Over 20 years of research into cybersecurity and safety engineering: a short bibliography

S Paul, L Rioux - Safety and Security Engineering, 2015 - books.google.com
Over 20 years of research into cybersecurity and safety engineering: a short bibliography Page
352 Safety and Security Engineering VI 335 Over 20 years of research into cybersecurity and …

A survey on formal specification and verification of separation kernels

Y Zhao, Z Yang, D Ma - Frontiers of Computer Science, 2017 - Springer
Separation kernels are fundamental software of safety and security-critical systems, which
provide their hosted applications with spatial and temporal separation as well as controlled …

Refinement-based specification and security analysis of separation kernels

Y Zhao, D Sanán, F Zhang, Y Liu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Assurance of information-flow security by formal methods is mandated in security
certification of separation kernels. As an industrial standard for improving safety, ARINC 653 …

High-assurance separation kernels: a survey on formal methods

Y Zhao, D Sanán, F Zhang, Y Liu - arXiv preprint arXiv:1701.01535, 2017 - arxiv.org
Separation kernels provide temporal/spatial separation and controlled information flow to
their hosted applications. They are introduced to decouple the analysis of applications in …

A Survey on Formal Verification of Separation Kernels

RC Bhushan, DK Yadav - Recent Advances in Computer …, 2022 - ingentaconnect.com
Introduction: In developing safety and security-critical systems, separation kernel acts as a
primary foundation, which provides spatial as well as temporal separation. The separation …

A noninterference model for mobile OS information flow control and its policy verification

Z Yuan, W Li, Z Yang, L Sun, X Du… - Security and …, 2021 - Wiley Online Library
Mobile operating systems such as Android are facing serious security risk. First, they have a
large number of users and store a large number of users' private data, which have become …

Automatic analysis of DIFC systems using noninterference with declassification

W Li, Z Yang, J Liu - Neural Computing and Applications, 2022 - Springer
Abstract Information flow control (IFC) can effectively resist Trojans and viruses that steal
information from systems, and is usually adopted to protect the confidentiality of systems with …