Filters








14 Hits in 8.3 sec

Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security

Mohit Tiwari, Jason K. Oberg, Xun Li, Jonathan Valamehr, Timothy Levin, Ben Hardekopf, Ryan Kastner, Frederic T. Chong, Timothy Sherwood
2011 SIGARCH Computer Architecture News  
, pipelined operation, and I/O with traditional devices.  ...  Crafting the core of such a system in a way that achieves flexibility, security, and performance requires a careful balancing act.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the  ... 
doi:10.1145/2024723.2000087 fatcat:touo4wpb3zbedmxuwa6hesdlpi

Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security

Mohit Tiwari, Jason K. Oberg, Xun Li, Jonathan Valamehr, Timothy Levin, Ben Hardekopf, Ryan Kastner, Frederic T. Chong, Timothy Sherwood
2011 Proceeding of the 38th annual international symposium on Computer architecture - ISCA '11  
, pipelined operation, and I/O with traditional devices.  ...  Crafting the core of such a system in a way that achieves flexibility, security, and performance requires a careful balancing act.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the  ... 
doi:10.1145/2000064.2000087 dblp:conf/isca/TiwariOLVLHKCS11 fatcat:n4fu5qhf2zdktmnly66wx4ihli

Comprehensive formal verification of an OS microkernel

Gerwin Klein, June Andronick, Kevin Elphinstone, Toby Murray, Thomas Sewell, Rafal Kolanski, Gernot Heiser
2014 ACM Transactions on Computer Systems  
verified IPC fastpath, a proof that the binary code of the kernel correctly implements the C semantics, a proof of correct access-control enforcement, a proof of information-flow noninterference, a sound  ...  worst-case execution time analysis of the binary, and an automatic initialiser for user-level systems that connects kernel-level access-control enforcement with reasoning about system behaviour.  ...  ACKNOWLEDGMENTS We would like to acknowledge the contribution of the following people in the different parts of this work, spanning multiple years and projects.  ... 
doi:10.1145/2560537 fatcat:wgaqjtqacfen3nd2apj4z4eldm

Operating System Security

Trent Jaeger
2008 Synthesis Lectures on Information Security Privacy and Trust  
He is an associate editor with ACM TOIT and has been a guest editor of ACM TISSEC.  ...  Christoph Schuba has studied mathematics and management information systems at the University of Heidelberg and the University of Mannheim in Germany.  ...  Recently, both Intel and AMD have released processors with I/O memory protection, called an I/O MMU [141, 8].  ... 
doi:10.2200/s00126ed1v01y200808spt001 fatcat:o7qgtis6zffr3disdujoq4izaa

Fpga-based face detection system using Haar classifiers

Junguk Cho, Shahnam Mirzaei, Jason Oberg, Ryan Kastner
2009 Proceeding of the ACM/SIGDA international symposium on Field programmable gate arrays - FPGA '09  
2011), invited paper Crafting a Usable Microkernel, Processor, and I/O System with Strict and Provable Information Flow Security.  ...  In the past, GLIFT has been used to build a non-interfering processor [101] , analyze the USB and I2C bus protocols [78] , build larger systems with I/O and a microkernel [102] , and analyze the security  ... 
doi:10.1145/1508128.1508144 dblp:conf/fpga/ChoMOK09 fatcat:22po34blfnh3verdqc4x237ocq

seL4

Gerwin Klein, Michael Norrish, Thomas Sewell, Harvey Tuch, Simon Winwood, Kevin Elphinstone, Gernot Heiser, June Andronick, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt (+1 others)
2009 Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles - SOSP '09  
We assume correctness of compiler, assembly code, and hardware, and we used a unique design approach that fuses formal and operating systems techniques.  ...  Complete formal verification is the only known way to guarantee that a system is free of programming errors.  ...  Acknowledgements We thank Timothy Bourke, Timothy Roscoe, and Adam Wiggins for valued feedback on drafts of this article.  ... 
doi:10.1145/1629575.1629596 dblp:conf/sosp/KleinEHACDEEKNSTW09 fatcat:cidf7z4awnhyfljpznijerhee4

D5.1 Key Technologies for IoT Data Management Benchmark

Gino Ciccone, Giuseppina Carpentieri, Cosimo Zotti, Alexandr Tardo, Marek Bednarczyk, Tadeusz Puźniakowski, Paweł Czapiewski, Stefan Köpsell, Kumar Sharad, José Luis Cárcel, Joan Meseguer, Ahmad Nimr (+9 others)
2021 Zenodo  
The deliverable describes the state of the current technologies and the planned innovations applied to internet-of-things (IoT) data management and applications.  ...  This document describes the approach of iNGENIOUS to develop an interoperable layer, aggregating data coming from different existing and forthcoming IoT technologies.  ...  tactile HIS; • The network provides the connection bus system to interconnect the I/O with the processors and memories; • The network management and orchestration play the role of operating system and  ... 
doi:10.5281/zenodo.5084813 fatcat:ssllddbo7rda7fadthu26ajrzu

Design and provability of a statically configurable hypervisor [article]

Jan Nordholz, Technische Universität Berlin, Technische Universität Berlin, Jean-Pierre Seifert
2017
In this thesis we develop a novel, minimalist design for Type I hypervisors and present a fully working prototype for the ARMv7 and ARMv8 architectures.  ...  We further demonstrate its versatility by extending the framework to even support embedded processors which only contain a memory protection unit.  ...  DOCTYPE s c e n a r i o SYSTEM " xml/ dtd "> <s c e n a r i o version=" 1 . 0 0 " c b i=" p h i d i a s " image=" raw "> <p l a t f o r m board=" h i k e y " a r c h=" arm64 " /> <h y p e r v i s o r ncpus  ... 
doi:10.14279/depositonce-5938 fatcat:6ewhq455lzhyhnizfdvjc5w4hi

System Architecture Designs for Secure, Flexible and Openly-Accessible Enclave Computing

Emmanuel Simon Stapf
2022
challenges, namely i) providing an open access to enclave computing on ARM-based systems, ii) protecting diverse sensitive applications with a single enclave architecture across platforms, and iii) providing  ...  large code base that must be trusted in a commodity operating system.  ...  Acknowledgments Acknowledgments We thank our anonymous reviewers for their valuable and constructive feedback.  ... 
doi:10.26083/tuprints-00021487 fatcat:kmbfkbzolrhhdgexphbkvk2nyu

Digital Forensic Evidence Acquisition to Mitigate Neighbourhood Crime Technology at the UNIVERSITY OF PRETORIA SUPERVISED BY

Stacey Omeleze, S Venter
2017 unpublished
Furthermore, it introduced an easy process for both citizens and law enforcement agents to use the system and presented a real-life case study scenario for its illustrations.  ...  The research proposed that the capture-and-share style of social media be imitated, but the conceptual idea went further to develop a working and easy-to-use prototype of this conceptual idea (ONW system  ...  MVC also controls events responses between the business logic (I/O) and the persistence layer.  ... 
fatcat:bnafxod5xzcczecdxboi7ghssa

Mitigating the imposition of malicious behaviour on code [article]

Stefan Nürnberger, Universität Des Saarlandes, Universität Des Saarlandes
2017
While malicious programs have the clear intention of stealing or manipulating data, a benign program was developed with good inten  ...  hier beschriebenen Lösungskandidaten einen iterativen Prozess dar, der über den zeitlichen Verlauf dieser Dissertation in einem stetigen Katz-und-Maus-Spiel stückchenweise verfeinert wurde. 3 4 Abstract A  ...  SPEC's version of BZip2 (401.bzip2) is optimised to perform almost no I/O as SPEC is a CPU benchmark. • Computationally-Intense programs crunch numbers and (repeatedly) execute a lot of code on comparatively  ... 
doi:10.22028/d291-26792 fatcat:dh6fqece2nglpbyi3ic2yxu5bi

Raising The Bar: Advancing Mitigations Against Memory-Corruption and Side-Channel Attacks

Tommaso Frassetto
2022
As a result, the number and impact of security vulnerabilities have been rising as well.  ...  We present Selfrando, a scheme which randomizes [...]  ...  Ministry of Education and Research within CRISP.  ... 
doi:10.26083/tuprints-00021436 fatcat:udtvwmmqrngkfkburnkgz6mxsa

Dagstuhl Reports, Volume 7, Issue 5, May 2017, Complete Issue [article]

2018
Accessing and navigating through such large dataset is not easy for light clients with limited capacities, that is, with a limited rendering capacity, and a low bandwidth.  ...  First, we propose an alternative image based representation for the 3D content, generated by peers and collected in a sprite tree.  ...  Thus, it will be useful to have detailed I/O measurement of applications on a center-wide basis and to couple that with storage system and resource management information.  ... 
doi:10.4230/dagrep.7.5 fatcat:ipv6ltpp6ngejao35zzoqko2ry

Formal Verification of Object-Oriented Software. Papers presented at the 2nd International Conference, October 5-7, 2011, Turin, Italy

Bernhard [Hrsg.] Beckert, Ferruccio [Hrsg.] Damiani, Dilian [Hrsg.] Gurov
2011
1496 "Reliably Secure Software Systems -RS3".  ...  carried out just a few initial experiments, combining KeY and the other tools manually.  ...  Some testing will always be required, because that is the only verification environment that takes the complete system, processor, memory, I/O, etc., and the external environment into account.  ... 
doi:10.5445/ir/1000024780 fatcat:qnqnk6c46jcrxjgydp6migtxpm