Trusted computing base: Difference between revisions

Content deleted Content added
Legobot (talk | contribs)
m Bot: Migrating langlinks to WP:Wikidata - d:q5492632
Replaced link to seL4 as the old link was dead and pointed at a spam site
Line 47:
As stated [[#A prerequisite to security|above]], trust in the trusted computing base is required to make any progress in ascertaining the security of the computer system. In other words, the trusted computing base is “trusted” first and foremost in the sense that it ''has'' to be trusted, and not necessarily that it is trustworthy. Real-world operating systems routinely have security-critical bugs discovered in them, which attests of the practical limits of such trust.<ref>[[Bruce Schneier]], [http://www.schneier.com/crypto-gram-0103.html#1 The security patch treadmill] (2001)</ref>
 
The alternative is formal [[software verification]], which uses mathematical proof techniques to show the absence of bugs. Researchers at [[NICTA]] and its spinout [[Open Kernel Labs]] have recently performed such a formal verification of [http://ertosssrg.orgnicta.com.au/researchprojects/l4.verified seL4/], a member of the [[L4 microkernel|L4 microkernel family]], proving functional correctness of the C implementation of the kernel.<ref Name="Klein_EHACDEEKNSTW_09">
{{ cite conference
| first = Gerwin