Comprehensive formal verification of an OS microkernel

G Klein, J Andronick, K Elphinstone, T Murray… - ACM Transactions on …, 2014 - dl.acm.org
We present an in-depth coverage of the comprehensive machine-checked formal verification
of seL4, a general-purpose operating system microkernel. We discuss the kernel design we …

Formally verified software in the real world

G Klein, J Andronick, M Fernandez, I Kuz… - Communications of the …, 2018 - dl.acm.org
Formally verified software in the real world Page 1 68 COMMUNICATIONS OF THE ACM |
OCTOBER 2018 | VOL. 61 | NO. 10 contributed articles IN FEBRUARY 2017, a helicopter took …

Provably trustworthy systems

G Klein, J Andronick, G Keller… - … of the Royal …, 2017 - royalsocietypublishing.org
We present recent work on building and scaling trustworthy systems with formal, machine-
checkable proof from the ground up, including the operating system kernel, at the level of …

[PDF][PDF] Automated proof-producing abstraction of C code

D Greenaway - 2014 - davidgreenaway.com
Before software can be formally reasoned about, it must first be represented in some form of
logic. There are two approaches to carrying out this translation: the first is to generate an …

Backwards and forwards with separation logic

C Bannister, P Höfner, G Klein - … Conference, ITP 2018, Held as Part of the …, 2018 - Springer
The use of Hoare logic in combination with weakest preconditions and strongest
postconditions is a standard tool for program verification, known as backward and forward …

Proof engineering considered essential

G Klein - International Symposium on Formal Methods, 2014 - Springer
In this talk, I will give an overview of the various formal verification projects around the
evolving seL4 microkernel, and discuss our experience in large scale proof engineering and …

Is formal verification of seL4 adequate to address the key security challenges of kernel design?

MS Siapoush, J Alves-Foss - IEEE Access, 2023 - ieeexplore.ieee.org
Formal method tools are used in the initial stages of the software development cycle and
have advanced to deal with the design difficulties related to ensuring strong cybersecurity …

Enhanced security of building automation systems through microkernel-based controller platforms

X Wang, R Habeeb, X Ou, S Amaravadi… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
A Building Automation System (BAS) is a complex distributed Cyber-Physical System that
controls building functionalities such as heating, ventilation, and air conditioning (HVAC) …

A hexagon-based key predistribution scheme in sensor networks

G Li, J He, Y Fu - … on Parallel Processing Workshops (ICPPW'06 …, 2006 - ieeexplore.ieee.org
Sensor networks are widely used in environment exploration and disaster recovery and in
military applications due to their self-organization characteristics and distributed nature. As a …

Automated verification of RPC stub code

M Fernandez, J Andronick, G Klein, I Kuz - … Oslo, Norway, June 24-26, 2015 …, 2015 - Springer
Formal verification has been successfully applied to provide strong correctness guarantees
of software systems, but its application to large code bases remains an open challenge. The …