17.01.2014 Views

Operating system verification—An overview

Operating system verification—An overview

Operating system verification—An overview

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Operating</strong> <strong>system</strong> verification—An <strong>overview</strong> 65<br />

Greve D, Wilding M, Vanfleet W M 2003 A separation kernel formal security policy. In: Fourth<br />

International Workshop on the ACL2 Prover and its Applications (ACL2-2003). Available<br />

from http://www.cs.utexas.edu/users/moore/acl2/workshop-2003/contrib/greve-wilding-vanfleet/<br />

security-policy.pdf<br />

Greve D, Wilding M, Vanfleet W M 2005 High assurance formal security policy modeling. In: Proceedings<br />

of the 17th Systems and Software Technology Conference 2005 (SSTC05)<br />

Guttman J D, Herzog A L, Ramsdell J D, Skorupka C W 2005 Verifying information flow goals in<br />

security-enhanced Linux. Journal of Computer Security 13(1): 115–134<br />

Haigh J T, Young W D 1987 Extending the noninterference version of MLS for SAT. IEEE Transactions<br />

on Software Engineering 13(2): 141–150<br />

Hansen P B 1970 The nucleus of a multiprogramming operating <strong>system</strong>. Communications of the ACM<br />

13(4): 238–250<br />

Hardin D S, Smith E W, Young W D 2006 A robust machine code proof framework for highly secure<br />

applications. In: ACL2 06: Proceedings of the sixth international workshop on the ACL2 theorem<br />

prover and its applications, (New York, NY, USA: ACM) 11–20<br />

Hardy N 1985 KeyKOS architecture, ACM SIGOPS <strong>Operating</strong> Systems Review 19(4): 8–25<br />

Harrison J 1996 HOL Light: a tutorial introduction. In: M Srivas, A Camilleri, (eds), Proceedings of<br />

the First International Conference on Formal Methods in Computer-Aided Design (FMCAD96),<br />

Vol. 1166 of Lecture Notes in Computer Science, Springer-Verlag 265–269<br />

Harrison J 2006 Towards self-verification of HOL Light. In: U Furbach, N Shankar, (eds), Proceedings<br />

of the third International Joint Conference on Automated Reasoning (IJCAR 2006), Vol. 4130 of<br />

Lecture Notes in Computer Science, Springer-Verlag, Seattle, WA 177–191<br />

Härtig H, Hohmuth M, Wolter J 1998 Taming Linux. In: K A Hawick, H A James, (eds), Proceedings of<br />

the 5th Annual Australasian Conference on Parallel And Real-Time Systems (PART 98), Springer-<br />

Verlag, Adelaide, Australia<br />

Heiser G, Elphinstone K, Kuz I, Klein G, Petters S M 2007 Towards trustworthy computing <strong>system</strong>s:<br />

Taking microkernels to the next level. ACM <strong>Operating</strong> Systems Review 41(3)<br />

Heitmeyer C L, Archer M, Leonard E I, McLean J 2006 Formal specification and verification of data<br />

separation in a separation kernel for an embedded <strong>system</strong>. In: CCS 06: Proceedings of the 13th ACM<br />

conference on Computer and communications security, (New York, NY, USA: ACM) 346–355<br />

Heitmeyer C L, Archer M, Leonard E, McLean J 2008 Applying formal methods to a certifiably secure<br />

software <strong>system</strong>. IEEE Transactions on Software Engineering 34(1): 82–98<br />

Hennessy J, Patterson D 1996 Computer Architecture: A Quantitative Approach, Morgan Kaufmann,<br />

San Francisco, USA<br />

Hillebrand M A, in der Rieden T, Paul W J 2005 Dealing with I/O devices in the context of pervasive<br />

<strong>system</strong> verification. In: ICCD 05: Proceedings of the 2005 International Conference on Computer<br />

Design, IEEE Computer Society, Washington, DC, USA 309–316<br />

Hillebrand M A, Paul W J 2008 On the architecture of <strong>system</strong> verification environments. In: Hardware<br />

and Software: Verification and Testing, Vol. 4899 of Lecture Notes in Computer Science, (Germany:<br />

Springer-Verlag, Berlin) 153–168<br />

Hoare C A R 1969 An axiomatic basis for computer programming. Communications of the ACM<br />

12(10): 576–580<br />

Hohmuth M, Härtig H 2001 Pragmatic nonblocking synchronization for real-time <strong>system</strong>s. In: Proceedings<br />

of the General Track: 2002 USENIX Annual Technical Conference, USENIX Association,<br />

Berkeley, CA, USA 217–230<br />

Hohmuth M, Tews H 2003 The semantics of C++ data types: Towards verifying low-level <strong>system</strong><br />

components. In: D Basin, B Wolff, (eds), TPHOLs 2003, Emerging Trends Track, Technical Report<br />

No. 187, Institut für Informatik, Universität Freiburg, Freiburg, Germany 127–144<br />

Hohmuth M, Tews H 2005 The VFiasco approach for a verified operating <strong>system</strong>. In: Proceedings<br />

of the 2nd ECOOP Workshop on Programming Languages and <strong>Operating</strong> Systems, Glasgow, UK.<br />

Available from http://wwwtcs.inf.tu-dresden.de/ tews/Plos-2005/ecoop-plos-05-a4.ps

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!