2011
DOI: 10.1007/978-3-642-21437-0_19
|View full text |Cite
|
Sign up to set email alerts
|

Formally Verifying Isolation and Availability in an Idealized Model of Virtualization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
27
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(28 citation statements)
references
References 15 publications
1
27
0
Order By: Relevance
“…Some target information ow properties [7,12,15,18], based on variants of noninterference [11]. Other work establishes a re nement relation between kernel code, in some representation, and an abstract speci cation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Some target information ow properties [7,12,15,18], based on variants of noninterference [11]. Other work establishes a re nement relation between kernel code, in some representation, and an abstract speci cation.…”
Section: Related Workmentioning
confidence: 99%
“…For security, the kernel and the processor must both be correct and agree on their mode of interaction. Most formal kernel analyses in the literature [7,12,13,15,18] address the kernel software itself, in source or binary form, and leave the properties of the instruction set architecture (ISA) to be handled by at. Our contribution is to suggest a possible approach, including tool support, for performing the ISA speci c security analysis, speci cally for user mode execution.…”
Section: Introductionmentioning
confidence: 99%
“…Our work is inspired by the efforts by Gilles Barthe et al to formally verify an idealized model of virtualization [1,2,3]. In this work, the authors have developed a model of a hypervisor and have verified that the latter correctly enforces several security properties among which the guest OSes isolation.…”
Section: Related Workmentioning
confidence: 99%
“…Past work on formal verification of kernel information flow properties [12,19,23,4] are based on variants of noninterference [11]. Typically, the goal is to allow a number of component systems, partitions, or guest systems, depending on terminology, to share a computing platform without any interaction, leaving possible communication between the partitions to be managed by mechanisms outside the model.…”
Section: Related Workmentioning
confidence: 99%
“…Copyright is held by the author/owner(s). CCS'13, November [4][5][6][7][8]2013, Berlin, Germany. ACM 978-1-4503-2477-9/13/11.…”
Section: Introductionmentioning
confidence: 99%