DocumentCode :
2562026
Title :
Analysis of the Hardware Verification of the Honeywell SCOMP
Author :
Gligor, Virgil D.
Author_Institution :
University of Maryland
fYear :
1985
fDate :
22-24 April 1985
Firstpage :
32
Lastpage :
32
Abstract :
An analysis of the verification approach used for the SCOMP hardware is presented herein. Although the SCOMP approach is informal it is extensive and thorough. In general, it provides sufficient evidence to conclude that the SCOMP hardware forms a sound basis for the development of a security kernel. However, the SCOMP approach presents a number of problems which are common to most informal verification approaches. These problems include: (1) incomplete formal top-level specification of the hardware functions that are visible at the TCB interface, and (2) incomplete coverage of design (and implementation) analysis and testing. The existence of verification problems does not imply that design/implementation flaws are left undiscovered and uncorrected in the SCOMP system. However, it does require that complete confidence in the hardware design (and implementation) be gained in alternate ways; e.g., by careful review of all possible implications of the verification omissions, and, possibly, by penetration analysis. All concerns raised along these lines with the system designers were answered in a satisfactory way.
Keywords :
Hardware; Kernel; Microprogramming; Process control; Registers; Security; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1985 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
ISSN :
1540-7993
Print_ISBN :
0-8186-0629-0
Type :
conf
DOI :
10.1109/SP.1985.10010
Filename :
6234833
Link To Document :
بازگشت