Operating system verification—an overview

G Klein - Sadhana, 2009 - Springer
This paper gives a high-level introduction to the topic of formal, interactive, machine-
checked software verification in general, and the verification of operating systems code in …

Methods and tools for policy analysis

AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …

seL4: Formal verification of an OS kernel

G Klein, K Elphinstone, G Heiser, J Andronick… - Proceedings of the …, 2009 - dl.acm.org
Complete formal verification is the only known way to guarantee that a system is free of
programming errors. We present our experience in performing the formal, machine-checked …

Comprehensive formal verification of an OS microkernel

G Klein, J Andronick, K Elphinstone, T Murray… - ACM Transactions on …, 2014 - dl.acm.org
We present an in-depth coverage of the comprehensive machine-checked formal verification
of seL4, a general-purpose operating system microkernel. We discuss the kernel design we …

Flexible and fine-grained mandatory access control on android for diverse security and privacy policies

S Bugiel, S Heuser, AR Sadeghi - 22nd USENIX Security Symposium …, 2013 - usenix.org
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …

Verification and change-impact analysis of access-control policies

K Fisler, S Krishnamurthi, LA Meyerovich… - Proceedings of the 27th …, 2005 - dl.acm.org
Sensitive data are increasingly available on-line through the Web and other distributed
protocols. This heightens the need to carefully control access to data. Control means not …

[PDF][PDF] Model Checking One Million Lines of C Code.

H Chen, D Dean, DA Wagner - NDSS, 2004 - Citeseer
Implementation bugs in security-critical software are pervasive. Several authors have
previously suggested model checking as a promising means to detect improper use of …

Efficient policy analysis for administrative role based access control

SD Stoller, P Yang, CR Ramakrishnan… - Proceedings of the 14th …, 2007 - dl.acm.org
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC)
policies may be changed by each administrator. It is often difficult to fully understand the …

seL4 enforces integrity

T Sewell, S Winwood, P Gammie, T Murray… - … on Interactive Theorem …, 2011 - Springer
We prove that the seL4 microkernel enforces two high-level access control properties:
integrity and authority confinement. Integrity provides an upper bound on write operations …

Policy analysis for administrative role-based access control

A Sasturkar, P Yang, SD Stoller… - Theoretical Computer …, 2011 - Elsevier
Role-Based Access Control (RBAC) is a widely used model for expressing access control
policies. In large organizations, the RBAC policy may be collectively managed by many …