Although many algorithms, hardware designs, and security protocols have been formally verified, formal verification of the security of software is still rare. This is due in large part to the large size of software, which results in huge costs for verification. This paper describes a novel and practical approach to formally establishing the security of code. The approach begins with a welldefined set of security properties and, based on the properties, constructs a compact security model containing only information needed to reason about the properties. Our approach was formulated to provide evidence for a Common Criteria evaluation of an embedded software system which uses a separation kernel to enforce data separation. The paper describes...
Assurance of information-flow security by formal methods is mandated in security certification of se...
Due to the new trend of integrating safe and secure functionalities into one separation kernel, se...
This report is based on work at FFI towards the potential realization of a certifiable workstation f...
A separation-kernel-based operating system (OS) has been designed for use in secure embedded systems...
A separation kernel simulates a distributed environment us-ing a single physical machine by executin...
Abstract—Often, an integrated mixed-criticality system is built in an environment which provides sep...
peer-reviewedThe best approach to verifying an IMA separation kernel is to use a (fixed) time-space...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Number of words = 45327, as counted by detex <report.tex> | wc-w. This report consists of 98 p...
Separation kernels mediate interaction between partitions in a secure system. System security polic...
Abstract. Separation kernels are key components in embedded applica-tions. Their small size and wide...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
The development of provably secure OS kernels represents a fundamental step in the creation of safe ...
The security of embedded systems can be dramatically improved through the use of formally verified i...
The security of embedded systems can be dramatically improved through the use of formally verified i...
Assurance of information-flow security by formal methods is mandated in security certification of se...
Due to the new trend of integrating safe and secure functionalities into one separation kernel, se...
This report is based on work at FFI towards the potential realization of a certifiable workstation f...
A separation-kernel-based operating system (OS) has been designed for use in secure embedded systems...
A separation kernel simulates a distributed environment us-ing a single physical machine by executin...
Abstract—Often, an integrated mixed-criticality system is built in an environment which provides sep...
peer-reviewedThe best approach to verifying an IMA separation kernel is to use a (fixed) time-space...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Number of words = 45327, as counted by detex <report.tex> | wc-w. This report consists of 98 p...
Separation kernels mediate interaction between partitions in a secure system. System security polic...
Abstract. Separation kernels are key components in embedded applica-tions. Their small size and wide...
Secure systems are often built around a “security kernel”—a relatively small and simple component th...
The development of provably secure OS kernels represents a fundamental step in the creation of safe ...
The security of embedded systems can be dramatically improved through the use of formally verified i...
The security of embedded systems can be dramatically improved through the use of formally verified i...
Assurance of information-flow security by formal methods is mandated in security certification of se...
Due to the new trend of integrating safe and secure functionalities into one separation kernel, se...
This report is based on work at FFI towards the potential realization of a certifiable workstation f...