高级检索
    钱振江 刘 苇 黄 皓. 操作系统对象语义模型(OSOSM)及形式化验证[J]. 计算机研究与发展, 2012, 49(12): 2702-2712.
    引用本文: 钱振江 刘 苇 黄 皓. 操作系统对象语义模型(OSOSM)及形式化验证[J]. 计算机研究与发展, 2012, 49(12): 2702-2712.
    Qian Zhenjiang, Liu Wei, and Huang Hao. OSOSM:Operating System Object Semantics Model and Formal Verification[J]. Journal of Computer Research and Development, 2012, 49(12): 2702-2712.
    Citation: Qian Zhenjiang, Liu Wei, and Huang Hao. OSOSM:Operating System Object Semantics Model and Formal Verification[J]. Journal of Computer Research and Development, 2012, 49(12): 2702-2712.

    操作系统对象语义模型(OSOSM)及形式化验证

    OSOSM:Operating System Object Semantics Model and Formal Verification

    • 摘要: 操作系统的复杂性使得其安全性问题日益突出.有不少的研究工作采用形式化的方式对现有的操作系统进行了正确性的验证,这些工作主要是采用程序形式逻辑验证代码级的功能实现性.从系统设计的角度,以高阶逻辑和类型论为基础,提出了操作系统对象语义模型(OSOSM).OSOSM采用分层结构,包括基本功效层、实现层和优化层.OSOSM将操作系统中的行为主体和资源抽象为操作系统对象,建立操作系统的论域,利用以操作系统对象变元集合为定义域到论域的映射表示操作系统的状态,描述操作系统系统调用等行为的语义,使用逻辑系统的谓词公式表达操作系统的安全属性,给出如何验证操作系统在运行过程中保持安全策略和属性的形式化描述方法.以实现并经过形式化验证的可信操作系统(VTOS)为例,阐述OSOSM的语义正确性.使用Isabelle定理证明工具验证设计和安全需求的一致性,以说明VTOS具有预期的安全属性.

       

      Abstract: The complexity of the operating system makes its security problems become increasingly prominent. Many research works verify the correctness of the existing operating systems using formal methods, and they mainly focus on verifying the implementation of functions on code level with programming formal logic. In this paper, from the view of system design, we recently propose an operating system object semantics model (OSOSM) based on the higher order logic and type theory. OSOSM adopts a hierarchical structure, including essential effectiveness layer, implementation layer, and optimization layer. OSOSM abstracts the execution subjects and resources as objects of the operating system, and establishes the domain of the discourse for the operating system. We denote the state of the operating system by mapping from the set of operating system object variables to the domain of discourse. OSOSM describes the semantics of system calls, and the security properties with the predicate formulae. This paper also elaborates on the formal methods of verifying that during execution the operating system maintains the security tactics and properties. Finally, we use the self-implemented and the verified trusted operating system (VTOS) as an example to illustrate the semantics correctness of OSOSM, and verify the consistency between the design and safety requirements with Isabelle theorem prover and show that VTOS has the expected security properties.

       

    /

    返回文章
    返回