2013
DOI: 10.1007/978-3-642-41202-8_22
|View full text |Cite
|
Sign up to set email alerts
|

vTRUST: A Formal Modeling and Verification Framework for Virtualization Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Moreover, the loss function of Adaboost will be modified to consider the classification costs. Moreover, we will also investigate the application of the proposed algorithm to information security [41,43,53,42,41,52,18], bioinformatics [40,24,57], medial imaging [56,55,54], computer vision [38,23,22,36,37,19,17,46,44,45,15], reinforcement learning [27,28], cloud computing [50,51] and microprocessor reliability modeling [8,6,7,5,59,61,60].…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, the loss function of Adaboost will be modified to consider the classification costs. Moreover, we will also investigate the application of the proposed algorithm to information security [41,43,53,42,41,52,18], bioinformatics [40,24,57], medial imaging [56,55,54], computer vision [38,23,22,36,37,19,17,46,44,45,15], reinforcement learning [27,28], cloud computing [50,51] and microprocessor reliability modeling [8,6,7,5,59,61,60].…”
Section: Discussionmentioning
confidence: 99%
“…Several works also consider virtualization within the cloud system. For example the authors of [120] have proposed a formal framework for analysis of security and trust in virtualized system, combining hardware and software models expressed in CSP# [242] dispatched to the PAT model checker discovering a subtle bug in a real world cloud system. Similarly, the authors of [44] have proposed a security subsystem for change analysis within virtualized infrastructures in relation to security policies, by utilization of graphs and graph transformations dispatched to GROOVE model checker [105].…”
Section: Enterprisementioning
confidence: 99%
“…Specification languages. AADL (Architecture Analysis & Design Language) [18,73], ASF (Anonymous Secure Framework) [156], ASLan++ (AVANTSSAR Specification Language) [21], BAN logic [54,232], Boogie [34], Boxed Ambients [138], CASM (ASM-based SL for compilers) [257], CCS (Calculus of Communicating Systems) [155], COVERT (compositional analysis of Android apps) [29], CSP (Communicating Sequential Systems) [123], CSP# (shared variables CSP) [241], CTL (Computation tree temporal logic) [233], Cloud Calculus [138], Cryptol [92], Dynamic State Machine [189], ERC20 token contracts [203], Event-B [85], HLPSL (High Level Protocol Specification Language) [46], Hoare logic [111], LS2 (Logic of Secure Systems) [30], LTL (linear-time temporal logic) [271], Markov Decision Process [184], Petri nets [15], π -calculus [43], PlusCal [9], Promela [175], RTL (real-time logic) [113], SPDL (Security Protocol Description Language) [171], SysML-Sec [18], TLA+ (Temporal Logic of Actions) [75], Trusted CSP# [30], überSpark [257], VDM [101], Verilog [167], VHDL [114], VML [230], vTRUST [120], XMHF (eXtensible and Modular Hypervisor Framework)…”
Section: Specification Languages and Associated Toolsmentioning
confidence: 99%
“…In a recent work in [38], a formal framework called vTRUST, is proposed to formally describe virtualization systems with abstraction. The system can be used to verify various properties in virtualization systems such as confidentiality, verifiability, isolation and Platform Configuration Registers (PCR) consistency with respect to certain adversary models.…”
mentioning
confidence: 99%