To achieve security certification according to the highest levels of assurance, formal models and proofs of security properties are required. In the MILS context, this includes formalisation of key components – such as separation kernels – and the formalisation of applications built on top of these verified components. In the second chapter of this document, we use the Isabelle/HOL proof assistant to formalise the Firewall application built on top of a verified separation kernel according to the model of Greve, Wilding, and Vanfleet (GWV). This Firewall application has been formalised twice after the original effort by GWV. These different efforts have been compared and discussed on paper. Our main contribution is to provide a formal compar...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
The safety and security of software systems depends on how they are initially configured. Manually w...
We embed an untyped security protocol model in the interactive the-orem prover Isabelle/HOL and deri...
To achieve security certification according to the highest levels of assurance, formal models and pr...
To achieve security certification according to the highest levels of assurance, formal models and pr...
To achieve the highest levels of assurance, MILS architectures need to be formally analysed. A key c...
To achieve the highest levels of assurance, systems based on the MILS architecture need to be formal...
Security modeling is the foundation to formal verification which is a core requirement for high ass...
International audienceSafety-critical systems are used in many domains (military, avionics, aerospac...
PikeOS is an industrial operating system for safety and security critical applications in, for examp...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
The date of receipt and acceptance will be inserted by the editor Abstract. We present a method for ...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
We present an advanced modeling and verification toolbox for functional programs with state and exce...
A separation kernel simulates a distributed environment us-ing a single physical machine by executin...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
The safety and security of software systems depends on how they are initially configured. Manually w...
We embed an untyped security protocol model in the interactive the-orem prover Isabelle/HOL and deri...
To achieve security certification according to the highest levels of assurance, formal models and pr...
To achieve security certification according to the highest levels of assurance, formal models and pr...
To achieve the highest levels of assurance, MILS architectures need to be formally analysed. A key c...
To achieve the highest levels of assurance, systems based on the MILS architecture need to be formal...
Security modeling is the foundation to formal verification which is a core requirement for high ass...
International audienceSafety-critical systems are used in many domains (military, avionics, aerospac...
PikeOS is an industrial operating system for safety and security critical applications in, for examp...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
The date of receipt and acceptance will be inserted by the editor Abstract. We present a method for ...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
We present an advanced modeling and verification toolbox for functional programs with state and exce...
A separation kernel simulates a distributed environment us-ing a single physical machine by executin...
The certMILS project (http://www.certmils.eu/) aims at easing building and certification of complex ...
The safety and security of software systems depends on how they are initially configured. Manually w...
We embed an untyped security protocol model in the interactive the-orem prover Isabelle/HOL and deri...