Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Design and verification of the arm confidential compute architecture
The increasing use of sensitive private data in computing is matched by a growing concern
regarding data privacy. System software such as hypervisors and operating systems are …
regarding data privacy. System software such as hypervisors and operating systems are …
Operating system verification—an overview
G Klein - Sadhana, 2009 - Springer
This paper gives a high-level introduction to the topic of formal, interactive, machine-
checked software verification in general, and the verification of operating systems code in …
checked software verification in general, and the verification of operating systems code in …
seL4: Formal verification of an OS kernel
G Klein, K Elphinstone, G Heiser, J Andronick… - Proceedings of the …, 2009 - dl.acm.org
Complete formal verification is the only known way to guarantee that a system is free of
programming errors. We present our experience in performing the formal, machine-checked …
programming errors. We present our experience in performing the formal, machine-checked …
Comprehensive formal verification of an OS microkernel
G Klein, J Andronick, K Elphinstone, T Murray… - ACM Transactions on …, 2014 - dl.acm.org
We present an in-depth coverage of the comprehensive machine-checked formal verification
of seL4, a general-purpose operating system microkernel. We discuss the kernel design we …
of seL4, a general-purpose operating system microkernel. We discuss the kernel design we …
Adoption of mobile devices/services-searching for answers with the UTAUT
C Carlsson, J Carlsson, K Hyvonen… - Proceedings of the …, 2006 - ieeexplore.ieee.org
The future of mobile telephony is expected to rely on mobile services and the use of mobile
services will be an integral part of the revenues to be generated by third generation mobile …
services will be an integral part of the revenues to be generated by third generation mobile …
seL4: from general purpose to a proof of information flow enforcement
T Murray, D Matichuk, M Brassil… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
In contrast to testing, mathematical reasoning and formal verification can show the absence
of whole classes of security vulnerabilities. We present the, to our knowledge, first complete …
of whole classes of security vulnerabilities. We present the, to our knowledge, first complete …
Design, implementation and verification of an extensible and modular hypervisor framework
A Vasudevan, S Chaki, L Jia, J McCune… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
We present the design, implementation, and verification of XMHF-an eXtensible and
Modular Hypervisor Framework. XMHF is designed to achieve three goals--modular …
Modular Hypervisor Framework. XMHF is designed to achieve three goals--modular …
A literature review on embedded systems
L De Micco, FL Vargas… - IEEE Latin America …, 2019 - ieeexplore.ieee.org
Embedded system design is crucial for the development of industry, technology, and
science, and it is an area that has significantly grown in recent years throughout Latin …
science, and it is an area that has significantly grown in recent years throughout Latin …
Applying formal methods to a certifiably secure software system
C Heitmeyer, M Archer, E Leonard… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
A major problem in verifying the security of code is that the code's large size makes it much
too costly to verify in its entirety. This article describes a novel and practical approach to …
too costly to verify in its entirety. This article describes a novel and practical approach to …
Automating information flow analysis of low level code
M Balliu, M Dam, R Guanciale - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
Low level code is challenging: It lacks structure, it uses jumps and symbolic addresses, the
control flow is often highly optimized, and registers and memory locations may be reused in …
control flow is often highly optimized, and registers and memory locations may be reused in …