Operating system verification—an overview

G Klein - Sadhana, 2009 - Springer
This paper gives a high-level introduction to the topic of formal, interactive, machine-
checked software verification in general, and the verification of operating systems code in …

NOVA: A microhypervisor-based secure virtualization architecture

U Steinberg, B Kauer - Proceedings of the 5th European conference on …, 2010 - dl.acm.org
The availability of virtualization features in modern CPUs has reinforced the trend of
consolidating multiple guest operating systems on top of a hypervisor in order to improve …

[PDF][PDF] Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.

P Akritidis, M Costa, M Castro, S Hand - USENIX Security Symposium, 2009 - usenix.org
Attacks that exploit out-of-bounds errors in C and C++ programs are still prevalent despite
many years of research on bounds checking. Previous backwards compatible bounds …

[图书][B] Robust composition: Towards a uni ed approach to access control and concurrency control

M Miller - 2006 - jscholarship.library.jhu.edu
When separately written programs are composed so that they may cooperate, they may
instead destructively interfere in unanticipated ways. These hazards limit the scale and …

Capability hardware enhanced RISC instructions: CHERI instruction-set architecture (version 7)

RNM Watson, PG Neumann, J Woodruff, M Roe… - 2019 - cl.cam.ac.uk
This technical report describes CHERI ISAv7, the seventh version of the Capability
Hardware Enhanced RISC Instructions (CHERI) Instruction-Set Architecture (ISA) being …

MINIX 3: A highly reliable, self-repairing operating system

JN Herder, H Bos, B Gras, P Homburg… - ACM SIGOPS …, 2006 - dl.acm.org
Different kinds of people use computers now than several decades ago, but operating
systems have not fully kept pace with this change. It is true that we have point-and-click GUIs …

[PDF][PDF] Make Least Privilege a Right (Not a Privilege).

MN Krohn, P Efstathopoulos, C Frey, MF Kaashoek… - HotOS, 2005 - usenix.org
Make Least Privilege a Right (Not a Privilege) Page 1 Make Least Privilege a Right (Not a
Privilege) Maxwell Krohn⁄, Petros Efstathopoulosy, Cliff Frey⁄, Frans Kaashoek⁄, Eddie …

[PDF][PDF] Memory Safety for Low-Level Software/Hardware Interactions.

J Criswell, N Geoffray, VS Adve - USENIX security symposium, 2009 - usenix.org
Abstract Systems that enforce memory safety for today's operating system kernels and other
system software do not account for the behavior of low-level software/hardware interactions …

[PDF][PDF] The VFiasco approach for a verified operating system

M Hohmuth, H Tews - 2nd PLOS, 2005 - Citeseer
The quality of today's main-stream operating systems is not sufficient for safety-critical and
security-critical applications. In this paper we discuss several possible approaches to build …

{SHILL}: A Secure Shell Scripting Language

S Moore, C Dimoulas, D King, S Chong - 11th USENIX Symposium on …, 2014 - usenix.org
The Principle of Least Privilege suggests that software should be executed with no more
authority than it requires to accomplish its task. Current security tools make it difficult to apply …