Technical Digest


Tech Digest Vol.32 Num.2 Cover

Trustworthy Computing at APL
Volume 32, Number 2 (2013)

In the 21st century, cyberspace has emerged as the foundation for a new way of life and a new approach to warfighting. We are in the early stages of conquering this man-made space, just as humanity has conquered the sea, air, and outer-space domains in previous centuries. This issue of the Johns Hopkins APL Technical Digest describes the use of formal methods, software analysis, new languages, new hardware, and new protocols to derive the principles and define the techniques of trustworthy computing that will allow the safe use of cyberspace.

Trustworthy Computing: Making Cyberspace Safe—Guest Editor's Introduction

Susan C. Lee

Verification of Stack Manipulation in the Scalable Configurable Instrument Processor

J. Aaron Pendergrass

Applying Mathematical Logic to Create Zero-Defect Software

Yanni Kouskoulas and Peter Kazanzides

Formal Methods for Robotic System Control Software

Yanni Kouskoulas, André Platzer, and Peter Kazanzides

Theory and Practice of Mechanized Software Analysis

J. Aaron Pendergrass, Susan C. Lee, and C. Durward McDonell

LKIM: The Linux Kernel Integrity Measurer

J. Aaron Pendergrass and Kathleen N. McGill

Ensuring the Integrity of Running Java Programs

Mark A. Thober, J. Aaron Pendergrass, and Andrew D. Jurik

Analysis of Virtual Machine Record and Replay for Trustworthy Computing

Julian B. Grizzard and Ryan W. Gardner

Trusted Platform Module Evolution

Justin D. Osborn and David C. Challener

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module

Kathleen N. McGill