2017
DOI: 10.48550/arxiv.1701.01535
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

High-Assurance Separation Kernels: A Survey on Formal Methods

Abstract: Separation kernels provide temporal/spatial separation and controlled information flow to their hosted applications. They are introduced to decouple the analysis of applications in partitions from the analysis of the kernel itself. More than 20 implementations of separation kernels have been developed and widely applied in critical domains, e.g., avionics/aerospace, military/defense, and medical devices. Formal methods are mandated by the security/safety certification of separation kernels and have been carrie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 93 publications
(115 reference statements)
0
6
0
Order By: Relevance
“…Due to this fact, these kinds of operating systems are often called partitions kernels. Partitioning mechanisms should provide spatial and temporal separation [2]. Moreover, the partition kernel is in charge of resources management such as I/O devices to permit access to only assigned parts of the system.…”
Section: A Safety-criticalmentioning
confidence: 99%
See 4 more Smart Citations
“…Due to this fact, these kinds of operating systems are often called partitions kernels. Partitioning mechanisms should provide spatial and temporal separation [2]. Moreover, the partition kernel is in charge of resources management such as I/O devices to permit access to only assigned parts of the system.…”
Section: A Safety-criticalmentioning
confidence: 99%
“…The foundation of MILS is a Separation Kernel (SK), which is responsible for adherence of data isolation, damage limitation and resource partitioning. SK extends partitioning kernels of sets of specific functionalities to enforce security separation, and information flow [2]. The security requirements are known as Common Criteria (CC) [3] establishing seven Evaluation Assurance Levels (EAL) from 1 to 7, which is the most rigorous.…”
Section: B Security-criticalmentioning
confidence: 99%
See 3 more Smart Citations