Trustworthy Computing at APL

In the 21st century, cyberspace has emerged as the foundation for a new way of life and a new approach to warfighting. We are in the early stages of conquering this man-made space, just as humanity has conquered the sea, air, and outer-space domains in previous centuries. This issue of the Johns Hopkins APL Technical Digest describes the use of formal methods, software analysis, new languages, new hardware, and new protocols to derive the principles and define the techniques of trustworthy computing that will allow the safe use of cyberspace.

Trustworthy Computing: Making Cyberspace Safe—Guest Editor's Introduction
Susan C. Lee

Verification of Stack Manipulation in the Scalable Configurable Instrument Processor
J. Aaron Pendergrass

Applying Mathematical Logic to Create Zero-Defect Software
Yanni Kouskoulas and Peter Kazanzides

Formal Methods for Robotic System Control Software

Yanni Kouskoulas, André Platzer, and Peter Kazanzides

Theory and Practice of Mechanized Software Analysis
J. Aaron Pendergrass, Susan C. Lee, and C. Durward McDonell

LKIM: The Linux Kernel Integrity Measurer

J. Aaron Pendergrass and Kathleen N. McGill

Ensuring the Integrity of Running Java Programs
Mark A. Thober, J. Aaron Pendergrass, and Andrew D. Jurik

Analysis of Virtual Machine Record and Replay for Trustworthy Computing
Julian B. Grizzard and Ryan W. Gardner

Trusted Platform Module Evolution

Justin D. Osborn and David C. Challener

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module
Kathleen N. McGill

Inside back cover (PDF)  |  Web-ready front cover (JPG)  |  High-resolution front cover (PDF)


NOTE: First-time users will need to load Adobe Acrobat Reader. For assistance, see your Systems Administrator.

© 2013 by The Johns Hopkins University Applied Physics Laboratory

The electronic version of the Johns Hopkins APL Technical Digest was created by
the Technical Communications Group (TST).