17.01.2014 Views

Operating system verification—An overview

Operating system verification—An overview

Operating system verification—An overview

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

64 Gerwin Klein<br />

Elkaduwe D, Derrin P, Elphinstone K 2008 Kernel design for isolation and assurance of physical<br />

memory. In: 1st Workshop on Isolation and Integration in Embedded Systems, ACM SIGOPS,<br />

Glasgow, UK 35–40<br />

Elkaduwe D, Klein G, Elphinstone K 2007 Verified protection model of the seL4 microkernel, Technical<br />

report, NICTA. Available from<br />

http://ertos.nicta.com.au/publications/papers/Elkaduwe − GE − 07.pdf<br />

Elphinstone K 2004 Future directions in the evolution of the L4 microkernel. In: G Klein, ed., Proceedings<br />

of the 1st international Workshop on OS Verification 2004, Technical Report 0401005T-1,<br />

NICTA, Sydney, Australia<br />

Elphinstone K, Klein G, Derrin P, Roscoe T, Heiser G 2007 Towards a practical, verified kernel. In:<br />

Proceedings of the 11th Workshop on Hot Topics in <strong>Operating</strong> Systems, USENIX, San Diego, CA,<br />

USA<br />

Elphinstone K, Klein G, Kolanski R 2006 Formalising a high-performance microkernel. In: R Leino,<br />

ed., Workshop on Verified Software: Theories, Tools, and Experiments (VSTTE 06), Microsoft<br />

Research Technical Report MSR-TR-2006-117, Seattle, USA 1–7<br />

Feiertag R J 1980 A technique for proving specifications are multilevel secure, Technical Report<br />

CSL-109, Computer Science Laboratory, SRI International, Menlo Park, CA, USA<br />

Feiertag R J, Neumann P G 1979 The foundations of a provably secure operating <strong>system</strong> (PSOS).<br />

In: AFIPS Conference Proceedings, 1979 National Computer Conference, New York, NY, USA<br />

329–334<br />

Feng X 2007 An Open Framework for Certified System Software, PhD thesis, Department of Computer<br />

Science, Yale University, New Haven, CT, USA<br />

Feng X, Shao Z, Dong Y, Guo Y 2008 Certifying low-level programs with hardware interrupts and<br />

preemptive threads. In: Proceedings of the 2008 ACM SIGPLAN Conference on Programming<br />

Language Design and Implementation (PLDI08), (New York, NY, USA: ACM) To appear<br />

Fetzer J H 1988 Program verification: the very idea. Communications of the ACM 31(9): 1048–1063<br />

Fischer S 2008 Formal verification of a big integer library. In: DATE08 Workshop on Dependable<br />

Software Systems. Available from http://busserver.cs.uni-sb.de/publikationen/Fi08DATE.pdf<br />

Ford B, Hibler M, Lepreau J, Tullmann P, Back G, Clawson S 1996 Microkernels meet recursive<br />

virtual machines. In: Proceedings of the Second Symposium on <strong>Operating</strong> Systems Design and<br />

Implementation (OSDI96), Seattle, WA, USA 137–151<br />

Gargano M, Hillebrand M, Leinenbach D, Paul W 2005 On the correctness of operating <strong>system</strong><br />

kernels. In: Proceedings of the 18th International Conference on Theorem Proving in Higher Order<br />

Logics (TPHOLs05), Vol. 3603 of Lecture Notes in Computer Science, (Germany: Springer-Verlag,<br />

Berlin) 1–16<br />

Gödel K 1931 Über formal unentscheidbare Sätze der Principia Mathematica und verwandter Systeme,<br />

I. Monatshefte für Mathematik und Physik 38: 173–198. English translation, On Formally<br />

Undecidable Propositions of Principia Mathematica and Related Systems, I, in Davis (1965) 4–38<br />

Goerigk W, Hoffmann U 1998 Rigorous compiler implementation correctness: How to prove the real<br />

thing correct. In: D Hutter, W Stephan, P Traverso M Ullmann, (eds), Applied Formal Methods—<br />

FM-Trends 98, Vol. 1641 of Lecture Notes in Computer Science, (Germany: Springer-Verlag,<br />

Berlin) 122–136<br />

Goguen J A, Meseguer J 1982 Security policies and security models. In: Proceedings of the 1982 IEEE<br />

Symposium on Security and Privacy, IEEE Computer Society Press, New York, NY, USA 11–20<br />

Goguen J A, Meseguer J 1984 Unwinding and inference control. In: IEEE Symposium on Security<br />

and Privacy, IEEE Computer Society Press, New York, NY, USA 75–87<br />

Greenhills Software, Inc. 2008 Integrity real-time operating <strong>system</strong>,<br />

http://www.ghs.com/products/rtos/integrity.html<br />

Greve D, Richards R, Wilding M 2004 A summary of intrinsic partitioning verification. In: Fifth<br />

International Workshop on the ACL2 Prover and its Applications (ACL2-2004). Available from<br />

http://www.cs.utexas.edu/users/moore/acl2/workshop-2004/contrib/greve-richards-wilding/acl2-<br />

paper.pdf

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!