Hacker News new | past | comments | ask | show | jobs | submit login

that's a proof that the system corresponds to a specification though



That's right: a formal specification, formal security model, and proof the spec implements it. An implementation formally proven to implement that spec will then posses the security property unless done in by stuff not covered by that model.

Which is where EAL6/7's other assurance activities come in.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: