Due to the new trend of integrating safe and secure functionalities into one separation kernel, security analysis of ARINC 653 as well as a formal specification with security proofs are thus significant for the development and certification of Separation Kernels (SKs). In this talk we present a specification development and security analysis method for ARINC SKs based on refinement. We present a security model for event-based non-Interference and a stepwise refinement framework that will allow us to check security on sequential SKs specifications. Moreover to be able to reason on SKs implementations running on top of multi-core architectures it is essential to deal with the interference of the environment between SKs ins...
Number of words = 45327, as counted by detex <report.tex> | wc-w. This report consists of 98 p...
Separation kernels mediate interaction between partitions in a secure system. System security polic...
Abstract. Separation kernels are key components in embedded applica-tions. Their small size and wide...
Assurance of information-flow security by formal methods is mandated in security certification of se...
Although many algorithms, hardware designs, and security protocols have been formally verified, form...
A separation kernel simulates a distributed environment us-ing a single physical machine by executin...
peer-reviewedThe best approach to verifying an IMA separation kernel is to use a (fixed) time-space...
A separation kernel provides temporal and spatial separation among applications or partitions. This ...
The key software component of a computer system is the operating-system kernel. Italways needs to be...
A separation-kernel-based operating system (OS) has been designed for use in secure embedded systems...
This thesis explores two kinds of program logics that have become important for modern program verif...
This paper presents the VerCors approach to verification of concurrent software. It first discusses ...
The security of embedded systems can be dramatically improved through the use of formally verified i...
Abstract. This paper presents the VerCors approach to verification of concurrent software. It first ...
The development of provably secure OS kernels represents a fundamental step in the creation of safe ...
Number of words = 45327, as counted by detex <report.tex> | wc-w. This report consists of 98 p...
Separation kernels mediate interaction between partitions in a secure system. System security polic...
Abstract. Separation kernels are key components in embedded applica-tions. Their small size and wide...
Assurance of information-flow security by formal methods is mandated in security certification of se...
Although many algorithms, hardware designs, and security protocols have been formally verified, form...
A separation kernel simulates a distributed environment us-ing a single physical machine by executin...
peer-reviewedThe best approach to verifying an IMA separation kernel is to use a (fixed) time-space...
A separation kernel provides temporal and spatial separation among applications or partitions. This ...
The key software component of a computer system is the operating-system kernel. Italways needs to be...
A separation-kernel-based operating system (OS) has been designed for use in secure embedded systems...
This thesis explores two kinds of program logics that have become important for modern program verif...
This paper presents the VerCors approach to verification of concurrent software. It first discusses ...
The security of embedded systems can be dramatically improved through the use of formally verified i...
Abstract. This paper presents the VerCors approach to verification of concurrent software. It first ...
The development of provably secure OS kernels represents a fundamental step in the creation of safe ...
Number of words = 45327, as counted by detex <report.tex> | wc-w. This report consists of 98 p...
Separation kernels mediate interaction between partitions in a secure system. System security polic...
Abstract. Separation kernels are key components in embedded applica-tions. Their small size and wide...