2010)
Design and Verification of Microprocessor Systems for High-Assurance Applications
, pp. 301-322
-
-
Richards, R.J.1
-
19
-
-
0033704964
-
Verifying the EROS confinement mechanism
-
May
-
Shapiro, J.S., Weber, S.: Verifying the EROS confinement mechanism. In: IEEE Symp. Security & Privacy, Washington, DC, USA, pp. 166-181 (May 2000)
-
(2000)
IEEE Symp. Security & Privacy, Washington, DC, USA
, pp. 166-181
-
-
Shapiro, J.S.1
Weber, S.2
-
20
-
-
0018983212
-
Specification and verification of the UCLA Unix security kernel
-
Walker, B.J., Kemmerer, R.A., Popek, G.J.: Specification and verification of the UCLA Unix security kernel. CACM 23(2), 118-131 (1980)
-
(1980)
CACM
, vol.23
, Issue.2
, pp. 118-131
-
-
Walker, B.J.1
Kemmerer, R.A.2
Popek, G.J.3
|