Title
It's Time for Trustworthy Systems
Abstract
The time has arrived for truly trustworthy systems, backed by machine-checked proofs of security and reliability. Research demonstrates that formal whole-system analysis that applies to the C and binary implementation level is feasible, including proofs of integrity, authority confinement, confidentiality, and worst-case execution time. Because these proofs build on previous results, they become easier each year. However, they do have some limitations.
Year
DOI
Venue
2012
10.1109/MSP.2012.41
IEEE Security & Privacy
Keywords
Field
DocType
formal whole-system analysis,authority confinement,trustworthy system,worst-case execution time,binary implementation level,previous result,trustworthy systems,machine-checked proof,computer security,reliability,confidentiality,security,worst case execution time,trusted computing,secure computation,formal verification,hardware,system analysis
Trustworthy computing,Trusted Computing,Worst-case execution time,Confidentiality,Computer science,Computer security,Software,Trusted computing base,Formal verification,Formal proof
Journal
Volume
Issue
ISSN
10
2
1540-7993
Citations 
PageRank 
References 
6
0.64
4
Authors
3
Name
Order
Citations
PageRank
Gernot Heiser12525137.42
Toby Murray224217.03
Gerwin Klein3145087.47