Blog
About

1
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Practical and Scalable Security Verification of Secure Architectures

      Preprint

      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We present a new and practical framework for security verification of secure architectures. Specifically, we break the verification task into external verification and internal verification. External verification considers the external protocols, i.e. interactions between users, compute servers, network entities, etc. Meanwhile, internal verification considers the interactions between hardware and software components within each server. This verification framework is general-purpose and can be applied to a stand-alone server, or a large-scale distributed system. We evaluate our verification method on the CloudMonatt and HyperWall architectures as examples.

          Related collections

          Most cited references 7

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Trusted computing building blocks for embedded linux-based ARM trustzone platforms

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Scalable architectural support for trusted software

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found
              Is Open Access

              The Maude LTL Model Checker

                Bookmark

                Author and article information

                Journal
                05 July 2018
                Article
                1807.01854

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                Custom metadata
                cs.CR cs.DC

                Security & Cryptology, Networking & Internet architecture

                Comments

                Comment on this article