A survey on formal specification and verification of separation kernels
Y Zhao, Z Yang, D Ma - Frontiers of Computer Science, 2017 - Springer
Separation kernels are fundamental software of safety and security-critical systems, which
provide their hosted applications with spatial and temporal separation as well as controlled …
provide their hosted applications with spatial and temporal separation as well as controlled …
ARINC 653 hypervisor
SH VanderLeest - 29th Digital avionics systems conference, 2010 - ieeexplore.ieee.org
We have developed an early prototype of an ARINC 653 implementation using the
virtualization technology of the open source Xen hypervisor along with a Linux-based …
virtualization technology of the open source Xen hypervisor along with a Linux-based …
System-level non-interference of constant-time cryptography. Part I: model
This work focuses on the study of constant-time implementations; giving formal guarantees
that such implementations are protected against cache-based timing attacks in virtualized …
that such implementations are protected against cache-based timing attacks in virtualized …
High-assurance separation kernels: a survey on formal methods
Separation kernels provide temporal/spatial separation and controlled information flow to
their hosted applications. They are introduced to decouple the analysis of applications in …
their hosted applications. They are introduced to decouple the analysis of applications in …
Defining the cloud battlefield-supporting security assessments by cloud customers
Cloud computing is becoming more and more popular, but security concerns overshadow its
technical and economic benefits. In particular, insider attacks and malicious insiders are …
technical and economic benefits. In particular, insider attacks and malicious insiders are …
Architectures for secure cloud computing servers
JM Szefer - 2013 - search.proquest.com
Cloud computing, enabled by virtualization technologies, has become an important
computing paradigm. However, by choosing the cloud computing model the customers give …
computing paradigm. However, by choosing the cloud computing model the customers give …
Toward the verification of a simple hypervisor
Virtualization promises significant benefits in security, efficiency, dependability, and cost.
Achieving these benefits depends upon the reliability of the underlying virtual machine …
Achieving these benefits depends upon the reliability of the underlying virtual machine …
[PDF][PDF] 云计算环境下隐蔽信道关键问题研究
吴敬征, 丁丽萍, 王永吉 - Journal on Communications, 2011 - infocomm-journal.com
首先综述了云计算平台的发展现状, 虚拟化关键技术以及云计算安全现状; 其次综述了近40
年来隐蔽信道分析在操作系统, 数据库系统, 网络系统领域的发展与研究成果; …
年来隐蔽信道分析在操作系统, 数据库系统, 网络系统领域的发展与研究成果; …
Building a hypervisor on a formally verifiable protection layer
Virtualization promises significant benefits in security, efficiency, dependability, and cost.
Achieving these benefits depends upon the reliability of the underlying hyper visor. Hyper …
Achieving these benefits depends upon the reliability of the underlying hyper visor. Hyper …
Formal modelling of separation kernel components
Separation kernels are key components in embedded applications. Their small size and
widespread use in high-integrity environments make them good targets for formal modelling …
widespread use in high-integrity environments make them good targets for formal modelling …