We present the VFiasco project, in which we apply source-code verification to a complete operating-system kernel written in C++. The aim of the VFiasco project is to establish security-relevant properties of the Fiasco mi-crokernel. Source-code verification works by reasoning about the semantics of the full source code of a program. Tradition-ally it is limited to small programs written in an academic programming language. The project’s main challenges are to enable high-level reasoning about typed data starting from only low-level knowledge about the hardware, and to develop a clean semantics for the subset of C++ used by the kernel. In this extended abstract we present our ideas for tackling these challenges. We focus on a type-safe objec...
We report on the formal, machine-checked verification of the seL4 microkernel from an abstract speci...
In the paper we examine one of the issues in designing, specifying, implementing and formally verify...
completed and in this article I’m showing what we have proved and what that means for security. The ...
SIGLEAvailable from TIB Hannover: RR 7739(02-03) / FIZ - Fachinformationszzentrum Karlsruhe / TIB - ...
In order to formally reason about low-level system programs one needs a semantics (for the programmi...
In order to formally reason about low-level system programs one needs a semantics (for the programmi...
Abstract. In this paper, we are giving an overview of the ongoing VerisoftXT Avionics project report...
AbstractPrimitives are basic means provided by a microkernel to implementors of operating system ser...
Complete formal verification is the only known way to guar-antee that a system is free of programmin...
Abstract. Primitives are basic means provided by a microkernel to im-plementors of operating system ...
Abstract—Often, an integrated mixed-criticality system is built in an environment which provides sep...
The proliferation of kernel mode malware and rootkits over the last decade is one of the most critic...
This paper reviews the concepts and mechanisms used to improve security in general purpose operating...
Abstract. In the context of the Verisoft XT project functional correctness of the microkernel of Pik...
There is increasing pressure on providing a high degree of assurance of operation system’s security ...
We report on the formal, machine-checked verification of the seL4 microkernel from an abstract speci...
In the paper we examine one of the issues in designing, specifying, implementing and formally verify...
completed and in this article I’m showing what we have proved and what that means for security. The ...
SIGLEAvailable from TIB Hannover: RR 7739(02-03) / FIZ - Fachinformationszzentrum Karlsruhe / TIB - ...
In order to formally reason about low-level system programs one needs a semantics (for the programmi...
In order to formally reason about low-level system programs one needs a semantics (for the programmi...
Abstract. In this paper, we are giving an overview of the ongoing VerisoftXT Avionics project report...
AbstractPrimitives are basic means provided by a microkernel to implementors of operating system ser...
Complete formal verification is the only known way to guar-antee that a system is free of programmin...
Abstract. Primitives are basic means provided by a microkernel to im-plementors of operating system ...
Abstract—Often, an integrated mixed-criticality system is built in an environment which provides sep...
The proliferation of kernel mode malware and rootkits over the last decade is one of the most critic...
This paper reviews the concepts and mechanisms used to improve security in general purpose operating...
Abstract. In the context of the Verisoft XT project functional correctness of the microkernel of Pik...
There is increasing pressure on providing a high degree of assurance of operation system’s security ...
We report on the formal, machine-checked verification of the seL4 microkernel from an abstract speci...
In the paper we examine one of the issues in designing, specifying, implementing and formally verify...
completed and in this article I’m showing what we have proved and what that means for security. The ...