1 |
McDermott, and L. Freitas, "A Formal Security Policy for Xenon" ACM, Conference on Computer and Communications Security, Virginia, USA, 2008, pp. 43-52
|
2 |
Praxis High Integrity Systems, "Tokeneer ID Station EAL5 Demonstrator: Summary Report", http://www.adacore.com/home/gnatpro/tokeneer, 2008
|
3 |
Adam Greenberg, "Facing Forward: Cyber Security in 2019 and Beyond", FIREEYE, 2018
|
4 |
https://www.darpa.mil/program/high-assurance-cyber-military-systems
|
5 |
https://www.commoncriteriaportal.org/
|
6 |
Grimm, Tomas, Djones Lettnin, and Michael Hubner. "A survey on formal verification techniques for safety-critical systems-on-chip." Electronics 7.6 (2018)
|
7 |
Robert C. Armstrong, Ratish J. Punnoose, Matthew H. Wong, Jackson R. Mayo, "Survey of Existing Tools for Formal Verification" SANDIA REPORT
|
8 |
Kothari, Suresh, et al. "Modeling lessons from verifying large software systems for safety and security." Proceedings of the 2017 Winter Simulation Conference. IEEE Press, 2017.
|
9 |
http://www.cse.chalmers.se/-risat/Report_MarsPathFinder.pdf
|
10 |
Penix, John, et al. "Verification of time partitioning in the DEOS scheduler kernel." Proceedings of the 22nd international conference on Software engineering. ACM, 2000.
|
11 |
Leinenbach, Dirk, and Thomas Santen. "Verifying the Microsoft Hyper-V hypervisor with VCC." International Symposium on Formal Methods. Springer, Berlin, Heidelberg, 2009.
|
12 |
Penix, John, et al. "Verifying time partitioning in the DEOS scheduling kernel." Formal Methods in System Design 26.2 (2005): 103-135.
DOI
|
13 |
Kang, Eunsuk, and Daniel Jackson. "Formal modeling and analysis of a flash filesystem in Alloy." International Conference on Abstract State Machines, B and Z. Springer, Berlin, Heidelberg, 2008.
|
14 |
Bornholt, James, et al. "Specifying and checking file system crash-consistency models." ACMSIGARCH Computer Architecture News. Vol. 44. No. 2. ACM, 2016.
|
15 |
Barthe, Gilles, et al. "Formally verifying isolation and availability in an idealized model of virtualization." International Symposium on Formal Methods. Springer, Berlin, Heidelberg, 2011.
|
16 |
Freitas, Leo, and John McDermott. "Formal methods for security in the Xenon hypervisor." International journal on software tools for technology transfer 13.5 (2011): 463.
DOI
|
17 |
Klein, Gerwin, et al. "Comprehensive formal verification of an OS microkernel." ACM Transactions on Computer Systems (TOCS) 32.1 (2014)
|
18 |
Blackham, Bernard. Towards verified microkernels for real-time mixed-criticality systems. Diss. University of New South Wales, Sydney, Australia, 2013.
|
19 |
Gu, Ronghui, et al. "CertiKOS: An Extensible Architecture for Building Certified Concurrent {OS} Kernels." 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 2016.
|
20 |
KleinG, AndronickJ. "seL4: formal verification of a noperating system kernel." Communication of the Acm, 2010
|
21 |
Hassanalian, Mostafa, and Abdessattar Abdelkefi. "Classifications, applications, and design challenges of drones: A review." Progress in Aerospace Sciences 91 (2017): 99-131.
DOI
|
22 |
https://cwe.mitre.org/index.html
|
23 |
Shostack, Adam. Threat modeling: Designing for security. John Wiley & Sons, 2014.
|
24 |
Shostack, Adam. "Experiences Threat Modeling at Microsoft." MODSEC@ MoDELS. 2008.
|
25 |
https://cve.mitre.org/index.html
|
26 |
https://capec.mitre.org/
|
27 |
https://www.owasp.org/
|
28 |
Samland, Fred, et al. "AR. Drone: security threat analysis and exemplary attack to track persons." Intelligent Robots and Computer Vision XXIX: Algorithms and Techniques. Vol. 8301. International Society for Optics and Photonics, 2012.
|
29 |
Rodday, Nils Miro, Ricardo de O. Schmidt, and Aiko Pras. "Exploring security vulnerabilities of unmanned aerial vehicles." NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2016.
|
30 |
Shepard, Daniel P., Jahshan A. Bhatti, and Todd E. Humphreys. "Drone hack: Spoofing attack demonstration on a civilian unmanned aerial vehicle." (2012).
|
31 |
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/432646/20150427-DCDC_JDN_3_10_Archived.pdf
|
32 |
Rob Kidner "The security drones report 2017", IFSEC GLOBAL 2017
|
33 |
911 Security. "AIRSPACE SECURITY INSIGHTS REPORT", Dedrone
|
34 |
Robertson, William K., et al. "Run-time Detection of Heap-based Overflows." LISA. Vol. 3. 2003.
|
35 |
Sarah Ludwig. "Drones: A Security Tool, Threat and Challenge", SecurityMagazine
|
36 |
U.S. Department of Transportation, "Unmanned Aircraft System (UAS) Service Demand 2015 - 2035 Literature Review & Projections of Future Usage". 2013
|
37 |
Korea Internet & Security Agency (KISA), "Software Development Security Guide". 2017
|
38 |
https://books.google.co.kr/books?id=Z9aNTafcb3IC&redir_esc=y
|
39 |
Kuperman, Benjamin A., et al. "Detection and prevention of stack buffer overflow attacks." Communications of the ACM, 2005
|
40 |
Davi, Lucas, Ahmad-Reza Sadeghi, and Marcel Winandy. "ROPdefender: A detection tool to defend against return-oriented programming attacks." Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM, 2011.
|
41 |
Wagle, Perry, and Crispin Cowan. "Stackguard: Simple stack smash protection for gcc." Proceedings of the GCC Developers Summit. 2003.
|
42 |
https://www.cvedetails.com/cve/CVE-2002-1983/
|
43 |
Nakagawa, Gaku, and Shuichi Oikawa. "Fork bomb attack mitigation by process resource quarantine." 2016 Fourth International Symposium on Computing and Networking (CANDAR). IEEE, 2016.
|
44 |
https://isis.kisa.or.kr/ebook/download_pdf/2018.pdf
|
45 |
Berlot, Michele, and Janche Sang. "Dealing with Process Overload Attacks in UNIX." Information Security Journal: A Global Perspective 17.1 (2008): 33-44.
DOI
|
46 |
https://www.cyberciti.biz/tips/linux-limiting-user-process.html
|
47 |
https://www.symantec.com/ko/kr/security-center/white-papers
|
48 |
https://aws.amazon.com/ko/blogs/korea/aws-security-whitepapers/
|
49 |
J. Woodcock, S. Stepney, D. Cooper, J. Clark, and 1. Jacob, "The certification of the Mondex electronic purse to ITSEC Level E6", Formal Aspects of Computing 20, 2008
|
50 |
S. Stepney, and D. Cooper, "Formal Methods for Industrial Products", LNCS, Springer, ZB2000, York, Aug. 2000
|