当前位置: X-MOL 学术ACM J. Emerg. Technol. Comput. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Survey of Approaches and Techniques for Security Verification of Computer Systems
ACM Journal on Emerging Technologies in Computing Systems ( IF 2.2 ) Pub Date : 2023-01-19 , DOI: https://dl.acm.org/doi/10.1145/3564785
Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, Onur Demir, Jakub Szefer

This article surveys the landscape of security verification approaches and techniques for computer systems at various levels: from a software-application level all the way to the physical hardware level. Different existing projects are compared, based on the tools used and security aspects being examined. Since many systems require both hardware and software components to work together to provide the system’s promised security protections, it is not sufficient to verify just the software levels or just the hardware levels in a mutually exclusive fashion. This survey especially highlights system levels that are verified by the different existing projects and presents to the readers the state of the art in hardware and software system security verification. Few approaches come close to providing full-system verification, and there is still much room for improvement.



中文翻译:

计算机系统安全验证方法与技术综述

本文调查了计算机系统各个级别的安全验证方法和技术的概况:从软件应用程序级别一直到物理硬件级别。根据所使用的工具和正在检查的安全方面,对不同的现有项目进行了比较。由于许多系统需要硬件和软件组件协同工作以提供系统承诺的安全保护,因此以相互排斥的方式仅验证软件级别或硬件级别是不够的。本次调查特别强调了由不同现有项目验证的系统级别,并向读者展示了硬件和软件系统安全验证的最新技术水平。很少有方法能够提供全系统验证,

更新日期:2023-01-19
down
wechat
bug