<--- Back to Details
First PageDocument Content
Computer security / Security / Computing / Software testing / Security Target / Vulnerability / Evaluation Assurance Level / Kernel / Common Criteria / Open-source movement
Date: 2015-09-10 07:41:12
Computer security
Security
Computing
Software testing
Security Target
Vulnerability
Evaluation Assurance Level
Kernel
Common Criteria
Open-source movement

Microsoft Word - Trusting_Developers_Whitepaper_cc-3.doc

Add to Reading List

Source URL: www.atsec.com

Download Document from Source Website

File Size: 83,55 KB

Share Document on Facebook

Similar Documents

Computer security / Computer hardware / Side-channel attacks / X86 architecture / Computing / Meltdown / Computer engineering / Pwnie Awards

Meltdown Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6 , Yuval Yarom

DocID: 1xVgv - View Document

System software / Computer architecture / Software / Kernel / Xv6 / LLVM / Linux kernel

Hyperkernel: Push-Button Verification of an OS Kernel

DocID: 1xVeg - View Document

Computer architecture / Computing / Formal methods / Logic in computer science / Kernel / Linux kernel / L4 microkernel family / Mach / Verification / X86-64 / Formal verification / Satisfiability modulo theories

Hyperkernel: Push-Button Verification of an OS Kernel Luke Nelson, Helgi Sigurbjarnarson, Kaiyuan Zhang, Dylan Johnson, James Bornholt, Emina Torlak, and Xi Wang University of Washington {lukenels,helgi,kaiyuanz,dgj16,bo

DocID: 1xUUc - View Document

Computer architecture / Computing / Computer hardware / Central processing unit / X86 architecture / Computer memory / Side-channel attacks / Virtual memory / Translation lookaside buffer / CPU cache / Meltdown / Spectre

Meltdown: Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6,9 , Yuval Ya

DocID: 1xU6r - View Document

PDF Document

DocID: 1xPhq - View Document