This thesis presents the design of a secured, software based hypervisor for certification purposes. The highest levels of certification require formal methods, which demonstrate the correctness of a product with regard to its specification using mathematical logic. Proven hardware is not available off-the-shelf. In order to reduce the Trusted Computing Base (TCB) and hence, the amount of specification and proofs to produce, virtualization mechanism are software-made. In addition, this enables virtualization on platforms which do not have virtualization-enabled hardware. The challenge for achieving this goal is twofold. On one hand, despite an existing documentation, the instruction set to be analysed has tedious corner cases, implementation...
Computer system are nowadays evolving quickly. The classical model which consists in associating a p...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
This thesis presents the design of a secured, software based hypervisor for certification purposes. ...
AbstractThe paper discusses the constructive framework for writing hypervisor on the top of the VM. ...
Hypervisors are a popular mechanism for implementing software virtualization. Since hypervisors exec...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Traditionally, in avionics, on-board aircraft software used to be totally separated from open-world ...
In this thesis we address the challenges of hypervisor verification for multicore processors. As a f...
A hypervisor is a software which virtualizes hardware resources, allowing several guest operating sy...
In order to host a general purpose operating system, hypervisors need to virtualize the CPU memory s...
Virtualization software is increasingly a part of the infrastructure behind our online activities. C...
Virtual Machine Introspection (VMI) consists inmonitoring VMs security from the hypervisor layer whi...
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and t...
Cette thèse présente une solution de co-hébergement sécurisée de plusieurs piles logicielles autonom...
Computer system are nowadays evolving quickly. The classical model which consists in associating a p...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...
This thesis presents the design of a secured, software based hypervisor for certification purposes. ...
AbstractThe paper discusses the constructive framework for writing hypervisor on the top of the VM. ...
Hypervisors are a popular mechanism for implementing software virtualization. Since hypervisors exec...
The business world is exhibiting a growing dependency on computer systems, their operations and th...
Traditionally, in avionics, on-board aircraft software used to be totally separated from open-world ...
In this thesis we address the challenges of hypervisor verification for multicore processors. As a f...
A hypervisor is a software which virtualizes hardware resources, allowing several guest operating sy...
In order to host a general purpose operating system, hypervisors need to virtualize the CPU memory s...
Virtualization software is increasingly a part of the infrastructure behind our online activities. C...
Virtual Machine Introspection (VMI) consists inmonitoring VMs security from the hypervisor layer whi...
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and t...
Cette thèse présente une solution de co-hébergement sécurisée de plusieurs piles logicielles autonom...
Computer system are nowadays evolving quickly. The classical model which consists in associating a p...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
An attacker who has gained access to a computer may want to run arbitrary programs of his choice, an...