Filters








82 Hits in 3.8 sec

Specification and verification of the UCLA Unix security kernel

Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek
1980 Communications of the ACM  
Introduction Data Secure Unix, a kernel structured operating system, was constructed as part of an ongoing effort at UCLA to develop procedures by which operating systems can be produced and shown secure  ...  The General Verification Approach The proof that the kernel is secure has two parts: a) developing four levels of specifications, ranging from Pascal code to the top-level security criterion, and b) verifying  ...  Introduction Data Secure Unix, a kernel structured operating system, was constructed as part of an ongoing effort at UCLA to develop procedures by which operating systems can be produced and shown secure  ... 
doi:10.1145/358818.358825 fatcat:uloulyosyjaxpaz4rvuhb7zxny

Specification and verification of the UCLA Unix security kernel (Extended Abstract)

Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek
1979 Proceedings of the seventh symposium on Operating systems principles - SOSP '79  
Introduction Data Secure Unix, a kernel structured operating system, was constructed as part of an ongoing effort at UCLA to develop procedures by which operating systems can be produced and shown secure  ...  The General Verification Approach The proof that the kernel is secure has two parts: a) developing four levels of specifications, ranging from Pascal code to the top-level security criterion, and b) verifying  ...  Introduction Data Secure Unix, a kernel structured operating system, was constructed as part of an ongoing effort at UCLA to develop procedures by which operating systems can be produced and shown secure  ... 
doi:10.1145/800215.806571 dblp:conf/sosp/WalkerKP79 fatcat:eeb6ofwjevgabkjxj2wctwnrea

OS Verification- A Survey as a Source of Future Challenges

Kushal Anjaria, Arun Mishra
2015 International Journal of Computer Science & Engineering Survey  
Formal verification of an operating system kernel manifests absence of errors in the kernel and establishes trust in it.  ...  This paper evaluates various projects on operating system kernel verification and presents indepth survey of them.  ...  The UCLA project managed to finish 90% of their specification and 20% of their proofs in 5 person-year. Figure-3 shows the detail of implementation of UCLA secure unix project.  ... 
doi:10.5121/ijcses.2015.6401 fatcat:kmf3kdtarja7fduluaq5qxx4we

Operating system verification—An overview

Gerwin Klein
2009 Sadhana (Bangalore)  
We survey the state of the art, the advantages and limitations of machinechecked code proofs, and describe two specific ongoing larger-scale verification projects in more detail.  ...  This paper gives a high-level introduction to the topic of formal, interactive, machine-checked software verification in general, and the verification of operating systems code in particular.  ...  Acknowledgements The author would like to thank Elisabeth Meister, Timothy Bourke, Mark Hillebrand, Tom in der Rieden, Norbert Schirmer, and Hendrik Tews for their feedback and for reading drafts of this  ... 
doi:10.1007/s12046-009-0002-4 fatcat:pl7j3msbsncnhmwg5w34r2uee4

Operating System Verification

Gerwin Klein, Ralf Huuck, Bastian Schlich
2009 Journal of automated reasoning  
These pioneering efforts included UCLA Secure Unix, the PSOS project, and later Bevier's small KIT.  ...  When one is interested in assuring the safety, security, or functional correctness of a computing system, the formal verification of its operating system (OS) is one of the obvious places to start.  ...  Tlili and Debbabi propose an interprocedural static analysis to assure memory and type safety in low-level systems code. The next two papers are concerned with specific aspects of OS verification.  ... 
doi:10.1007/s10817-009-9126-9 fatcat:lre77mskqnguhd5krcrxzpr24u

Issues in kernel design [chapter]

G. J. Popek, C. S. Kline
1978 Lecture Notes in Computer Science  
A good example of such a trusted process appears both in the Multics system at M.I.T. as well as in the UCLA Secure Unix development.  ...  We also wish to thank Evelyn Walton, who largely built the UCLA kernel, and all the members of the UCLA Security Research Group who participated in discussions that helped form and refine these ideas.  ... 
doi:10.1007/3-540-08755-9_5 fatcat:y43endaxqvhs3emjwyqyyrrby4

CVM – A Verified Framework for Microkernel Programmers

Tom In der Rieden, Alexandra Tsyban
2008 Electronical Notes in Theoretical Computer Science  
An endeavor like this is tedious and of a considerable complexity. Thus, we do not try to present all details, but provide references to publications covering specific aspects.  ...  Furthermore, we describe how CVM can be implemented by means of a concrete kernel, thus providing a trustworthy platform for microkernel programmers.  ...  Related Work First attempts to use theorem provers to specify and even prove correct operating systems were made as early as the seventies in PSOS [20] and UCLA Secure Unix [32] .  ... 
doi:10.1016/j.entcs.2008.06.047 fatcat:fhivayrqb5aj7nmrgam33uc4be

Applications for multilevel secure operating systems

JOHN P. L. WOODWARD
1979 1979 International Workshop on Managing Requirements Knowledge (MARK)  
System (KSOS), and briefly discusses the organization of kernel-based secure systems.  ...  Before the discussion of secure computer applications, the following section describes the past and present work that is leading to the completion of a mathematically verified Kernelized Secure Operating  ...  Prototype Secure UNIX systems have been developed by UCLA 13 (under DARPA sponsorship) and MITREI1 (under Air Force and DARPA sponsorship).  ... 
doi:10.1109/mark.1979.8817315 fatcat:nlu27t5yqzfmpne2a65at6ok4i

Scomp: A Solution to the Multilevel Security Problem

Fraim
1983 Computer  
A commercial hardware product, the Scomp system is a unique implementation of a hardware/software general-purpose operating system based on the security kernel concept.  ...  The Honeywell Secure Communications Processor supports a variety of specialized applications that require the processing of information with multilevel security attributes.  ...  The Scomp security kernel, written in UCLA Pascal,'0 consists of approximately 1OK lines of code. It requires approximately 46K words of text and 9K words of global data.  ... 
doi:10.1109/mc.1983.1654440 fatcat:c3rr57x6ivhftf2x5hyxpbzrva

Reflections on the verification of the security of an operating system kernel

Jonathan M. Silverman
1983 Proceedings of the ninth ACM symposium on Operating systems principles - SOSP '83  
The kernel implements multiple protection structures to support both discretionary and nondiscretionary security policies. The design of the kernel was formally specified.  ...  This paper discusses the formal verification of the design of an operating system kernel's conformance to the multilevel security property.  ...  ., "Preliminary Notes on the Design of Secure Military [WALK80] B. Walker, et al., "Specification and Verification of the UCLA Unix Security Kernel," CACM, 23, 2 (February 1980).  ... 
doi:10.1145/800217.806623 dblp:conf/sosp/Silverman83 fatcat:vdjp2feqdfanrfy4syvuprbl7i

Reflections on the verification of the security of an operating system kernel

Jonathan M. Silverman
1983 ACM SIGOPS Operating Systems Review  
The kernel implements multiple protection structures to support both discretionary and nondiscretionary security policies. The design of the kernel was formally specified.  ...  This paper discusses the formal verification of the design of an operating system kernel's conformance to the multilevel security property.  ...  ., "Preliminary Notes on the Design of Secure Military [WALK80] B. Walker, et al., "Specification and Verification of the UCLA Unix Security Kernel," CACM, 23, 2 (February 1980).  ... 
doi:10.1145/773379.806623 fatcat:ztlv4o26rvdenfp7fkhmuwyxxu

Operating System Security

Trent Jaeger
2008 Synthesis Lectures on Information Security Privacy and Trust  
He is active in the security research community, having been a member of the program committees of all the major security conferences, and the program chair of the ACM CCS Government and Industry Track  ...  , and the Xen security architecture.  ...  The original idea was to build a security kernel and an emulator to enable execution of an ordinary operating system (UNIX), as was done by KSOS [198] and the UCLA Secure Data UNIX system [248] .  ... 
doi:10.2200/s00126ed1v01y200808spt001 fatcat:o7qgtis6zffr3disdujoq4izaa

Verifying security invariants in ExpressOS

Haohui Mai, Edgar Pek, Hui Xue, Samuel Talmadge King, Parthasarathy Madhusudan
2013 Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems - ASPLOS '13  
effort while still proving the security relevant aspects of our system.  ...  We built ExpressOS, analyzed its security, and tested its performance. Our evaluation shows that the performance of ExpressOS is comparable to an Android-based system.  ...  We also thank Shuo Tang for implementing an earlier version of the system.  ... 
doi:10.1145/2451116.2451148 dblp:conf/asplos/MaiPXKM13 fatcat:e6sxytmbrbd2dmgs2aq4qb53py

Verifying security invariants in ExpressOS

Haohui Mai, Edgar Pek, Hui Xue, Samuel Talmadge King, Parthasarathy Madhusudan
2013 SIGPLAN notices  
effort while still proving the security relevant aspects of our system.  ...  We built ExpressOS, analyzed its security, and tested its performance. Our evaluation shows that the performance of ExpressOS is comparable to an Android-based system.  ...  We also thank Shuo Tang for implementing an earlier version of the system.  ... 
doi:10.1145/2499368.2451148 fatcat:e3kqzgbohrf2bbtuirtb6nmngy

The advent of trusted computer operating systems

Stephen T. Walker
1980 Proceedings of the May 19-22, 1980, national computer conference on - AFIPS '80  
The level of integrity afforded by the security kernel mech .. anism and the formal specification and verification process to which it is subjected, as applied in KSOS and KVM, should be sufficient for  ...  In 1977 based on the success of the UCLA and MITRE trusted UNIX prototype developments, an effort was begun to develop a "protection quality" trusted system, entitled the DoD Kernelized Secure Operating  ... 
doi:10.1145/1500518.1500626 dblp:conf/afips/Walker80 fatcat:4nhone6d4fdxthdzo4v42tuc6a
« Previous Showing results 1 — 15 out of 82 results