-
1
-
-
0026154452
-
The existence of refinement mappings
-
M. Abadi and L. Lamport, "The existence of refinement mappings," Theor. Comput. Sci., vol. 82, pp. 253-284, 1991.
-
(1991)
Theor. Comput. Sci.
, vol.82
, pp. 253-284
-
-
Abadi, M.1
Lamport, L.2
-
2
-
-
77957057054
-
Pervasive verification of an OS microkernel
-
VSTTE 2010, ser. Springer, Aug
-
E. Alkassar, W. Paul, A. Starostin, and A. Tsyban, "Pervasive verification of an OS microkernel," in VSTTE 2010, ser. LNCS, vol. 6217. Springer, Aug 2010, pp. 71-85.
-
(2010)
LNCS
, vol.6217
, pp. 71-85
-
-
Alkassar, E.1
Paul, W.2
Starostin, A.3
Tsyban, A.4
-
4
-
-
35048839749
-
Information flow analysis in logical form
-
SAS '04, ser. Springer
-
T. Amtoft and A. Banerjee, "Information flow analysis in logical form," in SAS '04, ser. LNCS, vol. 3148. Springer, 2004, pp. 33-36.
-
(2004)
LNCS
, vol.3148
, pp. 33-36
-
-
Amtoft, T.1
Banerjee, A.2
-
5
-
-
58049149107
-
Verification condition generation for conditional information flow
-
ACM
-
-, "Verification condition generation for conditional information flow," in FMSE '07. ACM, 2007, pp. 2-11.
-
(2007)
FMSE '07
, pp. 2-11
-
-
Amtoft, T.1
Banerjee, A.2
-
6
-
-
84881233051
-
Formal system verification - extension, AOARD 114070
-
Tech. Rep. 1833-9646-5926, May
-
J. Andronick, G. Klein, and A. Boyton, "Formal system verification - extension, AOARD 114070," NICTA, Sydney, Australia, Tech. Rep. 1833-9646-5926, May 2012.
-
(2012)
NICTA, Sydney, Australia
-
-
Andronick, J.1
Klein, G.2
Boyton, A.3
-
7
-
-
21644433634
-
Xen and the art of virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization," in 19th SOSP, Oct 2003, pp. 164-177.
-
19th SOSP, Oct 2003
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
8
-
-
79959987865
-
Formally verifying isolation and availability in an idealized model of virtualization
-
17th FM, ser. Springer
-
G. Barthe, G. Betarte, J. D. Campo, and C. Luna, "Formally verifying isolation and availability in an idealized model of virtualization," in 17th FM, ser. LNCS, vol. 6664. Springer, 2011, pp. 231-245.
-
(2011)
LNCS
, vol.6664
, pp. 231-245
-
-
Barthe, G.1
Betarte, G.2
Campo, J.D.3
Luna, C.4
-
9
-
-
84866951418
-
Cache-leakage resilient OS isolation in an idealized model of virtualization
-
-, "Cache-leakage resilient OS isolation in an idealized model of virtualization," in 25th CSF, 2012, pp. 186-197.
-
25th CSF, 2012
, pp. 186-197
-
-
Barthe, G.1
Betarte, G.2
Campo, J.D.3
Luna, C.4
-
10
-
-
2442575906
-
Simple relational correctness proofs for static analyses and program transformations
-
ACM
-
N. Benton, "Simple relational correctness proofs for static analyses and program transformations," in POPL 2004. ACM, 2004, pp. 14-25.
-
(2004)
POPL 2004
, pp. 14-25
-
-
Benton, N.1
-
11
-
-
0024772234
-
Kit: A study in operating system verification
-
W. R. Bevier, "Kit: A study in operating system verification," Trans. Softw. Engin., vol. 15, no. 11, pp. 1382-1396, 1989.
-
(1989)
Trans. Softw. Engin.
, vol.15
, Issue.11
, pp. 1382-1396
-
-
Bevier, W.R.1
-
12
-
-
84856547218
-
Timing analysis of a protected operating system kernel
-
B. Blackham, Y. Shi, S. Chattopadhyay, A. Roychoudhury, and G. Heiser, "Timing analysis of a protected operating system kernel," in 32nd RTSS, Nov 2011, pp. 339-348.
-
32nd RTSS, Nov 2011
, pp. 339-348
-
-
Blackham, B.1
Shi, Y.2
Chattopadhyay, S.3
Roychoudhury, A.4
Heiser, G.5
-
13
-
-
33749388677
-
Formal verification of a C compiler front-end
-
14th FM, ser. Springer
-
S. Blazy, Z. Dargaye, and X. Leroy, "Formal verification of a C compiler front-end," in 14th FM, ser. LNCS, vol. 4085. Springer, 2006, pp. 460-475.
-
(2006)
LNCS
, vol.4085
, pp. 460-475
-
-
Blazy, S.1
Dargaye, Z.2
Leroy, X.3
-
14
-
-
57049118010
-
Secure microkernels, state monads and scalable refinement
-
21st TPHOLs, ser. Springer, Aug
-
D. Cock, G. Klein, and T. Sewell, "Secure microkernels, state monads and scalable refinement," in 21st TPHOLs, ser. LNCS, vol. 5170. Springer, Aug 2008, pp. 167-182.
-
(2008)
LNCS
, vol.5170
, pp. 167-182
-
-
Cock, D.1
Klein, G.2
Sewell, T.3
-
16
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
J. B. Dennis and E. C. Van Horn, "Programming semantics for multiprogrammed computations," CACM, vol. 9, pp. 143-155, 1966.
-
(1966)
CACM
, vol.9
, pp. 143-155
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
17
-
-
85072519230
-
The foundations of a provably secure operating system (PSOS)
-
R. J. Feiertag and P. G. Neumann, "The foundations of a provably secure operating system (PSOS)," in AFIPS Conf. Proc., 1979 National Comp. Conf., Jun 1979, pp. 329-334.
-
AFIPS Conf. Proc., 1979 National Comp. Conf., Jun 1979
, pp. 329-334
-
-
Feiertag, R.J.1
Neumann, P.G.2
-
19
-
-
0023292465
-
Extending the noninterference version of MLS for SAT
-
Feb
-
J. T. Haigh and W. D. Young, "Extending the noninterference version of MLS for SAT," Trans. Softw. Engin., vol. 13, pp. 141-150, Feb 1987.
-
(1987)
Trans. Softw. Engin.
, vol.13
, pp. 141-150
-
-
Haigh, J.T.1
Young, W.D.2
-
20
-
-
34748884401
-
A robust machine code proof framework for highly secure applications
-
ACM
-
D. S. Hardin, E. W. Smith, and W. D. Young, "A robust machine code proof framework for highly secure applications," in ACL2 '06. ACM, 2006, pp. 11-20.
-
(2006)
ACL2 '06
, pp. 11-20
-
-
Hardin, D.S.1
Smith, E.W.2
Young, W.D.3
-
21
-
-
84859701107
-
It's time for trustworthy systems
-
Mar
-
G. Heiser, T. Murray, and G. Klein, "It's time for trustworthy systems," IEEE: Security & Privacy, vol. 2012, no. 2, pp. 67-70, Mar 2012.
-
(2012)
IEEE: Security & Privacy
, vol.2012
, Issue.2
, pp. 67-70
-
-
Heiser, G.1
Murray, T.2
Klein, G.3
-
22
-
-
34547321335
-
Formal specification and verification of data separation in a separation kernel for an embedded system
-
ACM
-
C. L. Heitmeyer, M. Archer, E. I. Leonard, and J. McLean, "Formal specification and verification of data separation in a separation kernel for an embedded system," in 13th CCS. ACM, 2006, pp. 346-355.
-
(2006)
13th CCS
, pp. 346-355
-
-
Heitmeyer, C.L.1
Archer, M.2
Leonard, E.I.3
McLean, J.4
-
23
-
-
40449092394
-
Applying formal methods to a certifiably secure software system
-
-, "Applying formal methods to a certifiably secure software system," IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 82-98, 2008.
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 82-98
-
-
Heitmeyer, C.L.1
Archer, M.2
Leonard, E.I.3
McLean, J.4
-
26
-
-
61949206747
-
Operating system verification - An overview
-
Feb
-
G. Klein, "Operating system verification - an overview," Sādhanā, vol. 34, no. 1, pp. 27-69, Feb 2009.
-
(2009)
Sādhanā
, vol.34
, Issue.1
, pp. 27-69
-
-
Klein, G.1
-
27
-
-
72249120603
-
seL4: Formal verification of an OS kernel
-
Big Sky, MT, USA: ACM, Oct
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood, "seL4: Formal verification of an OS kernel," in 22nd SOSP. Big Sky, MT, USA: ACM, Oct 2009, pp. 207-220.
-
(2009)
22nd SOSP
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
28
-
-
70449657350
-
Noninterference for a practical DIFC-based operating system
-
M. Krohn and E. Tromer, "Noninterference for a practical DIFC-based operating system," in IEEE Symp. Security & Privacy, 2009, pp. 61-76.
-
IEEE Symp. Security & Privacy, 2009
, pp. 61-76
-
-
Krohn, M.1
Tromer, E.2
-
29
-
-
56349105212
-
Wombat: A portable user-mode Linux for embedded systems
-
B. Leslie, C. van Schaik, and G. Heiser, "Wombat: A portable user-mode Linux for embedded systems," in 6th Linux.conf.au, Canberra, Apr 2005.
-
6th Linux.Conf.Au, Canberra, Apr 2005
-
-
Leslie, B.1
Van Schaik, C.2
Heiser, G.3
-
30
-
-
0017512599
-
LINEAR TIME ALGORITHM FOR DECIDING SUBJECT SECURITY.
-
R. J. Lipton and L. Snyder, "A linear time algorithm for deciding subject security," J. ACM, vol. 24, no. 3, pp. 455-464, 1977. (Pubitemid 8549592)
-
(1977)
J Assoc Comput Mach
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
31
-
-
48249125979
-
Formal construction of the mathematically analyzed separation kernel
-
W. B. Martin, P. White, F. Taylor, and A. Goldberg, "Formal construction of the mathematically analyzed separation kernel," in 15th ASE, 2000, pp. 133-141.
-
15th ASE, 2000
, pp. 133-141
-
-
Martin, W.B.1
White, P.2
Taylor, F.3
Goldberg, A.4
-
32
-
-
0036684901
-
Creating high confidence in a separation kernel
-
W. B. Martin, P. D. White, and F. S. Taylor, "Creating high confidence in a separation kernel," Automated Softw. Engin., vol. 9, no. 3, pp. 263-284, 2002.
-
(2002)
Automated Softw. Engin.
, vol.9
, Issue.3
, pp. 263-284
-
-
Martin, W.B.1
White, P.D.2
Taylor, F.S.3
-
33
-
-
84868228675
-
Extensible specifications for automatic re-use of specifications and proofs
-
10th SEFM, ser. Oct
-
D. Matichuk and T. Murray, "Extensible specifications for automatic re-use of specifications and proofs," in 10th SEFM, ser. LNCS, vol. 7504, Oct 2012, pp. 333-341.
-
(2012)
LNCS
, vol.7504
, pp. 333-341
-
-
Matichuk, D.1
Murray, T.2
-
34
-
-
38049082649
-
What, indeed, is intransitive noninterference?
-
12th ESORICS, ser. Springer
-
van der Meyden, Ron, "What, indeed, is intransitive noninterference?" in 12th ESORICS, ser. LNCS, vol. 4734. Springer, 2007, pp. 235-250.
-
(2007)
LNCS
, vol.4734
, pp. 235-250
-
-
Van Der Meyden, R.1
-
35
-
-
69249221419
-
On refinement-closed security properties and nondeterministic compositions
-
8th AVoCS, ser. Glasgow, UK
-
T. Murray and G. Lowe, "On refinement-closed security properties and nondeterministic compositions," in 8th AVoCS, ser. ENTCS, vol. 250, Glasgow, UK, 2009, pp. 49-68.
-
(2009)
ENTCS
, vol.250
, pp. 49-68
-
-
Murray, T.1
Lowe, G.2
-
36
-
-
84869842599
-
Noninterference for operating system kernels
-
2nd CPP, ser. Springer, Dec
-
T. Murray, D. Matichuk, M. Brassil, P. Gammie, and G. Klein, "Noninterference for operating system kernels," in 2nd CPP, ser. LNCS, vol. 7679. Springer, Dec 2012, pp. 126-142.
-
(2012)
LNCS
, vol.7679
, pp. 126-142
-
-
Murray, T.1
Matichuk, D.2
Brassil, M.3
Gammie, P.4
Klein, G.5
-
37
-
-
38049029613
-
Using XCAP to certify realistic system code: Machine context management
-
20th TPHOLs, ser. Sep
-
Z. Ni, D. Yu, and Z. Shao, "Using XCAP to certify realistic system code: Machine context management," in 20th TPHOLs, ser. LNCS, vol. 4732, Sep 2007, pp. 189-206.
-
(2007)
LNCS
, vol.4732
, pp. 189-206
-
-
Ni, Z.1
Yu, D.2
Shao, Z.3
-
38
-
-
0348126394
-
Isabelle/HOL - A Proof Assistant for Higher-Order Logic
-
ser. Springer
-
T. Nipkow, L. Paulson, and M. Wenzel, Isabelle/HOL - A Proof Assistant for Higher-Order Logic, ser. LNCS. Springer, 2002, vol. 2283.
-
(2002)
LNCS
, vol.2283
-
-
Nipkow, T.1
Paulson, L.2
Wenzel, M.3
-
40
-
-
35048854255
-
Information flow control revisited: Noninfluence = noninterference + nonleakage
-
9th ESORICS, ser.
-
von Oheimb, David, "Information flow control revisited: Noninfluence = noninterference + nonleakage," in 9th ESORICS, ser. LNCS, vol. 3193, 2004, pp. 225-243.
-
(2004)
LNCS
, vol.3193
, pp. 225-243
-
-
Von Oheimb, D.1
-
43
-
-
61949206859
-
An overview of the kernelized secure operating system (KSOS)
-
T. Perrine, J. Codd, and B. Hardy, "An overview of the kernelized secure operating system (KSOS)," in Proceedings of the Seventh DoD/NBS Computer Security Initiative Conference, Sep 1984, pp. 146-160.
-
Proceedings of the Seventh DoD/NBS Computer Security Initiative Conference, Sep 1984
, pp. 146-160
-
-
Perrine, T.1
Codd, J.2
Hardy, B.3
-
45
-
-
34748819865
-
-
Rockwell Collins, Inc.
-
Rockwell Collins, Inc., AAMP7r1 Reference Manual, 2003.
-
(2003)
AAMP7r1 Reference Manual
-
-
-
46
-
-
0003502331
-
-
SRI International, Tech. Rep. CSL-92-02, Dec
-
J. Rushby, "Noninterference, transitivity, and channel-control security policies," SRI International, Tech. Rep. CSL-92-02, Dec 1992.
-
(1992)
Noninterference, Transitivity, and Channel-control Security Policies
-
-
Rushby, J.1
-
47
-
-
85041481084
-
Design and verification of secure systems
-
J. M. Rushby, "Design and verification of secure systems," in 8th SOSP, Pacific Grove, CA, USA, Dec 1981, pp. 12-21.
-
8th SOSP, Pacific Grove, CA, USA, Dec 1981
, pp. 12-21
-
-
Rushby, J.M.1
-
48
-
-
0037251378
-
Language-based information-flow security
-
Jan
-
A. Sabelfeld and A. Myers, "Language-based information-flow security," J. Selected Areas Comm., vol. 21, no. 1, pp. 5-19, Jan 2003.
-
(2003)
J. Selected Areas Comm.
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.2
-
49
-
-
61949225136
-
Locking computers securely
-
O. Saydjari, J. Beckman, and J. Leaman, "Locking computers securely," in 10th National Computer Security Conference, Sep 1987, pp. 129-141.
-
10th National Computer Security Conference, Sep 1987
, pp. 129-141
-
-
Saydjari, O.1
Beckman, J.2
Leaman, J.3
-
50
-
-
84883102600
-
Translation validation for a verified OS kernel
-
ACM, to appear
-
T. Sewell, M. Myreen, and G. Klein, "Translation validation for a verified OS kernel," in PLDI 2013. ACM, 2013, to appear.
-
(2013)
PLDI 2013
-
-
Sewell, T.1
Myreen, M.2
Klein, G.3
-
51
-
-
80052184715
-
seL4 enforces integrity
-
2nd ITP, ser. Springer, Aug
-
T. Sewell, S. Winwood, P. Gammie, T. Murray, J. Andronick, and G. Klein, "seL4 enforces integrity," in 2nd ITP, ser. LNCS, vol. 6898. Springer, Aug 2011, pp. 325-340.
-
(2011)
LNCS
, vol.6898
, pp. 325-340
-
-
Sewell, T.1
Winwood, S.2
Gammie, P.3
Murray, T.4
Andronick, J.5
Klein, G.6
-
52
-
-
34548205807
-
Types, bytes, and separation logic
-
ACM
-
H. Tuch, G. Klein, and M. Norrish, "Types, bytes, and separation logic," in 34th POPL. ACM, 2007, pp. 97-108.
-
(2007)
34th POPL
, pp. 97-108
-
-
Tuch, H.1
Klein, G.2
Norrish, M.3
-
53
-
-
0018983212
-
Specification and verification of the UCLA Unix security kernel
-
B. J. Walker, R. A. Kemmerer, and G. J. Popek, "Specification and verification of the UCLA Unix security kernel," CACM, vol. 23, no. 2, pp. 118-131, 1980.
-
(1980)
CACM
, vol.23
, Issue.2
, pp. 118-131
-
-
Walker, B.J.1
Kemmerer, R.A.2
Popek, G.J.3
-
54
-
-
80155195722
-
Making information flow explicit in HiStar
-
Nov
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières, "Making information flow explicit in HiStar," CACM, vol. 54, no. 11, pp. 93-101, Nov 2011.
-
(2011)
CACM
, vol.54
, Issue.11
, pp. 93-101
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|