Abstract—Often, an integrated mixed-criticality system is built in an environment which provides separation functionality for available on-board resources. In this paper we treat such an envi-ronment: the PikeOS separation kernel – a commercial real-time embedded operating system. PikeOS allows applications with different safety and security levels to run on the same hardware. Obviously, a mixed-criticality system built on PikeOS relies on the correct implementation of the separation mechanisms. In the context of the Verisoft XT [1] and TECOM [2] projects we apply deductive formal software verification to the PikeOS separation mechanisms in order to validate this security requirement. In this work we consider formal verification of a kernel...
With the recent dissemination of embedded systems, it has become important to verifiy low-level soft...
A separation-kernel-based operating system (OS) has been designed for use in secure embedded systems...
The security of embedded systems can be dramatically improved through the use of formally verified i...
Although many algorithms, hardware designs, and security protocols have been formally verified, form...
peer-reviewedThe best approach to verifying an IMA separation kernel is to use a (fixed) time-space...
Abstract. In this paper, we are giving an overview of the ongoing VerisoftXT Avionics project report...
The development of provably secure OS kernels represents a fundamental step in the creation of safe ...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Abstract. In the context of the Verisoft XT project functional correctness of the microkernel of Pik...
AbstractPrimitives are basic means provided by a microkernel to implementors of operating system ser...
This paper reviews the concepts and mechanisms used to improve security in general purpose operating...
Today's embedded systems are becoming increasingly complex. We are seeing many devices consolidate b...
A separation kernel provides temporal and spatial separation among applications or partitions. This ...
Abstract. Primitives are basic means provided by a microkernel to im-plementors of operating system ...
Abstract. We report on the first formal pervasive verification of an op-erating system microkernel f...
With the recent dissemination of embedded systems, it has become important to verifiy low-level soft...
A separation-kernel-based operating system (OS) has been designed for use in secure embedded systems...
The security of embedded systems can be dramatically improved through the use of formally verified i...
Although many algorithms, hardware designs, and security protocols have been formally verified, form...
peer-reviewedThe best approach to verifying an IMA separation kernel is to use a (fixed) time-space...
Abstract. In this paper, we are giving an overview of the ongoing VerisoftXT Avionics project report...
The development of provably secure OS kernels represents a fundamental step in the creation of safe ...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Abstract. In the context of the Verisoft XT project functional correctness of the microkernel of Pik...
AbstractPrimitives are basic means provided by a microkernel to implementors of operating system ser...
This paper reviews the concepts and mechanisms used to improve security in general purpose operating...
Today's embedded systems are becoming increasingly complex. We are seeing many devices consolidate b...
A separation kernel provides temporal and spatial separation among applications or partitions. This ...
Abstract. Primitives are basic means provided by a microkernel to im-plementors of operating system ...
Abstract. We report on the first formal pervasive verification of an op-erating system microkernel f...
With the recent dissemination of embedded systems, it has become important to verifiy low-level soft...
A separation-kernel-based operating system (OS) has been designed for use in secure embedded systems...
The security of embedded systems can be dramatically improved through the use of formally verified i...