Sciweavers

137 search results - page 9 / 28
» Justifying Integrity Using a Virtual Machine Verifier
Sort
View
ISW
2004
Springer
14 years 27 days ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner
VMCAI
2009
Springer
14 years 2 months ago
Model-Checking the Linux Virtual File System
This paper presents a case study in modelling and verifying the Linux Virtual File System (VFS). Our work is set in the context of Hoare’s verification grand challenge and, in p...
Andy Galloway, Gerald Lüttgen, Jan Tobias M&u...
ASPLOS
2012
ACM
12 years 3 months ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee
OSDI
2002
ACM
14 years 7 months ago
An Integrated Experimental Environment for Distributed Systems and Networks
Three experimental environments traditionally support network and distributed systems research: network emulators, network simulators, and live networks. The continued use of mult...
Brian White, Jay Lepreau, Leigh Stoller, Robert Ri...
RAID
2010
Springer
13 years 6 months ago
HyperCheck: A Hardware-Assisted Integrity Monitor
Abstract. Over the past few years, virtualization has been employed to environments ranging from densely populated cloud computing clusters to home desktop computers. Security rese...
Jiang Wang, Angelos Stavrou, Anup K. Ghosh