The isolation of security critical components from an untrusted OS allows to both protect applications and to harden the OS itself. Virtualization of the memory subsystem is a key component to provide such isolation. We present the design, implementation and verification of a memory virtualization platform for ARMv7-A processors. The design is based on direct paging, an MMU virtualization mechanism previously introduced by Xen. It is shown that this mechanism can be implemented using a compact design, suitable for formal verification down to a low level of abstraction, without penalizing system performance. The verification is performed using the HOL4 theorem prover and uses a detailed model of the processor. We prove memory isolation along...
The growing demand of new functionalities in modern embedded real-time systems has led chip makers t...
Hypervisors are a popular mechanism for implementing software virtualization. Since hypervisors exec...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
In order to host a general purpose operating system, hypervisors need to virtualize the CPU memory s...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA...
Virtual memory is an essential mechanism for enforcing security boundaries, but its relaxed-memory c...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
Separation between processes on top of an operating system or between guests in a virtualized enviro...
We present an analysis of the virtualizability of the ARMv7-A architecture carried out in the contex...
The security of embedded systems can be dramatically improved through the use of formally verified i...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
In recent years, powerful handheld computing devices such as personal digital assistants and mobile ...
The growing demand of new functionalities in modern embedded real-time systems has led chip makers t...
Hypervisors are a popular mechanism for implementing software virtualization. Since hypervisors exec...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
The isolation of security critical components from an untrusted OS allows to both protect applicatio...
In order to host a general purpose operating system, hypervisors need to virtualize the CPU memory s...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA...
Virtual memory is an essential mechanism for enforcing security boundaries, but its relaxed-memory c...
This paper presents the first results from the ongoing research project HASPOC, developing a high as...
Separation between processes on top of an operating system or between guests in a virtualized enviro...
We present an analysis of the virtualizability of the ARMv7-A architecture carried out in the contex...
The security of embedded systems can be dramatically improved through the use of formally verified i...
ENGELSK: A monolithic operating system (OS) - such as Windows or Linux - distinguish between executi...
In recent years, powerful handheld computing devices such as personal digital assistants and mobile ...
The growing demand of new functionalities in modern embedded real-time systems has led chip makers t...
Hypervisors are a popular mechanism for implementing software virtualization. Since hypervisors exec...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...