메뉴 건너뛰기




Volumn , Issue , 2013, Pages 415-429

seL4: From general purpose to a proof of information flow enforcement

Author keywords

formal verification; information flow control

Indexed keywords

FORMAL VERIFICATIONS; IMPLEMENTATION ERROR; INFORMATION FLOW CONTROL; INFORMATION FLOW SECURITY; INTRANSITIVE NON-INTERFERENCE; MATHEMATICAL REASONING; OPERATING SYSTEM KERNEL; SECURITY VULNERABILITIES;

EID: 84881233720     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2013.35     Document Type: Conference Paper
Times cited : (179)

References (54)
  • 1
    • 0026154452 scopus 로고
    • The existence of refinement mappings
    • M. Abadi and L. Lamport, "The existence of refinement mappings," Theor. Comput. Sci., vol. 82, pp. 253-284, 1991.
    • (1991) Theor. Comput. Sci. , vol.82 , pp. 253-284
    • Abadi, M.1    Lamport, L.2
  • 2
    • 77957057054 scopus 로고    scopus 로고
    • Pervasive verification of an OS microkernel
    • VSTTE 2010, ser. Springer, Aug
    • E. Alkassar, W. Paul, A. Starostin, and A. Tsyban, "Pervasive verification of an OS microkernel," in VSTTE 2010, ser. LNCS, vol. 6217. Springer, Aug 2010, pp. 71-85.
    • (2010) LNCS , vol.6217 , pp. 71-85
    • Alkassar, E.1    Paul, W.2    Starostin, A.3    Tsyban, A.4
  • 4
    • 35048839749 scopus 로고    scopus 로고
    • Information flow analysis in logical form
    • SAS '04, ser. Springer
    • T. Amtoft and A. Banerjee, "Information flow analysis in logical form," in SAS '04, ser. LNCS, vol. 3148. Springer, 2004, pp. 33-36.
    • (2004) LNCS , vol.3148 , pp. 33-36
    • Amtoft, T.1    Banerjee, A.2
  • 5
    • 58049149107 scopus 로고    scopus 로고
    • Verification condition generation for conditional information flow
    • ACM
    • -, "Verification condition generation for conditional information flow," in FMSE '07. ACM, 2007, pp. 2-11.
    • (2007) FMSE '07 , pp. 2-11
    • Amtoft, T.1    Banerjee, A.2
  • 6
    • 84881233051 scopus 로고    scopus 로고
    • Formal system verification - extension, AOARD 114070
    • Tech. Rep. 1833-9646-5926, May
    • J. Andronick, G. Klein, and A. Boyton, "Formal system verification - extension, AOARD 114070," NICTA, Sydney, Australia, Tech. Rep. 1833-9646-5926, May 2012.
    • (2012) NICTA, Sydney, Australia
    • Andronick, J.1    Klein, G.2    Boyton, A.3
  • 8
    • 79959987865 scopus 로고    scopus 로고
    • Formally verifying isolation and availability in an idealized model of virtualization
    • 17th FM, ser. Springer
    • G. Barthe, G. Betarte, J. D. Campo, and C. Luna, "Formally verifying isolation and availability in an idealized model of virtualization," in 17th FM, ser. LNCS, vol. 6664. Springer, 2011, pp. 231-245.
    • (2011) LNCS , vol.6664 , pp. 231-245
    • Barthe, G.1    Betarte, G.2    Campo, J.D.3    Luna, C.4
  • 9
    • 84866951418 scopus 로고    scopus 로고
    • Cache-leakage resilient OS isolation in an idealized model of virtualization
    • -, "Cache-leakage resilient OS isolation in an idealized model of virtualization," in 25th CSF, 2012, pp. 186-197.
    • 25th CSF, 2012 , pp. 186-197
    • Barthe, G.1    Betarte, G.2    Campo, J.D.3    Luna, C.4
  • 10
    • 2442575906 scopus 로고    scopus 로고
    • Simple relational correctness proofs for static analyses and program transformations
    • ACM
    • N. Benton, "Simple relational correctness proofs for static analyses and program transformations," in POPL 2004. ACM, 2004, pp. 14-25.
    • (2004) POPL 2004 , pp. 14-25
    • Benton, N.1
  • 11
    • 0024772234 scopus 로고
    • Kit: A study in operating system verification
    • W. R. Bevier, "Kit: A study in operating system verification," Trans. Softw. Engin., vol. 15, no. 11, pp. 1382-1396, 1989.
    • (1989) Trans. Softw. Engin. , vol.15 , Issue.11 , pp. 1382-1396
    • Bevier, W.R.1
  • 13
    • 33749388677 scopus 로고    scopus 로고
    • Formal verification of a C compiler front-end
    • 14th FM, ser. Springer
    • S. Blazy, Z. Dargaye, and X. Leroy, "Formal verification of a C compiler front-end," in 14th FM, ser. LNCS, vol. 4085. Springer, 2006, pp. 460-475.
    • (2006) LNCS , vol.4085 , pp. 460-475
    • Blazy, S.1    Dargaye, Z.2    Leroy, X.3
  • 14
    • 57049118010 scopus 로고    scopus 로고
    • Secure microkernels, state monads and scalable refinement
    • 21st TPHOLs, ser. Springer, Aug
    • D. Cock, G. Klein, and T. Sewell, "Secure microkernels, state monads and scalable refinement," in 21st TPHOLs, ser. LNCS, vol. 5170. Springer, Aug 2008, pp. 167-182.
    • (2008) LNCS , vol.5170 , pp. 167-182
    • Cock, D.1    Klein, G.2    Sewell, T.3
  • 16
    • 0000338326 scopus 로고
    • Programming semantics for multiprogrammed computations
    • J. B. Dennis and E. C. Van Horn, "Programming semantics for multiprogrammed computations," CACM, vol. 9, pp. 143-155, 1966.
    • (1966) CACM , vol.9 , pp. 143-155
    • Dennis, J.B.1    Van Horn, E.C.2
  • 19
    • 0023292465 scopus 로고
    • Extending the noninterference version of MLS for SAT
    • Feb
    • J. T. Haigh and W. D. Young, "Extending the noninterference version of MLS for SAT," Trans. Softw. Engin., vol. 13, pp. 141-150, Feb 1987.
    • (1987) Trans. Softw. Engin. , vol.13 , pp. 141-150
    • Haigh, J.T.1    Young, W.D.2
  • 20
    • 34748884401 scopus 로고    scopus 로고
    • A robust machine code proof framework for highly secure applications
    • ACM
    • D. S. Hardin, E. W. Smith, and W. D. Young, "A robust machine code proof framework for highly secure applications," in ACL2 '06. ACM, 2006, pp. 11-20.
    • (2006) ACL2 '06 , pp. 11-20
    • Hardin, D.S.1    Smith, E.W.2    Young, W.D.3
  • 21
    • 84859701107 scopus 로고    scopus 로고
    • It's time for trustworthy systems
    • Mar
    • G. Heiser, T. Murray, and G. Klein, "It's time for trustworthy systems," IEEE: Security & Privacy, vol. 2012, no. 2, pp. 67-70, Mar 2012.
    • (2012) IEEE: Security & Privacy , vol.2012 , Issue.2 , pp. 67-70
    • Heiser, G.1    Murray, T.2    Klein, G.3
  • 22
    • 34547321335 scopus 로고    scopus 로고
    • Formal specification and verification of data separation in a separation kernel for an embedded system
    • ACM
    • C. L. Heitmeyer, M. Archer, E. I. Leonard, and J. McLean, "Formal specification and verification of data separation in a separation kernel for an embedded system," in 13th CCS. ACM, 2006, pp. 346-355.
    • (2006) 13th CCS , pp. 346-355
    • Heitmeyer, C.L.1    Archer, M.2    Leonard, E.I.3    McLean, J.4
  • 26
    • 61949206747 scopus 로고    scopus 로고
    • Operating system verification - An overview
    • Feb
    • G. Klein, "Operating system verification - an overview," Sādhanā, vol. 34, no. 1, pp. 27-69, Feb 2009.
    • (2009) Sādhanā , vol.34 , Issue.1 , pp. 27-69
    • Klein, G.1
  • 28
    • 70449657350 scopus 로고    scopus 로고
    • Noninterference for a practical DIFC-based operating system
    • M. Krohn and E. Tromer, "Noninterference for a practical DIFC-based operating system," in IEEE Symp. Security & Privacy, 2009, pp. 61-76.
    • IEEE Symp. Security & Privacy, 2009 , pp. 61-76
    • Krohn, M.1    Tromer, E.2
  • 30
    • 0017512599 scopus 로고
    • LINEAR TIME ALGORITHM FOR DECIDING SUBJECT SECURITY.
    • R. J. Lipton and L. Snyder, "A linear time algorithm for deciding subject security," J. ACM, vol. 24, no. 3, pp. 455-464, 1977. (Pubitemid 8549592)
    • (1977) J Assoc Comput Mach , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 31
    • 48249125979 scopus 로고    scopus 로고
    • Formal construction of the mathematically analyzed separation kernel
    • W. B. Martin, P. White, F. Taylor, and A. Goldberg, "Formal construction of the mathematically analyzed separation kernel," in 15th ASE, 2000, pp. 133-141.
    • 15th ASE, 2000 , pp. 133-141
    • Martin, W.B.1    White, P.2    Taylor, F.3    Goldberg, A.4
  • 32
    • 0036684901 scopus 로고    scopus 로고
    • Creating high confidence in a separation kernel
    • W. B. Martin, P. D. White, and F. S. Taylor, "Creating high confidence in a separation kernel," Automated Softw. Engin., vol. 9, no. 3, pp. 263-284, 2002.
    • (2002) Automated Softw. Engin. , vol.9 , Issue.3 , pp. 263-284
    • Martin, W.B.1    White, P.D.2    Taylor, F.S.3
  • 33
    • 84868228675 scopus 로고    scopus 로고
    • Extensible specifications for automatic re-use of specifications and proofs
    • 10th SEFM, ser. Oct
    • D. Matichuk and T. Murray, "Extensible specifications for automatic re-use of specifications and proofs," in 10th SEFM, ser. LNCS, vol. 7504, Oct 2012, pp. 333-341.
    • (2012) LNCS , vol.7504 , pp. 333-341
    • Matichuk, D.1    Murray, T.2
  • 34
    • 38049082649 scopus 로고    scopus 로고
    • What, indeed, is intransitive noninterference?
    • 12th ESORICS, ser. Springer
    • van der Meyden, Ron, "What, indeed, is intransitive noninterference?" in 12th ESORICS, ser. LNCS, vol. 4734. Springer, 2007, pp. 235-250.
    • (2007) LNCS , vol.4734 , pp. 235-250
    • Van Der Meyden, R.1
  • 35
    • 69249221419 scopus 로고    scopus 로고
    • On refinement-closed security properties and nondeterministic compositions
    • 8th AVoCS, ser. Glasgow, UK
    • T. Murray and G. Lowe, "On refinement-closed security properties and nondeterministic compositions," in 8th AVoCS, ser. ENTCS, vol. 250, Glasgow, UK, 2009, pp. 49-68.
    • (2009) ENTCS , vol.250 , pp. 49-68
    • Murray, T.1    Lowe, G.2
  • 36
    • 84869842599 scopus 로고    scopus 로고
    • Noninterference for operating system kernels
    • 2nd CPP, ser. Springer, Dec
    • T. Murray, D. Matichuk, M. Brassil, P. Gammie, and G. Klein, "Noninterference for operating system kernels," in 2nd CPP, ser. LNCS, vol. 7679. Springer, Dec 2012, pp. 126-142.
    • (2012) LNCS , vol.7679 , pp. 126-142
    • Murray, T.1    Matichuk, D.2    Brassil, M.3    Gammie, P.4    Klein, G.5
  • 37
    • 38049029613 scopus 로고    scopus 로고
    • Using XCAP to certify realistic system code: Machine context management
    • 20th TPHOLs, ser. Sep
    • Z. Ni, D. Yu, and Z. Shao, "Using XCAP to certify realistic system code: Machine context management," in 20th TPHOLs, ser. LNCS, vol. 4732, Sep 2007, pp. 189-206.
    • (2007) LNCS , vol.4732 , pp. 189-206
    • Ni, Z.1    Yu, D.2    Shao, Z.3
  • 38
    • 0348126394 scopus 로고    scopus 로고
    • Isabelle/HOL - A Proof Assistant for Higher-Order Logic
    • ser. Springer
    • T. Nipkow, L. Paulson, and M. Wenzel, Isabelle/HOL - A Proof Assistant for Higher-Order Logic, ser. LNCS. Springer, 2002, vol. 2283.
    • (2002) LNCS , vol.2283
    • Nipkow, T.1    Paulson, L.2    Wenzel, M.3
  • 40
    • 35048854255 scopus 로고    scopus 로고
    • Information flow control revisited: Noninfluence = noninterference + nonleakage
    • 9th ESORICS, ser.
    • von Oheimb, David, "Information flow control revisited: Noninfluence = noninterference + nonleakage," in 9th ESORICS, ser. LNCS, vol. 3193, 2004, pp. 225-243.
    • (2004) LNCS , vol.3193 , pp. 225-243
    • Von Oheimb, D.1
  • 45
    • 34748819865 scopus 로고    scopus 로고
    • Rockwell Collins, Inc.
    • Rockwell Collins, Inc., AAMP7r1 Reference Manual, 2003.
    • (2003) AAMP7r1 Reference Manual
  • 48
    • 0037251378 scopus 로고    scopus 로고
    • Language-based information-flow security
    • Jan
    • A. Sabelfeld and A. Myers, "Language-based information-flow security," J. Selected Areas Comm., vol. 21, no. 1, pp. 5-19, Jan 2003.
    • (2003) J. Selected Areas Comm. , vol.21 , Issue.1 , pp. 5-19
    • Sabelfeld, A.1    Myers, A.2
  • 50
    • 84883102600 scopus 로고    scopus 로고
    • Translation validation for a verified OS kernel
    • ACM, to appear
    • T. Sewell, M. Myreen, and G. Klein, "Translation validation for a verified OS kernel," in PLDI 2013. ACM, 2013, to appear.
    • (2013) PLDI 2013
    • Sewell, T.1    Myreen, M.2    Klein, G.3
  • 51
    • 80052184715 scopus 로고    scopus 로고
    • seL4 enforces integrity
    • 2nd ITP, ser. Springer, Aug
    • T. Sewell, S. Winwood, P. Gammie, T. Murray, J. Andronick, and G. Klein, "seL4 enforces integrity," in 2nd ITP, ser. LNCS, vol. 6898. Springer, Aug 2011, pp. 325-340.
    • (2011) LNCS , vol.6898 , pp. 325-340
    • Sewell, T.1    Winwood, S.2    Gammie, P.3    Murray, T.4    Andronick, J.5    Klein, G.6
  • 52
    • 34548205807 scopus 로고    scopus 로고
    • Types, bytes, and separation logic
    • ACM
    • H. Tuch, G. Klein, and M. Norrish, "Types, bytes, and separation logic," in 34th POPL. ACM, 2007, pp. 97-108.
    • (2007) 34th POPL , pp. 97-108
    • Tuch, H.1    Klein, G.2    Norrish, M.3
  • 53
    • 0018983212 scopus 로고
    • Specification and verification of the UCLA Unix security kernel
    • B. J. Walker, R. A. Kemmerer, and G. J. Popek, "Specification and verification of the UCLA Unix security kernel," CACM, vol. 23, no. 2, pp. 118-131, 1980.
    • (1980) CACM , vol.23 , Issue.2 , pp. 118-131
    • Walker, B.J.1    Kemmerer, R.A.2    Popek, G.J.3
  • 54
    • 80155195722 scopus 로고    scopus 로고
    • Making information flow explicit in HiStar
    • Nov
    • N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières, "Making information flow explicit in HiStar," CACM, vol. 54, no. 11, pp. 93-101, Nov 2011.
    • (2011) CACM , vol.54 , Issue.11 , pp. 93-101
    • Zeldovich, N.1    Boyd-Wickizer, S.2    Kohler, E.3    Mazières, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.