Hypervisors are low level execution platforms that provideisolated partitions on shared resources, allowing to design se-cure systems without using dedicated hardware devices. Akey requirement of this kind of solution is the formal verifi-cation of the software trusted computing base, preferably atthe binary level. We accomplish a detailed verification of anARMv7 tiny hypervisor, proving its correctness at the ma-chine code level. We present our verification strategy, whichmixes the usage of the theorem prover HOL4, the computa-tion of weakest preconditions, and the use of SMT solvers tolargely automate the verification process. The automationrelies on an integration of HOL4 with BAP, the Binary Anal-ysis Platform developed at CMU. To enabl...
In this thesis we address the challenges of hypervisor verification for multicore processors. As a f...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
this paper, a verification method is presented which combines the advantages of deduction style proo...
In order to host a general purpose operating system, hypervisors need to virtualize the CPU memory s...
Virtualization promises significant benefits in security, efficiency, dependability, and cost. Achie...
AbstractThis paper presents our solutions to some problems we encountered in an ongoing attempt to v...
Low level code is challenging: It lacks structure, it uses jumps and symbolic addresses, the control...
Hypervisors are a popular mechanism for implementing software virtualization. Since hypervisors exec...
Security-critical applications at the highest Evaluation Assurance Levels (EAL) require formal proof...
In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA...
Hypervisors are system software programs that virtualize the architecture they run on and are usuall...
The security of embedded systems can be dramatically improved through the use of formally verified i...
The security of embedded systems can be dramatically improved through the use of formally verified i...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
(27 pages)We propose a deductive-verification approach for proving partial-correctness and invarianc...
In this thesis we address the challenges of hypervisor verification for multicore processors. As a f...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
this paper, a verification method is presented which combines the advantages of deduction style proo...
In order to host a general purpose operating system, hypervisors need to virtualize the CPU memory s...
Virtualization promises significant benefits in security, efficiency, dependability, and cost. Achie...
AbstractThis paper presents our solutions to some problems we encountered in an ongoing attempt to v...
Low level code is challenging: It lacks structure, it uses jumps and symbolic addresses, the control...
Hypervisors are a popular mechanism for implementing software virtualization. Since hypervisors exec...
Security-critical applications at the highest Evaluation Assurance Levels (EAL) require formal proof...
In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA...
Hypervisors are system software programs that virtualize the architecture they run on and are usuall...
The security of embedded systems can be dramatically improved through the use of formally verified i...
The security of embedded systems can be dramatically improved through the use of formally verified i...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
(27 pages)We propose a deductive-verification approach for proving partial-correctness and invarianc...
In this thesis we address the challenges of hypervisor verification for multicore processors. As a f...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
this paper, a verification method is presented which combines the advantages of deduction style proo...