Filters








279,166 Hits in 5.2 sec

On the Correctness of Operating System Kernels [chapter]

Mauro Gargano, Mark Hillebrand, Dirk Leinenbach, Wolfgang Paul
2005 Lecture Notes in Computer Science  
This system consists of hardware (processor and devices) on top of which runs a microkernel, an operating system, and applications.  ...  We outline the correctness proof for concrete kernels, which implement this model. This result represents a crucial step towards the verification of a kernel, e.g. that in the academic system.  ...  Correctness of the Concrete Kernel Our formulation of a correctness theorem for an operating system kernel written in C0 uses the result for virtual memory simulation (Section 3), the compiler correctness  ... 
doi:10.1007/11541868_1 fatcat:qklgxktvazbvva3cliungsmpn4

CVM – A Verified Framework for Microkernel Programmers

Tom In der Rieden, Alexandra Tsyban
2008 Electronical Notes in Theoretical Computer Science  
Last but not least, we give an overview on the model formalization and implementation correctness proof, which has been conducted in the interactive theorem prover Isabelle for the most part.  ...  Furthermore, we describe how CVM can be implemented by means of a concrete kernel, thus providing a trustworthy platform for microkernel programmers.  ...  At first sight, this appears to be a mission impossible because of the sheer size of operating system implementations.  ... 
doi:10.1016/j.entcs.2008.06.047 fatcat:fhivayrqb5aj7nmrgam33uc4be

OS Verification - Now!

Harvey Tuch, Gerwin Klein, Gernot Heiser
2005 USENIX Workshop on Hot Topics in Operating Systems  
We argue that the combination of those two trends makes it feasible, and desirable, to formally verify production-quality operating systems -now.  ...  At the same time, small highperformance OS kernels, which can drastically reduce the size of the trusted computing base, have become more popular.  ...  Acknowledgements We would like to thank all those who contributed to the part of the L4 kernel verification pilot project which we report on here -Kevin Elphinstone, Kai Engelhardt, Rafal Kolanski, Michael  ... 
dblp:conf/hotos/TuchKH05 fatcat:w3jtvh2cqfb2hcc7gfn7zjdrxy

A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing [chapter]

Wenbo Mao
2009 Lecture Notes in Computer Science  
to maintain the correctness for one in a less privileged layer.  ...  We argue for the necessity of co-operation between a secure application and the secure service code in kernel mode, and showcase the practicality of this method.  ...  to maintain the correctness for one in a less privileged layer.  ... 
doi:10.1007/978-3-642-11145-7_2 fatcat:macrgvqfmzdstkyoro7kplpxn4

OS Verification- A Survey as a Source of Future Challenges

Kushal Anjaria, Arun Mishra
2015 International Journal of Computer Science & Engineering Survey  
Formal verification of an operating system kernel manifests absence of errors in the kernel and establishes trust in it.  ...  This paper evaluates various projects on operating system kernel verification and presents indepth survey of them.  ...  INTRODUCTION The security and reliability of computer system is dependent on the underlying operating system kernel; kernel is the core of operating system.  ... 
doi:10.5121/ijcses.2015.6401 fatcat:kmf3kdtarja7fduluaq5qxx4we

Quantum corrections to the Weyl quantization of the classical time of arrival [article]

Dean Alvin L. Pablico, Eric A. Galapon
2022 arXiv   pre-print
In particular, the quantum corrections always vanish for linear systems but nonvanishing for nonlinear systems. Finally, we consider the case of an anharmonic oscillator potential as an example.  ...  A time of arrival (TOA) operator that is conjugate with the system Hamiltonian was constructed by Galapon without canonical quantization in [J. Math. Phys. 45, 3180 (2004)].  ...  Without explicitly solving for the Tn 's, it has been noted by one of us that that these corrections appear only for the case of nonlinear systems but not on linear systems [25] .  ... 
arXiv:2205.08694v1 fatcat:y3crjswa4jeong4c2k7fbg4tzm

On the Use of Equality Constraints in the Identification of Volterra–Laguerre Models

C. Diouf, M. Telescu, P. Cloastre, N. Tanguy
2012 IEEE Signal Processing Letters  
This letter focuses on the a posteriori correction of Volterra-Laguerre models in order to meet specific static or dynamic requirements.  ...  The authors set a general theoretical framework and provide an illustrative example.  ...  One may either operate individual kernel-wise corrections minimizing or a global correction minimizing ,t h e practical difference between the two will be illustrated in the example.  ... 
doi:10.1109/lsp.2012.2223463 fatcat:ycejhsqy5fb7bacxmr7n2j7oma

Evaluating operating system vulnerability to memory errors

Kurt B. Ferreira, Kevin Pedretti, Ron Brightwell, Patrick G. Bridges, David Fiala, Frank Mueller
2012 Proceedings of the 2nd International Workshop on Runtime and Operating Systems for Supercomputers - ROSS '12  
on a node -the operating system.  ...  This work focused on two HPC operating systems; Kitten, the lightweight operating system developed at Sandia National Laboratories and the Cray Linux Environment, a HPC variant of the Linux operating system  ... 
doi:10.1145/2318916.2318930 fatcat:dmkkt4pfobdkrayqgfass2tdxa

The Study on Formal Verification of OS Kernel

Yu Zhang, Yunwei Dong, Zhongqiu Zhang, Hong Huo, Fan Zhang
2011 International Journal of Wireless and Microwave Technologies  
We study on formal verification of operation system kernel in system implementation level and take theorem proving and model checking as the main technical methods to resolve the key techniques of verifying  ...  operation system kernel in C implementation level.  ...  In this paper we study on formal verification of this smaller OS kernel in system implementation level, which is a weak link in the trustworthy of OS kernel and is related to system eventually correctness  ... 
doi:10.5815/ijwmt.2011.03.10 fatcat:g3wghju2ofhvjnvdjucpq72o6q

The foundations of a provably secure operating system (PSOS)

RICHARD J. FEIERTAG, PETER G. NEUMANN
1979 1979 International Workshop on Managing Requirements Knowledge (MARK)  
Outstanding among these are Larry Robinson who is primarily responsible for the development of HOM and who played a major role in the early design of the system, Karl Levitt who designed security related  ...  ACKNOWLEDGMENTS The design of PSOS was accomplished by the close cooperation of several people.  ...  Large kernels do not enhance one" s confidence in the correct operation of the system. Consider, for example, the kernels of KSOS and of the MITRE system.  ... 
doi:10.1109/mark.1979.8817256 fatcat:kfzecknsirahdm325q72vz2wae

From a Verified Kernel towards Verified Systems [chapter]

Gerwin Klein
2010 Lecture Notes in Computer Science  
verified kernel may be used for gaining formal, code-level assurance about safety and security properties of systems on the order of a million lines of code.  ...  The L4.verified project has produced a formal, machinechecked Isabelle/HOL proof that the C code of the seL4 OS microkernel correctly implements its abstract implementation.  ...  This material is in part based on research sponsored by the Air Force Research Laboratory, under agreement number FA2386-09-1-4160. The U.S.  ... 
doi:10.1007/978-3-642-17164-2_3 fatcat:askysutvofghzk2ajojawwmmgu

Kit: a study in operating system verification

W.R. Bevier
1989 IEEE Transactions on Software Engineering  
The theorem CORRECTNESS-OF-OPERATING-SYSTEM establishes that Kit running on the target machine TM implements an operational specification of the kernel called the abstract kernel.  ...  Introduction One of the fundamental goals of a multi-tasking operating system is the implementation of processes.  ...  All kernel operations take place in a single abstract step. Several features of the abstract kernel are defined to coincide with the target machine.  ... 
doi:10.1109/32.41331 fatcat:sumcri2ukvazxgdyccrcbd56la

Jitk: A Trustworthy In-Kernel Interpreter Infrastructure

Xi Wang, David Lazar, Nickolai Zeldovich, Adam Chlipala, Zachary Tatlock
2014 USENIX Symposium on Operating Systems Design and Implementation  
Modern operating systems run multiple interpreters in the kernel, which enable user-space applications to add new functionality or specialize system policies.  ...  The correctness of such interpreters is critical to the overall system security: bugs in interpreters could allow adversaries to compromise user-space applications and even the kernel.  ...  This research was partially supported by the DARPA Clean-slate design of Resilient, Adaptive, Secure Hosts (CRASH) program under contract #N66001-10-2-4089, and by NSF award CNS-1053143.  ... 
dblp:conf/osdi/WangLZCT14 fatcat:c5aph47x3nek7ltyx5hngezmte

High Velocity Kernel File Systems with Bento [article]

Samantha Miller
2021 arXiv   pre-print
However, high velocity Linux kernel development is challenging due to the ease of introducing bugs, the difficulty of testing and debugging, and the lack of support for redeployment without service disruption  ...  It enables file systems written in safe Rust to be installed in the Linux kernel, with errors largely sandboxed to the file system.  ...  If an upgrade occurs while file system operations are still pending, there may be race conditions where some operations are executed on the old file system and others on the new, leading to correctness  ... 
arXiv:2005.09723v3 fatcat:zrghwqpuordcxbtyu5ewix5xgu

IBOS: A Correct-By-Construction Modular Browser [chapter]

Ralf Sasse, Samuel T. King, José Meseguer, Shuo Tang
2013 Lecture Notes in Computer Science  
We use formal verification of that specification to prove the desired security properties of the IBOS design, including the address bar correctness and the same-origin policy.  ...  We give a formal specification of the design of this secure-by-construction web browser in rewriting logic.  ...  This research was partially supported by NSF Grant CCF 09-05584 and AFOSR Grant FA8750-11-2-0084 as well as by grant N0014-09-1-0743 from the Office of Naval Research, AFOSR MURI grant FA9550-09-01-0539  ... 
doi:10.1007/978-3-642-35861-6_14 fatcat:ggq7i2xcffe2lajpt25dzqrg2q
« Previous Showing results 1 — 15 out of 279,166 results