Verifying security invariants in ExpressOS

H Mai, E Pek, H Xue, ST King… - Proceedings of the …, 2013 - dl.acm.org
verify security invariants in ExpressOS with both code contracts and Dafny annotations. Code
contracts are verified … Based on their charactertics, we verified simpler security invariants

{VeriSMo}: A verified security module for confidential {VMs}

Z Zhou, W Chen, S Gong, C Hawblitzel… - 18th USENIX Symposium …, 2024 - usenix.org
… achieved through our optimized verification design and the use … first verified security module
operating within a confidential VM. … of invariant for gvar since it fails the invariant at Line 15. …

[PDF][PDF] Survey of Approaches for Security Verification of Hardware/Software Systems.

O Demir, W Xiong, F Zaghloul, J Szefer - IACR Cryptol. ePrint Arch., 2016 - iacr.steepath.eu
… to check security guarantees, which we discussed in the previous section. The general flow
of the security verification … a search to check whether the security invariants always hold. …

A learning-based approach to synthesizing invariants for incomplete verification engines

D Neider, P Madhusudan, S Saha, P Garg… - Journal of Automated …, 2020 - Springer
… In this paper, we investigate data-driven invariant synthesis for incomplete verification engines
and show that the problem can be reduced to ICE learning if the learning algorithm learns …

[图书][B] Building abstractions for fast, secure, reliable computer systems

H Mai - 2013 - search.proquest.com
… Our experience with ExpressOS shows that verifying security invariants in a practical
large-… of ExpressOS shows that this type of OS can be practical and it improves the security of …

[图书][B] Automated deductive verification of systems software

E Pek - 2015 - search.proquest.com
… We verify security invariants in ExpressOS with both code contracts and Dafny annotations.
Code contracts have low annotation overhead but are unable to reason about complicated …

Invariant synthesis for incomplete verification engines

D Neider, P Garg, P Madhusudan, S Saha… - … 2018, Held as Part of the …, 2018 - Springer
… We propose a framework for synthesizing inductive invariants for incomplete verification
allows verification engines to communicate non-provability information to guide invariant

[PDF][PDF] A Survey of Formal Verification Approaches for Practical Systems

Q Zhang, D Zhuo, J Wilcox - courses.cs.washington.edu
ExpressOS is a new OS architecture that provides formally verified security invariants to
mobile applications [7]. In contrast to prior OS verification effort that aimed at full functional …

[PDF][PDF] The Formal Development and Hardware/Software Co-Design of A Hypervisor Based Embedded Real-Time Secure Operating System Kernel-A Research …

Q Tong, JC Guo, D Xiao, LM Yin, MY Zhu - researchgate.net
… methods to verify that the system satisfies the security invariants required by the specifications.
ExpressOS is a new OS architecture that provides formally verified security invariants to …

A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
… Another example is Reference [170], where the authors verify security policies in the form
of invariants annotating the code of ExpressOS, a secure OS alternative to Android. The …