期刊文献+

操作系统形式化设计与验证综述 被引量:7

Survey of Formal Design and Verification for Operating System
下载PDF
导出
摘要 对操作系统的形式化设计和验证的概念进行介绍,描述其框架和基本方法。比较和分析操作系统宏内核和微内核结构,调查多个设计和验证项目,阐述项目的验证目标、方法、优缺点和进展情况。在总结研究现状的基础上,分析和展望操作系统形式化设计和验证的发展趋势,从操作系统模型设计、验证工具、代码实现和验证重用等方面给出形式化设计和验证的思路。 This paper introduces the concepts of formal design and verification for the Operating System(OS),and elaborates the framework and foundational methods of formal design and verification.It compares and analyzes the monolithic kernel and micro kernel architectures of the OS.Meanwhile,it investigates multiple design and verification projects in depth,focusing on the verification objectives,the methodology,the advantages and limitations,and the progression.It summarizes the state of the art,analyzes and outlooks the trends of the formal design and verification for the OS.What is more,from the aspects of model design,verification tools,code implementation and verification reuse,it advances the ideas of formal design and verification.
出处 《计算机工程》 CAS CSCD 2012年第11期234-238,共5页 Computer Engineering
基金 国家"863"计划基金资助项目"分布式可信计算系统研究"(2007AA01Z409) 国家自然科学基金资助项目(60721002) 江苏省科技支撑计划基金资助项目"可信操作系统新技术研发"(BE2008124)
关键词 操作系统 形式化设计 形式化验证 定理证明 系统安全 框架设计 Operating System(OS) formal design formal verification theorem proving system security architecture design
  • 相关文献

参考文献44

  • 1Clarke E M, Grumberg O, Peled D. Model Checking[M]. Cambridge, USA: The MIT Press, 1999.
  • 2Guenthner F. Handbook of Philosophical Logic[M]. Berlin, Germany: Springer, 2007.
  • 3周巢尘.形式语义学引论[M].长沙:湖南科学技术出版社,1985.
  • 4Tanenbaum A S. The Minix Project[EB/OL]. [2011-03-12]. http:// www.minix3.org/.
  • 5Rashid R, Julin D, Orr D, et al. Math: A System Software Kemel[C]//Proc. of COMPCON'89. San Francisco, USA: [s. n.], 1989: 176-189.
  • 6Liedtke J. On μ-kemel Construetion[C]//Proc. of SOSP'95. New York, USA: ACM Press, 1995: 237-250.
  • 7Dorenb/tcher J. Vamos Microkemel: Formal Models and Verifica- tion[EB/OL]. [2011-03-12]. http://www.cse.unsw.edu.au/~formal methods/events/svws-06/VAMOS_Mierokemel.pdf.
  • 8Geeknet, Inc. Root Exploit for NVIDIA Closed-source Linux Driver[EB/OL]. [2011-03-12]. http://it.slashdot.org/article.pl?sid= 06/10/16/2038253.
  • 9SecurityFocus. Vulnerabilities Web Site[EB/OL]. [2011-03-12]. http://www.securityfocus.com/vulnerabilities.
  • 10DiBona C, Ockman S, Stone M. Open Sources: Voices from the Open Source Revolution[M]. Sebastopol, USA: O'Reilly Media, Inc., 2008.

二级参考文献67

  • 1[1]Lampson BW. A note on the confinement problem. CACM, 1973,16(10):.613~615.
  • 2[2]Tsai CR, Gligor VD, Chandersekaran CS. A formal method for the identification of covert storage channels in source code. IEEE Trans. on Software Engineering, 1990,16(6):569~580.
  • 3[3]U.S. Department of Defense. Trusted Computer System Evaluation Criteria. DoD 5200.28-STD, 1985.
  • 4[4]General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China. Classfied criteria for security protection of computer information system. GB 18859-1999, 1999 (in Chinese).
  • 5[5]Qing SH, Ji QG. Formal model design for secure operating systems. In: ITI 1st Int'l Conf. on Information and Communications Technology. 2003.
  • 6[6]Kemmerer RA. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Trans. on Computer Systems, 1983,1(3):256~277.
  • 7[7]Porras PA, Kemmerer RA. Covert flow trees: A technique for identifying and analyzing covert storage channels. In: Proc. of the 1991 IEEE Computer Society Symp. on Research in Security and Privacy. 1991.36~51.
  • 8[8]McHugh J. Covert channel analysis: A chapter of the handbook for the computer security certification of trusted system. NRL Technical Memorandum 5540:062A, 1995.
  • 9[9]Kemmerer RA, Taylor T. A modular covert channel analysis methodology for trusted DG/UX. In: Proc. of the 12th Annual Computer Security Applications Conf. Washington: IEEE Computer Society, 1996. 224~235.
  • 10[10]Millen JK. Finite-State noiseless covert channels. In: Proc. of the Computer Security Foundations Workshop. Franconia: IEEE Computer Society, 1989. 81~85.

共引文献52

同被引文献56

  • 1董志国,李式巨.嵌入式Linux设备驱动程序开发[J].计算机工程与设计,2006,27(20):3737-3740. 被引量:30
  • 2Freescale. Freescale MQX real-time operating system user' s guide Rev. 3[EB/OL]. (2011 -04- 19). [2011 -06 -22]. http:// cache, freescale, com/files/32bit/doc/user_guide/MQXUG, pdf.
  • 3Freeseale. Freescale MQX I/O drivers users guide Rev. 9 EB/OL]. (2011 - 04 - 19). 2011 - 06 - 28 ]. http ://cache. freescale, tom/ files/32bit/doc/user_guide/MQXIOUG, ladf.
  • 4Jonathan Corbet, Alessandro Rubini, Greg Kroah-Hartman. LINUX 设备驱动程序[M].2版.魏永明,耿岳,钟书毅,译.中国电力出版社,2006.
  • 5Carlos Neri, Luis Reynoso. How to develop I/O drivers for MQX [ EB/ OL]. (2009 - 08 - 30). [ 2012 - 04 - 02 ]. http ://cache. freescale. com/files/32 bit/doc/app note/AN3902, pdf.
  • 6Liedtke J. Towards real microkeruels [ J ]. Communications of the ACM,1996,39(9) :70-77.
  • 7Setapa S, Isa M A M, Abdullah N, et al. Trusted computing based microkernel [ C ]//Proc of international conference on computer application & industrial electronic. [ s. 1. ] : [ s. n. ], 2010:83-88.
  • 8Jochen L. Improving IPC by kernel design[ C ]//Proc of 14th ACM symposium on operating system principles. Asheville, NC,USA: [ s. n. ] ,1993:175-188.
  • 9Team L. L4 experimental kernel reference manual version X. 2 [ D ]. Karlsruhe : Universitat Karlsruhe ,2011.
  • 10IAka Team. L4ka:Pistaciosource code 0.4[ EB/OL]. [2012- 04 ]. http ://www. 14ka. org/96, php.

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部