We introduce the Syracuse Assured Boot Loader Executive (SABLE), a trustworthy secure loader. A trusted boot loader performs a cryptographic measurement (hash) of program code and executes it unconditionally, allowing later-stage software to verify the integrity of the system through local or remote attestation. A secure loader differs from a trusted loader in that it executes subsequent code only if measurements of that code match known-good values. We have applied a rigorous formal verification technique recently demonstrated in practice by NICTA in their verification of the seL4 microkernel. We summarize our design philosophy from a high level and present our formal verification strategy
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Low-trust architectures work on, from the viewpoint of software, always-encrypted data, and signific...
In today's world, critical infrastructure is often controlled by computing systems. This introduces ...
The function of software used to be calculation; mechanising what was previously done by hand. Now i...
Software is an increasingly integral and sophisticated part of safety- and mission-critical systems....
As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardwa...
We present recent work on building and scaling trustworthy systems with formal, machine-checkable pr...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
AbstractThis paper describes how formal methods were used to produce evidence in a certification, ba...
There is a strong link between software quality and software reliability. By decreasing the probabil...
International audienceThe fault of one device on a grid may incur severe economical or physical dama...
International audienceBoot firmware, like UEFI-compliant firmware, has been the target of numerous a...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
Formal verification carries the promise of absolute correctness, guaranteed at the highest level of ...
La maîtrise de la sécurité dans les systèmes embarqués communicants se heurte àun certain nombre de ...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Low-trust architectures work on, from the viewpoint of software, always-encrypted data, and signific...
In today's world, critical infrastructure is often controlled by computing systems. This introduces ...
The function of software used to be calculation; mechanising what was previously done by hand. Now i...
Software is an increasingly integral and sophisticated part of safety- and mission-critical systems....
As the number of so-called Internet-of-Things is continuously rising and the urge for regular hardwa...
We present recent work on building and scaling trustworthy systems with formal, machine-checkable pr...
This paper presents a formal verification framework and tool that evaluates the robustness of softwa...
AbstractThis paper describes how formal methods were used to produce evidence in a certification, ba...
There is a strong link between software quality and software reliability. By decreasing the probabil...
International audienceThe fault of one device on a grid may incur severe economical or physical dama...
International audienceBoot firmware, like UEFI-compliant firmware, has been the target of numerous a...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
Formal verification carries the promise of absolute correctness, guaranteed at the highest level of ...
La maîtrise de la sécurité dans les systèmes embarqués communicants se heurte àun certain nombre de ...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Low-trust architectures work on, from the viewpoint of software, always-encrypted data, and signific...
In today's world, critical infrastructure is often controlled by computing systems. This introduces ...