[2]
"Difference between microkernel and monolithic kernel from tech differences",
[3]
J.M. Rushby, Design and verification of secure systems., p. vol. Vol. 15. ACM, 1981., .
[4]
J. Alves-Foss, P. W. Oman, C. Taylor, and W. S. Harrison, "The mils architecture for high-assurance embedded systems", International journal of embedded systems. vol. 2 , no. 3-4 , pp. 239 -247 , 2006.
[6]
W. W. H. Been, Mils: Architecture for high-assurance embedded computing.
[7]
R. Collins, Protection profile for partitioning kernels in environments requiring augmented high robustness.
[10]
J. Rushby, Partitioning in avionics architectures: Requirements, mechanisms, and assurance, Tech. rep., SRI INTERNATIONAL MENLO PARK CA COMPUTER SCIENCE LAB, 2000.
[11]
S. R. Ames Jr, M. Gasser, and R. R. Schell, Security kernel design and implementation: An introduction.
[15]
R. Sailer, E. Valdez, T. Jaeger, R. Perez, L. Van Doorn, J.L. Griffin, S. Berger, R. Sailer, E. Valdez, and T. Jaeger, "shype: Secure hypervisor approach to trusted virtualized systems", Techn. Rep.
[19]
S. Han, and H-W. Jin, "Full virtualization based arinc 653 partitioning", Digital Avionics Systems Conference (DASC). 2011p. 7E1–1
[21]
A. Specification, "653-2: Avionics application software standard
interface: Part 1-required", servicesTech. rep., Technical report,
Avionics Electronic Engineering Committee.. ARINC, 2006
[22]
J. Woodcock, P. G. Larsen, J. Bicarregui, and J. Fitzgerald, "Formal methods: Practice and experience", ACM computing
surveys (CSUR). vol. 41 , no. 4 , p. 19 , 2009.
[25]
B. Chen, X. Li, and X. Zhou, "Model checking of marte/ccsl time behaviors using timed i/o automata", Journal of Systems
Architecture.
[27]
L.A. Johnson, "Do-178b, software considerations in airborne systems and equipment certification", Crosstalk, no. October, p. 199, .
[28]
P. K. Infrastructure, and T. P. Profile, "Profile, Common criteria for
information technology security evaluation", National Security
Agency.
[29]
I. Directorate, Protection profile for separation kernels in environments requiring high robustness US Government.
[31]
R. Buerki, and A.-K. Rueegsegger, Muen-an x86/64 separation kernel for high assurance, University of Applied Sciences Rapperswil (HSR) Tech. Rep..
[33]
J. R. Abrial, Data semantics, Universit´e scientifique et m´edicale.
[35]
I.D. Craig, "Formal Refinement for Operating System Kernels",
[36]
K. A. L. Below, formal refinement for operating system kernels..
[37]
A. Velykis, and L. Freitas, "Formal modelling of separation kernel components", International Colloquium on Theoretical Aspects of
Computing, p. 2010pp. 230-244, .
[38]
A. Velykis, Formal modelling of separation kernels. Master’s
thesis Department of Computer Science, University of York, .
[40]
J-R. Abrial, and J-R. Abrial, The B-book: assigning programs to meanings., Cambridge University Press, 2005.
[41]
"Paris mtro line 14", wikipedia, the free encyclopedia",
[42]
A. Passos, J.M. Faria, and S.M. de Sousa, Critical SoftwareAssessing the formal development of a secure partitioning kernel with the b method., ADCSS, 2009.
[43]
M. Leuschel, and M. Butler, "Prob: A model checker for b", International Symposium of Formal Methods Europe, pp. 855-874, 2003.
[44]
Y. Zhao, Formal specification and verification of separation kernels: An overview.
[45]
K. Kawamorita, R. Kasahara, Y. Mochizuki, and K. Noguchi, "Application of formal methods for designing a separation kernel for embedded systems", World Acad. Sci. Eng. Technol., no. 68, pp. 506-514, 2010.
[46]
D. Jackson, Software abstractions-logic, language, and analysis evised edition The MIT Press, ..
[48]
D. Phelps, M. Auguston, and T.E. Levin, Formal models of a least privilege separation kernel alloy, Tech. rep., NAVAL POSTGRADUATE SCHOOL MONTEREY CA, 2008.
[49]
M. Archer, and C. Heitmeyer, Tame: A specialized specification and verification system for timed automata, Tech. rep., NAVAL RESEARCH LAB WASHINGTON DC CENTER FOR HIGH ASSURANCE COMPUTING SYSTEMS., CHACS, 1996.
[53]
"sel4: formal verification of an operating system kernel", Communica tionsoftheAcm. vol. 53 , no. 6 , pp. 107 -115 , 2010.
[54]
R. Gu, J. Koenig, T. Ramananandro, Z. Shao, X.N. Wu, S-C. Weng, H. Zhang, and Y. Guo, Deep specifications and certified abstraction layers.ACM SIGPLAN Notices., vol., vol. Vol. 50. ACM, 2015, pp. 595-608.
[56]
M. Kaufmann, P. Manolios, and J.S. Moore, Computer-aided reasoning: ACL2 case studies., vol., vol. Vol. 4. Springer Science & Business Media, 2013.
[57]
J. Alves-Foss, B. Rinker, M. Benke, and J. Marshall, "Formal modelling of security policies for multi-partition systems", Tech.
rep, 2002.
[59]
D. Greve, M. Wilding, and W.M. Vanfleet, "A separation kernel
formal security policy", Proc. Fourth International Workshop on
the ACL2 Theorem Prover and Its Applications, Citeseer, 2003.
[61]
D. Greve, R. Richards, and M. Wilding, "A summary of intrinsic partitioning verification", 5th International Workshop on the ACL2
Theorem Prover and Its Applications (ACL2 2004),. 2004 Austin, TX
[65]
R. G. J. K. T. Ramananandro, Z. Shao, N. W. S.-C. W. Haozhong, and Z. Y. Guo, Deep specifications and certified abstraction layers..
[66]
R. Kaiser, and S. Wagner, "Evolution of the pikeos microkernel", First International Workshop on Microkernels for Embedded Systems, p. 50, 2007. p
[68]
C. Baumann, and T. Bormer, "Verifying the pikeos microkernel: First results in the verisoft xt avionics project", Doctoral Symposium on Systems Software Verification (DS SSV09),. 2009p. 20
[69]
C. Baumann, B. Beckert, H. Blasum, and T. Bormer, "Better avionics software reliability by code verification", Proceedings, embedded world Conference. 2009 Nuremberg, Germany, Citeseer
[72]
T. Murray, D. Matichuk, M. Brassil, P. Gammie, T. Bourke, S. Seefried, C. Lewis, X. Gao, and G. Klein, sel4: from general purpose to a proof of information flow enforcement., Security and Privacy (SP),: SP, 2013, pp. 415-429.
[75]
A. Crespo, I. Ripoll, and M. Masmano, "Partitioned embedded architecture based on hypervisor: The xtratum approach", Dependable Computing Conference (EDCC), pp. 67-72, 2010.
[77]
J. McDermott, B. Montrose, M. Li, J. Kirby, and M. Kang, "Separation virtual machine monitors", Proceedings of the 28th Annual Computer Security Applications Conference, pp. 419-428, 2012.
[85]
V. Ha, M. Rangarajan, D. Cofer, H. Rues, and B. Dutertre, "Feature-based decomposition of inductive proofs applied to real-time avionics software: An experience report", Proceedings of the 26th International Conference on Software Engineering, pp. 304-313, 2004.
[87]
J.C. Woodcock, and C. Morgan, "Refinement of state-based concurrent systems", International Symposium of VDM Europe. 1990pp. 340-351
[89]
J. S. UJ, The z notation: A reference manual.
[91]
R. Milner, Communication and concurrency. international series in computer science , 1989.
[92]
B. Roscoe, The theory and practice of concurrency.
[93]
E.W. Dijkstra, E.W. Dijkstra, E.W. Dijkstra, E-U. Informaticien, and E.W. Dijkstra, ""A discipline of programming", prentice-hall Englewood Cliffs. vol. 1, 1976
[97]
J. McDermott, and L. Freitas, "A formal security policy for xenon", Proceedings of the 6th ACM workshop on Formal methods in security engineering, pp. 43-52, 2008.
[98]
A. Roscoe, J. Woodcock, and L. Wulf, "Non-interference through determinism", European Symposium on Research in Computer Security, pp. 31-53, 1994.
[101]
F. Verbeek, S. Tverdyshev, O. Havle, H. Blasum, B. Langenstein, W. Stephan, Y. Nemouchi, A. Feliachi, B. Wolff, and J. Schmaltz, Formal specification of a generic separation kernel.
[102]
Y. Zhao, Z. Yang, D. San’an, and Y. Liu, Event-based formalization of safety-critical operating system standards: An experience report on arinc 653 using event-b.
[109]
M. Asberg, P. Pettersson, and T. Nolte, "Modelling, verification and synthesis of two-tier hierarchical fixedpriority preemptive scheduling", Real-Time Systems (ECRTS), p. 2011pp. 172-181, .