T Murray, D Matichuk, M Brassil… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
In contrast to testing, mathematical reasoning and formal verification can show the absence of whole classes of security vulnerabilities. We present the, to our knowledge, first complete …
Hypervisors are widely deployed by cloud computing providers to support virtual machines, but their growing complexity poses a security risk, as large codebases contain many …
D Costanzo, Z Shao, R Gu - ACM SIGPLAN Notices, 2016 - dl.acm.org
Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today's cybersecurity community. A promising step toward …
DP Mulligan, G Petri, N Spinale… - … on secure and …, 2021 - ieeexplore.ieee.org
The semiconductor industry is witnessing a nascent security paradigm shift in the rise of Confidential Computing. Driven by the need to protect computations delegated to co …
A separation kernel simulates a distributed environment using a single physical machine by executing partitions in isolation and appropriately controlling communication among them …
SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for tracking and limiting information flows. At the lowest level, the SAFE …
Y Zhao, Z Yang, D Ma - Frontiers of Computer Science, 2017 - Springer
Separation kernels are fundamental software of safety and security-critical systems, which provide their hosted applications with spatial and temporal separation as well as controlled …
Parfait is a framework for proving that an implementation of a hardware security module (HSM) leaks nothing more than what is mandated by an application specification. Parfait …
H Sigurbjarnarson, L Nelson, B Castro-Karney… - … USENIX Symposium on …, 2018 - usenix.org
Nickel is a framework that helps developers design and verify information flow control systems by systematically eliminating covert channels inherent in the interface, which can be …