A Verification Methodology for the Arm® Confidential Computing Architecture: From a Secure Specification to Safe Implementations.
Anthony C. J. FoxGareth StockwellShale XiongHanno BeckerDominic P. MulliganGustavo PetriNathan ChongPublished in: Proc. ACM Program. Lang. (2023)
Keyphrases
- formal verification
- conceptual model
- software implementation
- model checking
- design methodology
- sensitive data
- real time
- security architecture
- layered architecture
- protocol specification
- colored petri nets
- asynchronous circuits
- integrity verification
- reactive systems
- application level
- formal methods
- efficient implementation
- interaction model
- formal model
- cryptographic protocols
- original data
- software architecture
- management system
- digital rights management
- data sets
- security analysis
- hardware architecture
- code generation
- communication protocols
- temporal logic
- high level