2008
DOI: 10.1109/tse.2007.70772
|View full text |Cite
|
Sign up to set email alerts
|

Applying Formal Methods to a Certifiably Secure Software System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
64
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 66 publications
(64 citation statements)
references
References 30 publications
0
64
0
Order By: Relevance
“…For security, the kernel and the processor must both be correct and agree on their mode of interaction. Most formal kernel analyses in the literature [7,12,13,15,18] address the kernel software itself, in source or binary form, and leave the properties of the instruction set architecture (ISA) to be handled by at. Our contribution is to suggest a possible approach, including tool support, for performing the ISA speci c security analysis, speci cally for user mode execution.…”
Section: Introductionmentioning
confidence: 99%
“…For security, the kernel and the processor must both be correct and agree on their mode of interaction. Most formal kernel analyses in the literature [7,12,13,15,18] address the kernel software itself, in source or binary form, and leave the properties of the instruction set architecture (ISA) to be handled by at. Our contribution is to suggest a possible approach, including tool support, for performing the ISA speci c security analysis, speci cally for user mode execution.…”
Section: Introductionmentioning
confidence: 99%
“…the parts of the state the guest is not supposed to be able to write, such as non-guest memory, inaccessible processor registers and status flags, and the abstract state. We view this as an integrity property, similar to the nonexfiltration property of [13]. 3.…”
Section: Tls Consistency Propertiesmentioning
confidence: 99%
“…These properties, as in [13], are qualitatively different: The integrity property is first-order, and concerns the inability of the guest to directly write some other state variables. Since it is under guest control when and how to invoke the virtualization API, there are plenty of indirect communication channels connecting guests to the hypervisor.…”
Section: Tls Consistency Propertiesmentioning
confidence: 99%
See 2 more Smart Citations