• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 58
Next 10 →

seL4: from general purpose to a proof of information flow enforcement

by Toby Murray, Daniel Matichuk, Matthew Brassil, Peter Gammie, Timothy Bourke, Sean Seefried, Corey Lewis, Xin Gao, Gerwin Klein - In IEEE Symp. Security & Privacy , 2013
"... Abstract—In contrast to testing, mathematical reasoning and formal verification can show the absence of whole classes of security vulnerabilities. We present the, to our knowledge, first complete, formal, machine-checked verification of information flow security for the implementation of a general-p ..."
Abstract - Cited by 25 (7 self) - Add to MetaCart
-purpose microkernel; namely seL4. Unlike previous proofs of information flow security for operating system kernels, ours applies to the actual 8,830 lines of C code that implement seL4, and so rules out the possibility of invalidation by implementation errors in this code. We assume correctness of compiler, assembly

More Typed Assembly Languages for Confidentiality

by Dachuan Yu
"... Abstract. We propose a series of type systems for the information-flow security of assembly code. These systems extend previous work TALC with some timing annotations and associated judgments and rules. By using different timing rules, these systems are applicable to different practical settings. In ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. We propose a series of type systems for the information-flow security of assembly code. These systems extend previous work TALC with some timing annotations and associated judgments and rules. By using different timing rules, these systems are applicable to different practical settings

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.

First Building Blocks for Implementations of Security Protocols Verified in Coq

by Reynald Affeldt, Kazuhiko Sakaguchi
"... Summary In this presentation, we would like to report on recent case studies of verification in Coq using Separation logic: publicize verified assembly programs for multi-precision arithmetic [2] and report on our progress about verification of network packet parsing written in C (progress since [4] ..."
Abstract - Add to MetaCart
Summary In this presentation, we would like to report on recent case studies of verification in Coq using Separation logic: publicize verified assembly programs for multi-precision arithmetic [2] and report on our progress about verification of network packet parsing written in C (progress since [4

Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations

by José Bacelar, Almeida Manuel, Barbosa Gilles, Barthe François Dupressoir
"... We present a computer-aided framework for proving concrete security bounds for cryptographic machine code implementations. The front-end of the framework is an interactive verification tool that extends the EasyCrypt framework to reason about relational properties of C-like programs extended with id ..."
Abstract - Add to MetaCart
We present a computer-aided framework for proving concrete security bounds for cryptographic machine code implementations. The front-end of the framework is an interactive verification tool that extends the EasyCrypt framework to reason about relational properties of C-like programs extended

Taipei TW

by Chia-hsin Owen Chen, Chung-wei Chen, Cynthia Kuo, Yan-hao Lai, Jonathan M. Mccune, National Tsing Hua, Taichung Tw
"... Establishing secure communication among a group of physically collocated people is a challenge. This problem can be reduced to establishing authentic public keys among all the participants – these public keys then serve to establish a shared secret symmetric key for encryption and authentication of ..."
Abstract - Add to MetaCart
for the secure exchange of authenticated information among a group of people. In contrast to prior work, GAnGS resists Groupin-the-Middle and Sybil attacks by malicious insiders, as well as infiltration attacks by malicious bystanders. GAnGS is designed to be robust to user errors, such as miscounting the number

unibz.it

by Diego Calvanese, G. De Giacomo, A. Deutsch, M. Montali
"... Bug found in FPU. Intel offers to replace faulty chips. Estimated loss: 475M US$ Esploded 37secs after launch. Cause: uncaught overflow ex-ception. Software “glitch ” found in anti-lock braking system. 185,000 cars recalled. Why verify? “Testing can only show the presence of errors, not their absenc ..."
Abstract - Add to MetaCart
Bug found in FPU. Intel offers to replace faulty chips. Estimated loss: 475M US$ Esploded 37secs after launch. Cause: uncaught overflow ex-ception. Software “glitch ” found in anti-lock braking system. 185,000 cars recalled. Why verify? “Testing can only show the presence of errors, not their absence. ” [Edgar Dijkstra]

Defense Against the Dark Arts

by unknown authors
"... Computer science faculty must attract and retain students by offer-ing innovative courses that spark student interest, yet still teach core, computer science concepts. These efforts have become par-ticularly important as computer science enrollments have declined, thus increasing concerns for attrac ..."
Abstract - Add to MetaCart
—completely filling each semester with enrollments that are four to five times greater than the com-piler course. Furthermore, student surveys indicate that the course raises students ’ awareness of computer security while introducing students to important program translation and analysis concepts.

unknown title

by unknown authors
"... Abstract—In contrast to testing, mathematical reasoning and formal verification can show the absence of whole classes of security vulnerabilities. We present the, to our knowledge, first complete, formal, machine-checked verification of information flow security for the implementation of a general-p ..."
Abstract - Add to MetaCart
Abstract—In contrast to testing, mathematical reasoning and formal verification can show the absence of whole classes of security vulnerabilities. We present the, to our knowledge, first complete, formal, machine-checked verification of information flow security for the implementation of a general

J2EE Performance and Scalability- From Measuring to Predicting

by unknown authors
"... Abstract — J2EE applications are becoming increasingly ubiquitous and with their increasing adoption, performance and scalability issues are gaining in importance. For a J2EE application to perform well and be scalable, both the platform on which it is built and the application design must be effici ..."
Abstract - Add to MetaCart
to predict the behavior of the system under load. The approach is validated by comparing model predictions against measurements on the real system. Index Terms — Performance modeling and prediction, software verification, performance evaluation, distributed systems
Next 10 →
Results 1 - 10 of 58
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University