Security Kernel validation in practice
Communications of the ACM
A technique for software module specification with examples
Communications of the ACM
Toward a Methodology for Designing Large Systems and Verifying Their Properties
GI - 4. Jahrestagung
DAC '76 Proceedings of the 13th Design Automation Conference
Engineering a security kernel for Multics
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
A comment on the confinement problem
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The design, analysis, and verification of the SIFT fault tolerant system
ICSE '76 Proceedings of the 2nd international conference on Software engineering
On attaining reliable software for a secure operating system
Proceedings of the international conference on Reliable software
Survey of recent operating systems research, designs and implementations
ACM SIGOPS Operating Systems Review
Design and verification of secure systems
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
Towards agile security assurance
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Applying flow-sensitive CQUAL to verify MINIX authorization check placement
Proceedings of the 2006 workshop on Programming languages and analysis for security
Performance aware secure code partitioning
Proceedings of the conference on Design, automation and test in Europe
Information flow analysis for a typed assembly language with polymorphic stacks
CASSIS'05 Proceedings of the Second international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
A typed assembly language for non-interference
ICTCS'05 Proceedings of the 9th Italian conference on Theoretical Computer Science
Hi-index | 0.00 |
This paper summarizes current research at RI aimed at developing secure operating systems and verifying certain critical properties of these systems. It is seen that proofs of design properties can be relatively straightforward when the design is specified in suitable formal specification language. These proofs demonstrate the correspondence between the desired properties and a specification of the system design. Various on-line tools aid considerably in this process. In addition, correctness proofs for implementations of such systems are now feasible, because of both various theoretical advances and the use of supporting tools.