Operating system verification—an overview
G Klein - Sadhana, 2009 - Springer
This paper gives a high-level introduction to the topic of formal, interactive, machine-
checked software verification in general, and the verification of operating systems code in …
checked software verification in general, and the verification of operating systems code in …
Methods and tools for policy analysis
AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …
technology especially for present and future systems characterized by large-scale systems …
seL4: Formal verification of an OS kernel
Complete formal verification is the only known way to guarantee that a system is free of
programming errors. We present our experience in performing the formal, machine-checked …
programming errors. We present our experience in performing the formal, machine-checked …
Comprehensive formal verification of an OS microkernel
We present an in-depth coverage of the comprehensive machine-checked formal verification
of seL4, a general-purpose operating system microkernel. We discuss the kernel design we …
of seL4, a general-purpose operating system microkernel. We discuss the kernel design we …
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed
protocols. This heightens the need to carefully control access to data. Control means not …
protocols. This heightens the need to carefully control access to data. Control means not …
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC)
policies may be changed by each administrator. It is often difficult to fully understand the …
policies may be changed by each administrator. It is often difficult to fully understand the …
seL4 enforces integrity
We prove that the seL4 microkernel enforces two high-level access control properties:
integrity and authority confinement. Integrity provides an upper bound on write operations …
integrity and authority confinement. Integrity provides an upper bound on write operations …
Policy analysis for administrative role-based access control
A Sasturkar, P Yang, SD Stoller… - Theoretical Computer …, 2011 - Elsevier
Role-Based Access Control (RBAC) is a widely used model for expressing access control
policies. In large organizations, the RBAC policy may be collectively managed by many …
policies. In large organizations, the RBAC policy may be collectively managed by many …