A survey on formal specification and verification of separation kernels

Y Zhao, Z Yang, D Ma - Frontiers of Computer Science, 2017 - Springer
Separation kernels are fundamental software of safety and security-critical systems, which
provide their hosted applications with spatial and temporal separation as well as controlled …

ARINC 653 hypervisor

SH VanderLeest - 29th Digital avionics systems conference, 2010 - ieeexplore.ieee.org
We have developed an early prototype of an ARINC 653 implementation using the
virtualization technology of the open source Xen hypervisor along with a Linux-based …

System-level non-interference of constant-time cryptography. Part I: model

G Barthe, G Betarte, JD Campo, C Luna - Journal of Automated Reasoning, 2019 - Springer
This work focuses on the study of constant-time implementations; giving formal guarantees
that such implementations are protected against cache-based timing attacks in virtualized …

High-assurance separation kernels: a survey on formal methods

Y Zhao, D Sanán, F Zhang, Y Liu - arXiv preprint arXiv:1701.01535, 2017 - arxiv.org
Separation kernels provide temporal/spatial separation and controlled information flow to
their hosted applications. They are introduced to decouple the analysis of applications in …

Defining the cloud battlefield-supporting security assessments by cloud customers

S Bleikertz, T Mastelic, S Pape… - … Conference on Cloud …, 2013 - ieeexplore.ieee.org
Cloud computing is becoming more and more popular, but security concerns overshadow its
technical and economic benefits. In particular, insider attacks and malicious insiders are …

Architectures for secure cloud computing servers

JM Szefer - 2013 - search.proquest.com
Cloud computing, enabled by virtualization technologies, has become an important
computing paradigm. However, by choosing the cloud computing model the customers give …

Toward the verification of a simple hypervisor

M Dahlin, R Johnson, RB Krug, M McCoyd… - arXiv preprint arXiv …, 2011 - arxiv.org
Virtualization promises significant benefits in security, efficiency, dependability, and cost.
Achieving these benefits depends upon the reliability of the underlying virtual machine …

[PDF][PDF] 云计算环境下隐蔽信道关键问题研究

吴敬征, 丁丽萍, 王永吉 - Journal on Communications, 2011 - infocomm-journal.com
首先综述了云计算平台的发展现状, 虚拟化关键技术以及云计算安全现状; 其次综述了近40
年来隐蔽信道分析在操作系统, 数据库系统, 网络系统领域的发展与研究成果; …

Building a hypervisor on a formally verifiable protection layer

M McCoyd, RB Krug, D Goel, M Dahlin… - 2013 46th Hawaii …, 2013 - ieeexplore.ieee.org
Virtualization promises significant benefits in security, efficiency, dependability, and cost.
Achieving these benefits depends upon the reliability of the underlying hyper visor. Hyper …

Formal modelling of separation kernel components

A Velykis, L Freitas - Theoretical Aspects of Computing–ICTAC 2010: 7th …, 2010 - Springer
Separation kernels are key components in embedded applications. Their small size and
widespread use in high-integrity environments make them good targets for formal modelling …