For the verification of system software, information flow properties of the instruction set architecture (ISA) are essential.They show how information propagates through the processor, including sometimes opaque control registers.Thus, they can be used to guarantee that user processes cannot infer the state of privileged system components, such as secure partitions.Formal ISA models - for example for the HOL4 theorem prover - have been available for a number of years. However, little work has been published on the formal analysis of these models.In this paper, we present a general framework for proving information flow properties of a number of ISAs automatically, for example for ARM.The analysis is represented in HOL4 using a direct semant...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Current standard security practices do not provide substantial assurance about information flow secu...
Component-based software engineering often relies on libraries of trusted components that are combin...
For the verification of system software, information flow properties of the instruction set architec...
In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA...
Separation between processes on top of an operating system or between guests in a virtualized enviro...
International audienceSAFE is a clean-slate design for a highly secure computer system, with pervasi...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
The security of embedded systems can be dramatically improved through the use of formally verified i...
SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for trac...
The Machine Independent Language (MIL) captures microarchitectural features such as out-of-order exe...
A separation kernel simulates a distributed environment using a single physical machine by executing...
Architecture specifications notionally define the fundamental interface between hardware and softwar...
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementin...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Current standard security practices do not provide substantial assurance about information flow secu...
Component-based software engineering often relies on libraries of trusted components that are combin...
For the verification of system software, information flow properties of the instruction set architec...
In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA...
Separation between processes on top of an operating system or between guests in a virtualized enviro...
International audienceSAFE is a clean-slate design for a highly secure computer system, with pervasi...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
The security of embedded systems can be dramatically improved through the use of formally verified i...
SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for trac...
The Machine Independent Language (MIL) captures microarchitectural features such as out-of-order exe...
A separation kernel simulates a distributed environment using a single physical machine by executing...
Architecture specifications notionally define the fundamental interface between hardware and softwar...
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementin...
Abstract. Current standard security practices do not provide substan-tial assurance about informatio...
Current standard security practices do not provide substantial assurance about information flow secu...
Component-based software engineering often relies on libraries of trusted components that are combin...