Loading…

Survey of Approaches and Techniques for Security Verification of Computer Systems

This article surveys the landscape of security verification approaches and techniques for computer systems at various levels: from a software-application level all the way to the physical hardware level. Different existing projects are compared, based on the tools used and security aspects being exa...

Full description

Saved in:
Bibliographic Details
Published in:ACM journal on emerging technologies in computing systems 2023-01, Vol.19 (1), p.1-34, Article 6
Main Authors: Erata, Ferhat, Deng, Shuwen, Zaghloul, Faisal, Xiong, Wenjie, Demir, Onur, Szefer, Jakub
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This article surveys the landscape of security verification approaches and techniques for computer systems at various levels: from a software-application level all the way to the physical hardware level. Different existing projects are compared, based on the tools used and security aspects being examined. Since many systems require both hardware and software components to work together to provide the system’s promised security protections, it is not sufficient to verify just the software levels or just the hardware levels in a mutually exclusive fashion. This survey especially highlights system levels that are verified by the different existing projects and presents to the readers the state of the art in hardware and software system security verification. Few approaches come close to providing full-system verification, and there is still much room for improvement.
ISSN:1550-4832
1550-4840
DOI:10.1145/3564785