G. Barthe, G. Betarte, J. D. Campo, J. M. Chimento, and C. Luna, Formally verified implementation of an idealized model of virtualization, 19th International Conference on Types for Proofs and Programs, pp.45-63, 2013.

C. Baumann, B. Beckert, H. Blasum, and T. Bormer, Ingredients of operating system correctness, lessons learned in the formal verification of PikeOS, Emb. World Conf, 2010.

D. E. Bell and L. J. Padula, Secure computer system : Unified exposition and Multics interpretation, 1976.

L. Gu, A. Vaynberg, B. Ford, Z. Shao, and D. Costanzo, CertiKOS, Proceedings of the Second Asia-Pacific Workshop on Systems, APSys '11, pp.1-3, 2011.
DOI : 10.1145/2103799.2103803

G. Klein, J. Andronick, K. Elphinstone, T. Murray, T. Sewell et al., Comprehensive formal verification of an OS microkernel, ACM Transactions on Computer Systems, vol.32, issue.1, pp.1-270, 2014.
DOI : 10.1145/2560537

A. Vaynberg and Z. Shao, Compositional Verification of a Baby Virtual Memory Manager, Certified Programs and Proofs, pp.143-159, 2012.
DOI : 10.1007/978-3-642-35308-6_13

S. Zdancewic, Challenges for information-flow security, Proceedings of the 1st International Workshop on the Programming Language Interference and Dependence, 2004.