diff --git a/PR_400/About/Performance/home.pml b/PR_400/About/Performance/home.pml deleted file mode 100644 index 013d4c68..00000000 --- a/PR_400/About/Performance/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/About/Performance/index.html b/PR_400/About/Performance/index.html deleted file mode 100644 index 1dd2baf6..00000000 --- a/PR_400/About/Performance/index.html +++ /dev/null @@ -1,398 +0,0 @@ - - - - - - seL4 benchmarks | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 - -

Performance

-

This page displays the latest benchmark numbers for seL4 from the publicly -available sel4bench repository. -The following times are reported as mean and standard deviation in -the format mean (std dev), both rounded to the nearest integer.

-
  • IRQ invoke: Time in cycles to invoke a user-level interrupt handler running in the same -address space as the interrupted thread.
  • -
  • IPC call: Time in cycles for invoking a server in a different address space on the same core.
  • -
  • IPC reply: Time in cycles for a server replying to a client in a different address space on -the same core.
  • -
  • Notify: Time in cycles to send a signal from a process with priority 1 to a higher -priority (255) process in a different address space
  • -

Default

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ISAModeCore/SoC/BoardClockIRQ InvokeIPC callIPC replyNotify
Armv7a32A9/i.MX6/Sabre1.0 GHz586(11)316(2)338(7)832(11)
x86_6464i7-4770/Haswell3.4 GHz1568(255)581(13)589(12)1321(72)
x86_6464i7-6700/Skylake (without meltdown mitigation)3.4 GHz1258(193)382(3)388(4)754(82)
Armv8a64A57/Tx1/Jetson1.9 GHz672(32)412(10)411(11)912(8)
RV64IMAC64U54-MC/SiFive Freedom U540/Hifive1.5 GHz971(75)470(12)648(90)1340(51)
- -

MCS

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ISAModeCore/SoC/BoardClockIRQ InvokeIPC callIPC replyNotify
Armv7a32A9/i.MX6/Sabre1.0 GHz895(30)324(1)364(2)1235(17)
x86_6464i7-4770/Haswell3.4 GHz2005(425)584(13)604(13)1589(7)
x86_6464i7-6700/Skylake (without meltdown mitigation)3.4 GHz1626(339)382(3)406(3)1039(10)
Armv8a64A57/Tx1/Jetson1.9 GHz758(15)414(5)462(11)1074(13)
RV64IMAC64U54-MC/SiFive Freedom U540/Hifive1.5 GHz2970(154)721(101)871(29)3820(142)
- -

Compilation Details

-

All benchmarks were built using the trustworthy-systems/sel4 -docker image from the seL4 -docker file repository

Default

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ISAModeCore/SoC/BoardClockCompilerBuild command
Armv7a32A9/i.MX6/Sabre1.0 GHzarm-linux-gnueabi-gcc GNU 10.2.1init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DAARCH32=TRUE -DPLATFORM=sabre
x86_6464i7-4770/Haswell3.4 GHzgcc GNU 10.2.1init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DPLATFORM=x86_64
x86_6464i7-6700/Skylake3.4 GHzgcc GNU 10.2.1init-build.sh -DKernelSkimWindow=FALSE -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DPLATFORM=x86_64
Armv8a64A57/Tx1/Jetson1.9 GHzaarch64-linux-gnu-gcc GNU 10.2.1init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DAARCH64=TRUE -DPLATFORM=tx1
RV64IMAC64U54-MC/SiFive Freedom U540/Hifive1.5 GHzriscv64-unknown-elf-gcc GNU 8.3.0init-build.sh -DFASTPATH=TRUE -DHARDWARE=FALSE -DFAULT=FALSE -DRISCV64=TRUE -DPLATFORM=hifive
- -

MCS

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ISAModeCore/SoC/BoardClockCompilerBuild command
Armv7a32A9/i.MX6/Sabre1.0 GHzarm-linux-gnueabi-gcc GNU 10.2.1init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DAARCH32=TRUE -DPLATFORM=sabre -DMCS=TRUE
x86_6464i7-4770/Haswell3.4 GHzgcc GNU 10.2.1init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DPLATFORM=x86_64 -DMCS=TRUE
x86_6464i7-6700/Skylake3.4 GHzgcc GNU 10.2.1init-build.sh -DKernelSkimWindow=FALSE -DMCS=TRUE -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DPLATFORM=x86_64
Armv8a64A57/Tx1/Jetson1.9 GHzaarch64-linux-gnu-gcc GNU 10.2.1init-build.sh -DFASTPATH=TRUE -DHARDWARE=TRUE -DFAULT=TRUE -DAARCH64=TRUE -DPLATFORM=tx1 -DMCS=TRUE
RV64IMAC64U54-MC/SiFive Freedom U540/Hifive1.5 GHzriscv64-unknown-elf-gcc GNU 8.3.0init-build.sh -DFASTPATH=TRUE -DHARDWARE=FALSE -DFAULT=FALSE -DRISCV64=TRUE -DPLATFORM=hifive -DMCS=TRUE
- -

Source Code

-

This page was generated on 2024-08-14 for sel4bench-manifest 4d7edabb.

-
-
-
- - - - -
- - diff --git a/PR_400/About/home.pml b/PR_400/About/home.pml deleted file mode 100644 index ce177b56..00000000 --- a/PR_400/About/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/About/index.html b/PR_400/About/index.html deleted file mode 100644 index d620ec19..00000000 --- a/PR_400/About/index.html +++ /dev/null @@ -1,232 +0,0 @@ - - - - - - About seL4 | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 - -

- About seL4 -

- -
-
- seL4 Whitepaper -
-
- Download Whitepaper -
-
-
-

- seL4 is a high-assurance, high-performance operating system - microkernel. It is unique because of its comprehensive formal - verification, without compromising performance. It is meant to be used as a - trustworthy foundation for building safety- and security-critical - systems. It is available as open source on GitHub and supported by the - seL4 Foundation. -

-

- seL4 system - Being a kernel means it is the piece - of software that runs at the heart of any software system and - controls all accesses to resources. It provides fine-grained - access control through capabilities, - and controls communication between components of the system. - It is the most critical part of the software system, and runs - in privileged mode. -

-

- Being a microkernel means that it is reduced to a minimal core - that is free from policy and therefore can form a dependable base - for building arbitrary systems serving many different usage - scenarios. -

-

- seL4 is a member of the L4 family of - microkernels, and is the world's most advanced, most - highly assured operating-system kernel. -

-

- seL4's formal verification sets it apart from any other operating - system. In a nutshell, it provides the highest assurance of - isolation between applications running in the system, - meaning that a compromise in one part of the system can be - contained and prevented from harming other, potentially more - critical parts of the system. -

-

- Specifically, seL4's implementation is formally (mathematically) - proven correct (bug-free) against its specification, has been - proved to enforce strong security properties, and if configured - correctly its operations have proven safe upper bounds on their - worst-case execution times. It was the world's first operating - system with such a proof, and is still the only proven operating - system featuring fine-grained capability-based security and high - performance. It also has the most advanced support for mixed - criticality real-time systems. -

-

- For detailed explanations of these terms, see our FAQ. -

-

- In 2009, the seL4 kernel was a scientific breakthrough result - from the Trustworthy Systems - group (TS) that showed that high-performance kernels are - within the realm of formal verification. Today, seL4 is part of - an ecosystem supporting active use in various domains including - automotive, aviation, infrastructure, medical, and defence. A key - highlight demonstrating its fit for real-world deployment was in - the DARPA-funded HACMS - program, where seL4 was used to protect an autonomous helicopter - against cyber-attacks. TS continues to push the state of the art - of operating systems through seL4, in close - cooperation with its partners in the seL4 Foundation. -

- -

- More on TS ongoing and future research about seL4 and trustworthy - systems. -

- -
-
-
- - - - -
- - diff --git a/PR_400/About/more-research.html b/PR_400/About/more-research.html deleted file mode 100644 index ddf881a8..00000000 --- a/PR_400/About/more-research.html +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/About/seL4-whitepaper.pdf b/PR_400/About/seL4-whitepaper.pdf deleted file mode 100644 index e93be07e..00000000 Binary files a/PR_400/About/seL4-whitepaper.pdf and /dev/null differ diff --git a/PR_400/About/seL4/index.html b/PR_400/About/seL4/index.html deleted file mode 100644 index ce177b56..00000000 --- a/PR_400/About/seL4/index.html +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/About/whitepaper.svg b/PR_400/About/whitepaper.svg deleted file mode 100644 index a062ec71..00000000 --- a/PR_400/About/whitepaper.svg +++ /dev/null @@ -1,2162 +0,0 @@ - - - - - - image/svg+xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/Contribute/home.pml b/PR_400/Contribute/home.pml deleted file mode 100644 index 2961c39f..00000000 --- a/PR_400/Contribute/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Contribute/index.html b/PR_400/Contribute/index.html deleted file mode 100644 index 36d6aeb4..00000000 --- a/PR_400/Contribute/index.html +++ /dev/null @@ -1,174 +0,0 @@ - - - - - - Contribute | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 - -

Contribute

- -

We welcome and encourage community contribution to the seL4 platform.

- -

Contributions can take the form of code contributions, proof contributions, documentation contributions, and community support.

- -

Code Contributions

- -

We provide general guidance on contributing code to the seL4 platform as well as specific guidance on making contributions to the kernel and to user-level code.

- - - -

We also provide a list of suggested projects to start working on, as well as an overview of the different libraries and components available and what can be done to help contribute to their further development. - -

Proof Contributions

- -

Contributing to the seL4 proofs requires a different skill set than contributing to the code, and so far we have not had many community contributions to the proofs.

- -

As a result, our infrastructure for proof contributions is not as mature as that for code contributions.

- -

We are aiming to provide more resources in the next few months. In the meantime, if you are interested in contributing to the seL4 proofs, please review the actual proofs and the tools and techniques used for the proofs. Then contact us to discuss ideas, plans, and options about your contributions.

- -

To get started, you will have to be familiar with the Isabelle theorem prover. Some learning resources for it are described in this blog post. - -

Documentation Contributions

- -

seL4 platform documentation is maintained either with the code sources, with the proofs, or on the docsite.

- -

We welcome contribution to all of this documentation, and provide guidance on the docsite.

- -

Community Support Contributions

- -

The seL4 discussion and support platforms are open to the community and we invite community participation, not only in asking questions, but also in answering questions and providing help.

- -

Please see our Community Guidelines on the docsite.

- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Board/Galois-John-s.jpg b/PR_400/Foundation/Board/Galois-John-s.jpg deleted file mode 100644 index 0c2c0a43..00000000 Binary files a/PR_400/Foundation/Board/Galois-John-s.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/Galois-John.jpg b/PR_400/Foundation/Board/Galois-John.jpg deleted file mode 100644 index 10fe9b64..00000000 Binary files a/PR_400/Foundation/Board/Galois-John.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/Ghost-Dan-s.jpg b/PR_400/Foundation/Board/Ghost-Dan-s.jpg deleted file mode 100644 index 1a84e9c1..00000000 Binary files a/PR_400/Foundation/Board/Ghost-Dan-s.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/Ghost-Dan.jpg b/PR_400/Foundation/Board/Ghost-Dan.jpg deleted file mode 100644 index 89ac948b..00000000 Binary files a/PR_400/Foundation/Board/Ghost-Dan.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/HC-Olivier-s.jpg b/PR_400/Foundation/Board/HC-Olivier-s.jpg deleted file mode 100644 index 3ae90587..00000000 Binary files a/PR_400/Foundation/Board/HC-Olivier-s.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/HC-Olivier.jpg b/PR_400/Foundation/Board/HC-Olivier.jpg deleted file mode 100644 index b272887d..00000000 Binary files a/PR_400/Foundation/Board/HC-Olivier.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/Horizon-Feng-s.jpg b/PR_400/Foundation/Board/Horizon-Feng-s.jpg deleted file mode 100644 index f37a5cf6..00000000 Binary files a/PR_400/Foundation/Board/Horizon-Feng-s.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/Horizon-Feng.jpg b/PR_400/Foundation/Board/Horizon-Feng.jpg deleted file mode 100644 index 1f765782..00000000 Binary files a/PR_400/Foundation/Board/Horizon-Feng.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/Jump-Matt-s.jpg b/PR_400/Foundation/Board/Jump-Matt-s.jpg deleted file mode 100644 index 24092d11..00000000 Binary files a/PR_400/Foundation/Board/Jump-Matt-s.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/Jump-Matt.jpg b/PR_400/Foundation/Board/Jump-Matt.jpg deleted file mode 100644 index 8a57b130..00000000 Binary files a/PR_400/Foundation/Board/Jump-Matt.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/Li-Ian-s.png b/PR_400/Foundation/Board/Li-Ian-s.png deleted file mode 100644 index 3b1518b9..00000000 Binary files a/PR_400/Foundation/Board/Li-Ian-s.png and /dev/null differ diff --git a/PR_400/Foundation/Board/Li-Ian.png b/PR_400/Foundation/Board/Li-Ian.png deleted file mode 100644 index 5b5a6730..00000000 Binary files a/PR_400/Foundation/Board/Li-Ian.png and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/200318-minutes-signed.pdf b/PR_400/Foundation/Board/Minutes/200318-minutes-signed.pdf deleted file mode 100644 index c1b59295..00000000 Binary files a/PR_400/Foundation/Board/Minutes/200318-minutes-signed.pdf and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/200826-minutes-signed.pdf b/PR_400/Foundation/Board/Minutes/200826-minutes-signed.pdf deleted file mode 100644 index c5297bdc..00000000 Binary files a/PR_400/Foundation/Board/Minutes/200826-minutes-signed.pdf and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/201016-minutes-signed.pdf b/PR_400/Foundation/Board/Minutes/201016-minutes-signed.pdf deleted file mode 100644 index c72c4f41..00000000 Binary files a/PR_400/Foundation/Board/Minutes/201016-minutes-signed.pdf and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/210413-minutes-signed.pdf b/PR_400/Foundation/Board/Minutes/210413-minutes-signed.pdf deleted file mode 100644 index 4e932189..00000000 Binary files a/PR_400/Foundation/Board/Minutes/210413-minutes-signed.pdf and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/210609-minutes-signed.pdf b/PR_400/Foundation/Board/Minutes/210609-minutes-signed.pdf deleted file mode 100644 index ac37948a..00000000 Binary files a/PR_400/Foundation/Board/Minutes/210609-minutes-signed.pdf and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/211006-minutes-signed.pdf b/PR_400/Foundation/Board/Minutes/211006-minutes-signed.pdf deleted file mode 100644 index 0c8c2369..00000000 Binary files a/PR_400/Foundation/Board/Minutes/211006-minutes-signed.pdf and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/2202-minutes-signed.pdf b/PR_400/Foundation/Board/Minutes/2202-minutes-signed.pdf deleted file mode 100644 index 302c5225..00000000 Binary files a/PR_400/Foundation/Board/Minutes/2202-minutes-signed.pdf and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/2204-minutes-signed.pdf b/PR_400/Foundation/Board/Minutes/2204-minutes-signed.pdf deleted file mode 100644 index 4b3f378c..00000000 Binary files a/PR_400/Foundation/Board/Minutes/2204-minutes-signed.pdf and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/221013-minutes-signed.pdf b/PR_400/Foundation/Board/Minutes/221013-minutes-signed.pdf deleted file mode 100644 index 2be045b6..00000000 Binary files a/PR_400/Foundation/Board/Minutes/221013-minutes-signed.pdf and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/2305-minutes-signed.pdf b/PR_400/Foundation/Board/Minutes/2305-minutes-signed.pdf deleted file mode 100644 index adfb7576..00000000 Binary files a/PR_400/Foundation/Board/Minutes/2305-minutes-signed.pdf and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/230928-minutes-unconfirmed.pdf b/PR_400/Foundation/Board/Minutes/230928-minutes-unconfirmed.pdf deleted file mode 100644 index 145784f3..00000000 Binary files a/PR_400/Foundation/Board/Minutes/230928-minutes-unconfirmed.pdf and /dev/null differ diff --git a/PR_400/Foundation/Board/Minutes/home.pml b/PR_400/Foundation/Board/Minutes/home.pml deleted file mode 100644 index cc802c1f..00000000 --- a/PR_400/Foundation/Board/Minutes/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Board/Minutes/index.html b/PR_400/Foundation/Board/Minutes/index.html deleted file mode 100644 index 8c05e9e7..00000000 --- a/PR_400/Foundation/Board/Minutes/index.html +++ /dev/null @@ -1,189 +0,0 @@ - - - - - - Minutes | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - - -
- - - - -
- - diff --git a/PR_400/Foundation/Board/NIO-Qiyan-s.png b/PR_400/Foundation/Board/NIO-Qiyan-s.png deleted file mode 100644 index ab55b8a3..00000000 Binary files a/PR_400/Foundation/Board/NIO-Qiyan-s.png and /dev/null differ diff --git a/PR_400/Foundation/Board/NIO-Qiyan.png b/PR_400/Foundation/Board/NIO-Qiyan.png deleted file mode 100644 index 491dc36c..00000000 Binary files a/PR_400/Foundation/Board/NIO-Qiyan.png and /dev/null differ diff --git a/PR_400/Foundation/Board/RTX-David.png b/PR_400/Foundation/Board/RTX-David.png deleted file mode 100644 index fe941caf..00000000 Binary files a/PR_400/Foundation/Board/RTX-David.png and /dev/null differ diff --git a/PR_400/Foundation/Board/TS-Gernot-s.jpg b/PR_400/Foundation/Board/TS-Gernot-s.jpg deleted file mode 100644 index cee221ef..00000000 Binary files a/PR_400/Foundation/Board/TS-Gernot-s.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/TS-Gernot.jpg b/PR_400/Foundation/Board/TS-Gernot.jpg deleted file mode 100644 index 526ef09b..00000000 Binary files a/PR_400/Foundation/Board/TS-Gernot.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/TS-Gerwin-s.jpg b/PR_400/Foundation/Board/TS-Gerwin-s.jpg deleted file mode 100644 index 48965a7c..00000000 Binary files a/PR_400/Foundation/Board/TS-Gerwin-s.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/TS-Gerwin.jpg b/PR_400/Foundation/Board/TS-Gerwin.jpg deleted file mode 100644 index 17f36ce6..00000000 Binary files a/PR_400/Foundation/Board/TS-Gerwin.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/TS-June-s.jpg b/PR_400/Foundation/Board/TS-June-s.jpg deleted file mode 100644 index fb0e18d4..00000000 Binary files a/PR_400/Foundation/Board/TS-June-s.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/TS-June.jpg b/PR_400/Foundation/Board/TS-June.jpg deleted file mode 100644 index 5d76ff8c..00000000 Binary files a/PR_400/Foundation/Board/TS-June.jpg and /dev/null differ diff --git a/PR_400/Foundation/Board/home.pml b/PR_400/Foundation/Board/home.pml deleted file mode 100644 index a70d0f2f..00000000 --- a/PR_400/Foundation/Board/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Board/index.html b/PR_400/Foundation/Board/index.html deleted file mode 100644 index 2da82c6b..00000000 --- a/PR_400/Foundation/Board/index.html +++ /dev/null @@ -1,394 +0,0 @@ - - - - - - Governance | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

Governing Board

-
-

- The Governing Board of the seL4 Foundation - consists of: -

-
    -
  • the Founders of the seL4 technology, June Andronick, Gerwin - Klein and Gernot Heiser
  • -
  • a representative appointed by each Premium Member
  • -
  • a representative elected by General Members,
  • -
  • the Chair of the Technical Steering Committee.
  • -
-

- The Governing Board meetings are normally held in private, - i.e. attended by Governing Board Representatives only, although - the Governing Board may invite others to participate. However, the - Governing Board meeting minutes are publicly accessible. -

-
- -

The present Governing Board

- -

Chair

-
-
- Gernot Heiser -
-
- - Gernot Heiser - Technology - Evangelist, Trustworthy Systems -
-
-

- Gernot is the Founder of the Trustworthy Systems Research Group - (TS), which created seL4. He is Scientia Professor and - John Lions Chair of Operating Systems - at UNSW Sydney, where he has - been teaching operating systems and leading research on L4 - microkernels for more than 25 years. Besides that, his focus is on - transferring TS technology to the real world. He was the founder - and CTO of Open Kernel Labs and is presently serving as Chief - Scientist (Software) - at HENSOLDT - Cyber. Gernot holds a PhD from ETH Zurich and is a Fellow of - the ACM, - the IEEE and - the Australian Academy of Technology - and Engineering (ATSE). Jointly with June and Gerwin he - won the ACM SIGOPS - Hall-of-Fame award in 2019. -

-
-
- -

CEO and Treasurer

-
-
- June Andronick -
-
- - June - Andronick - - - CEO, Proofcraft - -
-
-

- June is a former leader of the TS group and was a core contributor to seL4's - verification story, as well as verification work on the eChronos - RTOS. She holds a PhD - from Paris-Saclay - University. In 2011 she was recognised by MIT Tech Review as - a Top - Innovator under 35. She is a conjoint professor - at UNSW Sydney. -

-
-
- -

Other Members

- -
-
- David Hardin -
-
- David - Hardin Associate Director, Raytheon Technologies -
- -
-

- Dr. David Hardin is an Associate Director, Systems Engineering - at Collins Aerospace. Dr. Hardin has significant experience in - the design and verification of high-assurance hardware, - software, and systems, and is editor of the book Design and - Verification of Microprocessor Systems for High-Assurance - Applications. -

-
-
- -
-
- Feng Zhou -
-
- Feng Zhou - Fellow, Horizon Robotics -
-
-

- Dr. Feng Zhou has 15 years of academic experience (Professor and - Vice Chairman of Dept. of Information and Electronics - Engineering in Zhejiang University, China) and over 15 years of - industrial experience in video/image compression & processing, - computer vision, artificial intelligence, and ASIC processor - architecture. Dr. Feng Zhou experience extends to the FPGA/ASIC - system architecture design and deep learning algorithm - implementation based on FPGA/ASIC platforms. -

-
-
- -
-
- Gerwin
-    Klein -
-
- Gerwin - Klein Chief Scientist, - Proofcraft -
-
-

- Gerwin lead the verification of seL4. He spends much of his time - deep in the proofs - about seL4 and contributes to other verification research in - TS. He holds a PhD from TU - Munich and led the original seL4 verification, which won the - MIT-TR10 award for the top 10 emerging technologies in 2011, as - well as the SIGOPS - Hall-of-Fame award in 2019. He is a conjoint professor - at UNSW Sydney. -

-
-
- -
-
- Matthew Grosvenor -
-
- Dr - Matthew - P. Grosvenor Software - Engineer, Jump Trading -
-
-

- Matthew is the representative of Premium Member Jump Trading, - where he specializes on measurement and optimization of - high-performance and low-latency network systems. He holds a - doctorate in computer science from the University of Cambridge - where his research work focused on techniques for managing and - mitigating latency variance in hyper-scale datacenter - networks. He is also a former member of the Trustworthy Systems - research group. For his honors project, Matt worked on capability - allocation/deallocation techniques using the seL4 capability - system. Matthew maintains a strong interest in facilitating and - performing research, particularly in the areas of - high-performance, and high-assurance systems. -

-
-
- -
-
- Qiyan Wang -
-
- Qiyan Wang VP Engineering, Digital Systems of NIO -
-
-

- Qiyan is the representative of Premium Member NIO, where he - leads a global R&D team responsible for Vehicle Operating - System, Connected Vehicle Cloud, Vehicle Digital Architecture, - Cyber Security, and Vehicle Software Integration and - Validation. Prior to NIO, he worked as Principal Scientist at - Symantec and Exabeam. He received his PhD in Computer Science - from the University of Illinois at Urbana-Champaign with - research focus on Distributed Systems and Cyber Security. -

-
-
- - -

Board Committees

- -

Compliance Committee

- -

The compliance committee proposes rules and licensing conditions -for the seL4 trademark, and drives the Interim Endorsement scheme for -seL4-based products and services.

- -

Its present members are:

-
    -
  • June Andronick
  • -
  • Gernot Heiser
  • -
  • Gerwin Klein
  • -
- -

Outreach Committee

- -

The Outreach Committee is in charge of expanding the membership. It -develops material for supporting membership recruitment. Members of -the committee will work closely with existing members to make best use -of their networks for strategic recruitment of members. The Outreach -Committee may co-opt member representatives.

- -

Its present members are:

-
    -
  • June Andronick
  • -
  • David Hardin
  • -
  • Gernot Heiser
  • -
  • Boyd Multerer, Founder and CEO at Kry10 Limited
  • -
  • Gregg Wildes, Innovation Director at DornerWorks
  • -
- - -

Marketing Committee

- -

The Marketing Committee is responsible for the external presentation -of the Foundation. This includes the look-and-feel of the web site and -presentation materials and other branding issues, social media -presence and other media liaison.

- -

Its present members are:

-
    -
  • June Andronick
  • -
  • Gernot Heiser
  • -
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Contact/home.pml b/PR_400/Foundation/Contact/home.pml deleted file mode 100644 index 1eccac40..00000000 --- a/PR_400/Foundation/Contact/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Contact/index.html b/PR_400/Foundation/Contact/index.html deleted file mode 100644 index 369d7d80..00000000 --- a/PR_400/Foundation/Contact/index.html +++ /dev/null @@ -1,151 +0,0 @@ - - - - - - Contact | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- Contact the seL4 Foundation -

-

- If you would like to contact us about the foundation, please - email us at: -

-

- foundation@sel4.systems -

-

-   -

- - -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Governance/home.pml b/PR_400/Foundation/Governance/home.pml deleted file mode 100644 index ebfb4d2a..00000000 --- a/PR_400/Foundation/Governance/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Governance/index.html b/PR_400/Foundation/Governance/index.html deleted file mode 100644 index 189c35a0..00000000 --- a/PR_400/Foundation/Governance/index.html +++ /dev/null @@ -1,218 +0,0 @@ - - - - - - Governance | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- seL4 Foundation Governance -

-
-

- The seL4 Foundation is established as a - project under The Linux Foundation. It is designed to - fulfill the key principles described here and summarised below. -

-

- The seL4 Foundation has 2 parts: -

-
    -
  • The seL4 Directed Fund, governed by the Governing Board. -
  • -
  • The seL4 Technical Steering Committee, composed of the - committers and contributors. -
  • -
-
-

- Principles -

-
-

- The seL4 Foundation is intended to be structured and governed - to promote the following key principles: -

-
    -
  • - Neutral and community-based. The seL4 - Foundation will provide a long-term, independent support for - the seL4 kernel and the seL4 ecosystem, by enabling the - collaborative community-based development, availability and - adoption of the seL4 kernel. This includes providing a - familiar structure (i.e., under The Linux Foundation) for - membership and raising funds to support its activities, and - building the community of developers, adopters, training, and - expertise. The seL4 Foundation will aim to represent the - perspectives of all main actors of the seL4 community (kernel - developers, kernel verifiers, ecosystem developers and - adopters) in the technical and general governance of the seL4 - kernel and the seL4 Foundation. -
  • -
  • - Grow adoption. The seL4 Foundation will - enable and grow adoption of seL4 by supporting the evolution - and verification of the seL4 kernel and supporting the growth - of the seL4 ecosystem needed to ease the development of - seL4-based systems. -
  • -
  • - Brand promotion and protection. The seL4 - Foundation will provide official releases of the seL4 kernel - with clear associated verification statements, to promote the - use of seL4 as a competitive advantage, with clear - traceability to the sources of the code and the proofs. -
  • -
-
-

- Governance Documents -

-
-

- The seL4 Foundation is underpinned by 2 key documents: the - seL4 - Foundation Fund Charter, and the - seL4 - Foundation Technical Charter. Both are modelled on - the standard approach for Linux - Foundation projects. -

-
- - -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Governance/seL4_Foundation_Fund_Charter.pdf b/PR_400/Foundation/Governance/seL4_Foundation_Fund_Charter.pdf deleted file mode 100644 index fb1290a0..00000000 Binary files a/PR_400/Foundation/Governance/seL4_Foundation_Fund_Charter.pdf and /dev/null differ diff --git a/PR_400/Foundation/Governance/seL4_Foundation_Key_Principles.pdf b/PR_400/Foundation/Governance/seL4_Foundation_Key_Principles.pdf deleted file mode 100644 index 821965a3..00000000 Binary files a/PR_400/Foundation/Governance/seL4_Foundation_Key_Principles.pdf and /dev/null differ diff --git a/PR_400/Foundation/Governance/seL4_Foundation_Technical_Charter.pdf b/PR_400/Foundation/Governance/seL4_Foundation_Technical_Charter.pdf deleted file mode 100644 index 85054d81..00000000 Binary files a/PR_400/Foundation/Governance/seL4_Foundation_Technical_Charter.pdf and /dev/null differ diff --git a/PR_400/Foundation/Jobs/home.pml b/PR_400/Foundation/Jobs/home.pml deleted file mode 100644 index e6914808..00000000 --- a/PR_400/Foundation/Jobs/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Jobs/index.html b/PR_400/Foundation/Jobs/index.html deleted file mode 100644 index c15bd628..00000000 --- a/PR_400/Foundation/Jobs/index.html +++ /dev/null @@ -1,443 +0,0 @@ - - - - - - Jobs About seL4 | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- Jobs in the seL4 ecosystem. -

- -

- -This page matches member organisations looking for seL4 expertise and -people looking for jobs in the seL4 ecosystem. - -

- -

-The list is in chronological order, more recent at the top. -

- -

- -If you are a member of -the seL4 Foundation! -and would like to post job offers here, email foundation@sel4.systems with:

- -
    -
  • - Company description and position in seL4 ecosystem: short (a few -sentences) description of the company's profile and its role or -interest in the seL4 ecosystem. -
  • -
  • - Position details and link to seL4: short (a few sentences) -description of the type of profile and expertise sought -(systems/verification/etc, engineering/research/etc), the location, -the number of positions open, etc. The description should include an -explicit description of how the job will be linked to seL4. -
  • -
  • -How to apply: explicit contact or application process. -
  • -
  • -(Optional) Logo or picture to add to the post. -
  • -
- - - - - - - -
- 25 Oct 2021: HENSOLDT Cyber is looking for researchers in formal verification, - cryptography experts, and software/hardware engineers with a focus on - embedded Systems -
-
-

- HENSOLDT Cyber -

-
    -
  • - Company description and position in seL4 ecosystem: -

    - HENSOLDT Cyber is a joint venture between Secure Elements GmbH and - HENSOLDT Holding Germany GmbH. We are a founding member in the seL4 - Foundation and also member of the RISC-V foundation. Our mission is - establishing a paradigm shift to cyber security, we advocate secure IT - instead of IT security. We combine the know-how of more than one - hundred years of experience in high-performance technology in the fields - of defense and aerospace. We build systems that are secure from the ground - up, combining innovative physical protection with mathematical proofs of - software correctness to achieve true trustworthiness. We offer - Security Made in Germany. -
    - Optimized for use in industrial, aerospace and defense applications, our - customers can expect high quality military-grade security, safety - critical, user-friendly and flexible solutions. Our products have been - designed to ensure the integrity of embedded systems at the core: the - operating system and the processor. -
    - The operating system TRENTOS is a revolution in cyber security based on - the seL4 microkernel and CAmkES. We developed this highly secure operating - system for IoT devices and cyber physical systems. seL4 provides strict - isolation of components, with communication restricted to explicitly - enabled channels, ensuring clarity of information flows. Mathematical - proofs of implementation correctness of seL4 as well as critical - components guarantee system integrity under all operating conditions. -
    - Our MiG-V is a RISC-V based general purpose processor targeting - high-security use cases. The core's logic encryption prevents the - insertion of hardware trojans through production. Running seL4 from ROM - prevents any kernel modifications to achieve ensures highest security - levels. -
    - The combination of MiG-V and TRENTOS gives HENSOLDT Cyber full control of - the design and production chain. The MiG-V SoC can be used together with - the formally verified seL4 microkernel hosted in the chip's internal ROM - to create an ultra-secure solution. -

    -
  • -
  • - Position details and link to seL4: -

    - In order to fulfill our mission, we are expanding our teams in Engineering - (junior/senior level) and Research (PhD program and post-doc). -
    - We are looking for the following profiles with focus on seL4 for our - office in the south of Munich or remote, Germany-wide: -

    -
      -
    • Software Developers and Architects (18)
    • -
    • Hardware Developers and Architects (3)
    • -
    • Formal Verification Researchers and Engineers (16)
    • -
    • Cryptography Experts (Developers and Researchers) (6)
    • -
    -

    - -

    -
  • -
  • - How to apply: -

    - Please visit https://hensoldt-cyber.com/job-offers - or contact Daniela Kagerer at daniela.kagerer@hensoldt-cyber.com. -

    -
  • -
-
- - - -
- 28 Jun 2021: DornerWorks looking for a Senior Firmware Engineer to develop hypervisor functionality and build expertise in seL4 -
-
-

- DornerWorks -

-
    -
  • - Company description and position in seL4 ecosystem: -

    - - DornerWorks is an seL4 Foundation founding member, a leading contributor - to the open source project, provides integration services, training, and - tools to accelerate/support the growth of seL4 globally. Gregg Wildes is - also on the board of directors for the US (seL4 focused) trusted computing - COE. - -

    -
  • -
  • - Position details and link to seL4 : -

    - - DornerWorks, a leader in embedded systems engineering, is growing and - seeks a Senior Firmware Engineer to join our team. Our Separation - Technology team is pioneering the use of hypervisors and virtualization in - the embedded space. Using hypervisors in embedded applications is - relatively new, and our outstanding team is partnering with vendors and - customers to apply this novel technology to new products. Demand for our - expertise continues to grow, and we are seeking top-notch technical minds - who are comfortable blazing a trail in this emerging technology. As you - develop hypervisor functionality, you will become an expert in the open - source ecosystems around Xen Project hypervisor, Linux, and the seL4 - micro-kernel as you gain advanced understanding of cutting-edge - system-on-chips (SoC). This position is located in Grand Rapids, - Michigan; however, we are open to remote employees as well. - -

    -
  • -
  • - How to apply: -

    - - Please visit https://dornerworks.com/careers/ - or contact Deb DeVries at deb.devries@dornerworks.com. - -

    -
  • -
- - - -
- - - -
- 17 Jun 2021: NIO looking for world class experts in seL4 and OS / software platform in general -
-
-

- nio -

-
    -
  • - Company description and position in seL4 ecosystem: -

    - - NIO Inc. is a pioneer in China’s premium electric vehicle market. We - design, jointly manufacture, and sell smart and connected premium electric - vehicles, driving innovations in next generation technologies in - connectivity, autonomous driving and artificial intelligence. Redefining - user experience, we provide users with comprehensive, convenient and - innovative charging solutions and other user-centric service - offerings. NIO went public in U.S. in 2018. So far, NIO has launched 3 - mass production vehicle models: ES8, ES6, and EC6, and accumulated - deliveries to users are over 120,000. Starting September, NIO will start - delivering to users in Norway. NIO invests heavily in in-house R&D to - build full-stack cutting-edge technologies around intelligent and - autonomous driving EV. Its engineering teams are distributed across the - globe, including US, UK, Germany and China. See more on the company's - profile. - -

    -

    - - Digital Systems department at NIO is missioned to develop the most - advanced software platform for the next-generation autonomous driving - vehicles in the industry from the ground up. This platform is internally - named NIO Vehicle Operating System (NVOS), and based off seL4. It - involves solving a wide range of technical challenges, such as seamless - app development on heterogeneous hardware chipsets, low-latency & high - throughput data processing, powerful AI framework, automobile-grade safety - and security guarantee, and complete toolchains to provide Android alike - development experience. - -

    -
  • -
  • - Position details and link to seL4 : -

    - - We are looking for world class experts in seL4 and OS / software - platform in general, and positions available range from NVOS Architect - (x5), Software Developer (x4), Software Dev Engineer in Test (x3), - Security Engineer in Formal Verification (x1), to Chief Software Architect - / Technical Fellow (x1), and are based in San Jose or Seattle in U.S. - - Some job postings can be found - here - - -

    -
  • -
  • - How to apply: -

    - - Please send resume to Selena Parigoris (selena.parigoris@nio.io) and - Qiyan Wang (qiyan.wang@nio.io) - -

    -
  • -
- - - -
- - - - - -
-
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Join/Directed_Fund_Participation_Agreement.pdf b/PR_400/Foundation/Join/Directed_Fund_Participation_Agreement.pdf deleted file mode 100644 index 56fc2090..00000000 Binary files a/PR_400/Foundation/Join/Directed_Fund_Participation_Agreement.pdf and /dev/null differ diff --git a/PR_400/Foundation/Join/Participation_Agreement_Sample.pdf b/PR_400/Foundation/Join/Participation_Agreement_Sample.pdf deleted file mode 100644 index 873e8318..00000000 Binary files a/PR_400/Foundation/Join/Participation_Agreement_Sample.pdf and /dev/null differ diff --git a/PR_400/Foundation/Join/home.pml b/PR_400/Foundation/Join/home.pml deleted file mode 100644 index d230ef12..00000000 --- a/PR_400/Foundation/Join/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Join/index.html b/PR_400/Foundation/Join/index.html deleted file mode 100644 index eb8ef2b3..00000000 --- a/PR_400/Foundation/Join/index.html +++ /dev/null @@ -1,313 +0,0 @@ - - - - - - Join | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- Join the seL4 Foundation! -

-
-

- Become part of the members who have already joined the seL4 Foundation!. -

-

- Joining is an easy process via the Linux Foundation's online - signup page. -

-

- Note that seL4 Foundation members must be (or become) members of the Linux Foundation. The online process will include your Linux Foundation membership if you are not already a member. Details on Linux Foundation membership can be found here. -

-

- You can review the seL4 Foundation Directed Fund Participation Agreement. -

-

Questions? Email us at - foundation@sel4.systems -

- - -
- - -
-

Membership levels

-
-
-
-
-

Premium

-
-
- Guaranteed board seat -
- -
-
- -
-
-
-

General

-
-
One seat as a class
- -
-
-
-
-
-

Associate

-
-
No voting right
- -
-
-
-
- -
- -
-

Benefits of joining

-
-
-
-
-

General Benefits

-
-
-
    -
  • - Be associated with the world's most advanced, and most - highly assured OS technology. -
  • -
  • - Get easy access to seL4 expertise across the Foundation, - and to a community of people who are addressing similar - technical issues, and targeting corresponding value - propositions. -
  • -
  • - Influence the direction of the growth of the seL4 - ecosystem through the board and its committees, including - allocation of funds, approval of standards, decisions on - branding, trademark use, and certification and - accreditation schemes. -
  • -
-
-
-
-
- -
-
-
-
-

Adopters

-
-
- - Support creation of artefacts everyone needs, eliminating - replication of effort and reducing the cost - for everyone. - -
-
-
-
-
-
-

Processor manufacturers

-
-
- - Ensure hardware is well-supported by seL4, with certified - verification, to ensure competitiveness of - offering in critical domains. - -
-
-
-
-
-
-

Service providers

-
-
- - Become an certified trusted seL4 provider, with Foundation - providing advertising opportunities, re-directing inquiries, - facilitating teaming for funding bids facilitating - subcontracting. - - -
-
-
-
-
-
-

Universities and public-sector

-
-
- Advertise seL4-related work and teaching material.
- Establish or deepen research collaborations. -
-
-
- -
-
-
-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Membership/LOGOS/Brkawy.png b/PR_400/Foundation/Membership/LOGOS/Brkawy.png deleted file mode 100644 index 3f693078..00000000 Binary files a/PR_400/Foundation/Membership/LOGOS/Brkawy.png and /dev/null differ diff --git a/PR_400/Foundation/Membership/LOGOS/Cog.jpg b/PR_400/Foundation/Membership/LOGOS/Cog.jpg deleted file mode 100644 index c159148a..00000000 Binary files a/PR_400/Foundation/Membership/LOGOS/Cog.jpg and /dev/null differ diff --git a/PR_400/Foundation/Membership/LOGOS/Collins_Aerospace_Logo.svg b/PR_400/Foundation/Membership/LOGOS/Collins_Aerospace_Logo.svg deleted file mode 100644 index fb394715..00000000 --- a/PR_400/Foundation/Membership/LOGOS/Collins_Aerospace_Logo.svg +++ /dev/null @@ -1 +0,0 @@ -Collins_Aerospace_Logo.svg \ No newline at end of file diff --git a/PR_400/Foundation/Membership/LOGOS/DornerWorks.png b/PR_400/Foundation/Membership/LOGOS/DornerWorks.png deleted file mode 100644 index 0d40913b..00000000 Binary files a/PR_400/Foundation/Membership/LOGOS/DornerWorks.png and /dev/null differ diff --git a/PR_400/Foundation/Membership/LOGOS/DornerWorks.svg b/PR_400/Foundation/Membership/LOGOS/DornerWorks.svg deleted file mode 100644 index 7812b310..00000000 --- a/PR_400/Foundation/Membership/LOGOS/DornerWorks.svg +++ /dev/null @@ -1,29 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/ETH-Zurich.svg b/PR_400/Foundation/Membership/LOGOS/ETH-Zurich.svg deleted file mode 100644 index 7b07930b..00000000 --- a/PR_400/Foundation/Membership/LOGOS/ETH-Zurich.svg +++ /dev/null @@ -1,58 +0,0 @@ - - - - - - image/svg+xml - - ethz_logo_white - - - - - - - ethz_logo_white - - diff --git a/PR_400/Foundation/Membership/LOGOS/GHOST.svg b/PR_400/Foundation/Membership/LOGOS/GHOST.svg deleted file mode 100644 index 2fe611c1..00000000 --- a/PR_400/Foundation/Membership/LOGOS/GHOST.svg +++ /dev/null @@ -1,62 +0,0 @@ - - - - -Created by potrace 1.15, written by Peter Selinger 2001-2017 - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/HENSOLDT.jpg b/PR_400/Foundation/Membership/LOGOS/HENSOLDT.jpg deleted file mode 100644 index f9a734ab..00000000 Binary files a/PR_400/Foundation/Membership/LOGOS/HENSOLDT.jpg and /dev/null differ diff --git a/PR_400/Foundation/Membership/LOGOS/HENSOLDT_Cyber.svg b/PR_400/Foundation/Membership/LOGOS/HENSOLDT_Cyber.svg deleted file mode 100644 index 6e04b844..00000000 --- a/PR_400/Foundation/Membership/LOGOS/HENSOLDT_Cyber.svg +++ /dev/null @@ -1,1081 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/Horizon_Robotics.svg b/PR_400/Foundation/Membership/LOGOS/Horizon_Robotics.svg deleted file mode 100644 index 6647b6b9..00000000 --- a/PR_400/Foundation/Membership/LOGOS/Horizon_Robotics.svg +++ /dev/null @@ -1,29 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/Jump-Trading.svg b/PR_400/Foundation/Membership/LOGOS/Jump-Trading.svg deleted file mode 100644 index bfb0f056..00000000 --- a/PR_400/Foundation/Membership/LOGOS/Jump-Trading.svg +++ /dev/null @@ -1,131 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/Kry10.svg b/PR_400/Foundation/Membership/LOGOS/Kry10.svg deleted file mode 100644 index 3ec1f74e..00000000 --- a/PR_400/Foundation/Membership/LOGOS/Kry10.svg +++ /dev/null @@ -1,50 +0,0 @@ - - - - - Asset 1 - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/PR_400/Foundation/Membership/LOGOS/LICENCE b/PR_400/Foundation/Membership/LOGOS/LICENCE deleted file mode 100644 index a484c40f..00000000 --- a/PR_400/Foundation/Membership/LOGOS/LICENCE +++ /dev/null @@ -1 +0,0 @@ -The images in this directory are owned by their respective trademark owners. \ No newline at end of file diff --git a/PR_400/Foundation/Membership/LOGOS/Li_Auto.svg b/PR_400/Foundation/Membership/LOGOS/Li_Auto.svg deleted file mode 100755 index d8f6cdb2..00000000 --- a/PR_400/Foundation/Membership/LOGOS/Li_Auto.svg +++ /dev/null @@ -1,5 +0,0 @@ - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/LotusCarsTechnology.svg b/PR_400/Foundation/Membership/LOGOS/LotusCarsTechnology.svg deleted file mode 100644 index 581d556f..00000000 --- a/PR_400/Foundation/Membership/LOGOS/LotusCarsTechnology.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/PR_400/Foundation/Membership/LOGOS/NCSC.png b/PR_400/Foundation/Membership/LOGOS/NCSC.png deleted file mode 100644 index 5f349fe2..00000000 Binary files a/PR_400/Foundation/Membership/LOGOS/NCSC.png and /dev/null differ diff --git a/PR_400/Foundation/Membership/LOGOS/NIO.svg b/PR_400/Foundation/Membership/LOGOS/NIO.svg deleted file mode 100644 index d341deba..00000000 --- a/PR_400/Foundation/Membership/LOGOS/NIO.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/PR_400/Foundation/Membership/LOGOS/Penten.svg b/PR_400/Foundation/Membership/LOGOS/Penten.svg deleted file mode 100644 index 729cb8f7..00000000 --- a/PR_400/Foundation/Membership/LOGOS/Penten.svg +++ /dev/null @@ -1,35 +0,0 @@ - - - - - - - - - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/RISC-V.svg b/PR_400/Foundation/Membership/LOGOS/RISC-V.svg deleted file mode 100644 index aa7e761d..00000000 --- a/PR_400/Foundation/Membership/LOGOS/RISC-V.svg +++ /dev/null @@ -1,36 +0,0 @@ - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/SpacemiT.svg b/PR_400/Foundation/Membership/LOGOS/SpacemiT.svg deleted file mode 100755 index 64eff462..00000000 --- a/PR_400/Foundation/Membership/LOGOS/SpacemiT.svg +++ /dev/null @@ -1,1255 +0,0 @@ - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/TII.jpg b/PR_400/Foundation/Membership/LOGOS/TII.jpg deleted file mode 100644 index a371b71e..00000000 Binary files a/PR_400/Foundation/Membership/LOGOS/TII.jpg and /dev/null differ diff --git a/PR_400/Foundation/Membership/LOGOS/TU-Munich.svg b/PR_400/Foundation/Membership/LOGOS/TU-Munich.svg deleted file mode 100644 index cf08bcd7..00000000 --- a/PR_400/Foundation/Membership/LOGOS/TU-Munich.svg +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - TUM_Web_Logo_blau - TUM - - diff --git a/PR_400/Foundation/Membership/LOGOS/UNSW.svg b/PR_400/Foundation/Membership/LOGOS/UNSW.svg deleted file mode 100644 index db696557..00000000 --- a/PR_400/Foundation/Membership/LOGOS/UNSW.svg +++ /dev/null @@ -1,28017 +0,0 @@ - - - - - - image/svg+xml - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/adventium-labs.svg b/PR_400/Foundation/Membership/LOGOS/adventium-labs.svg deleted file mode 100644 index f2eb9fed..00000000 --- a/PR_400/Foundation/Membership/LOGOS/adventium-labs.svg +++ /dev/null @@ -1,786 +0,0 @@ - - - - - - - - image/svg+xml - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/autoware.svg b/PR_400/Foundation/Membership/LOGOS/autoware.svg deleted file mode 100755 index cbfa2a43..00000000 --- a/PR_400/Foundation/Membership/LOGOS/autoware.svg +++ /dev/null @@ -1,622 +0,0 @@ - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/galois-logo.svg b/PR_400/Foundation/Membership/LOGOS/galois-logo.svg deleted file mode 100755 index 6426f9d9..00000000 --- a/PR_400/Foundation/Membership/LOGOS/galois-logo.svg +++ /dev/null @@ -1,224 +0,0 @@ - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/google-short.svg b/PR_400/Foundation/Membership/LOGOS/google-short.svg deleted file mode 100755 index 4e4f70fe..00000000 --- a/PR_400/Foundation/Membership/LOGOS/google-short.svg +++ /dev/null @@ -1,3425 +0,0 @@ - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/google.svg b/PR_400/Foundation/Membership/LOGOS/google.svg deleted file mode 100755 index 68380a12..00000000 --- a/PR_400/Foundation/Membership/LOGOS/google.svg +++ /dev/null @@ -1,3942 +0,0 @@ - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/kansas-state.svg b/PR_400/Foundation/Membership/LOGOS/kansas-state.svg deleted file mode 100644 index 0646f66e..00000000 --- a/PR_400/Foundation/Membership/LOGOS/kansas-state.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/PR_400/Foundation/Membership/LOGOS/ku-institute.svg b/PR_400/Foundation/Membership/LOGOS/ku-institute.svg deleted file mode 100755 index d9115b6d..00000000 --- a/PR_400/Foundation/Membership/LOGOS/ku-institute.svg +++ /dev/null @@ -1,2269 +0,0 @@ - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/latticex.png b/PR_400/Foundation/Membership/LOGOS/latticex.png deleted file mode 100755 index 1981a375..00000000 Binary files a/PR_400/Foundation/Membership/LOGOS/latticex.png and /dev/null differ diff --git a/PR_400/Foundation/Membership/LOGOS/proofcraft.svg b/PR_400/Foundation/Membership/LOGOS/proofcraft.svg deleted file mode 100644 index 2a502f9a..00000000 --- a/PR_400/Foundation/Membership/LOGOS/proofcraft.svg +++ /dev/null @@ -1,85 +0,0 @@ - - - - - -]> - - - - - - - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/raytheontechnologies.svg b/PR_400/Foundation/Membership/LOGOS/raytheontechnologies.svg deleted file mode 100644 index f79e2821..00000000 --- a/PR_400/Foundation/Membership/LOGOS/raytheontechnologies.svg +++ /dev/null @@ -1,9 +0,0 @@ - - - - rtx_logo - Created with Sketch. - - \ No newline at end of file diff --git a/PR_400/Foundation/Membership/LOGOS/secondstate.svg b/PR_400/Foundation/Membership/LOGOS/secondstate.svg deleted file mode 100644 index ed323911..00000000 --- a/PR_400/Foundation/Membership/LOGOS/secondstate.svg +++ /dev/null @@ -1,132 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/Foundation/Membership/LOGOS/universityofkansas.svg b/PR_400/Foundation/Membership/LOGOS/universityofkansas.svg deleted file mode 100755 index 98852902..00000000 --- a/PR_400/Foundation/Membership/LOGOS/universityofkansas.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/PR_400/Foundation/Membership/LOGOS/xcalibyte.svg b/PR_400/Foundation/Membership/LOGOS/xcalibyte.svg deleted file mode 100644 index 1d720393..00000000 --- a/PR_400/Foundation/Membership/LOGOS/xcalibyte.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/PR_400/Foundation/Membership/home.pml b/PR_400/Foundation/Membership/home.pml deleted file mode 100644 index 9a761cf1..00000000 --- a/PR_400/Foundation/Membership/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Membership/index.html b/PR_400/Foundation/Membership/index.html deleted file mode 100644 index f7c4c269..00000000 --- a/PR_400/Foundation/Membership/index.html +++ /dev/null @@ -1,400 +0,0 @@ - - - - - - Membership | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -
-

- seL4 Foundation Membership -

-
-

- Below is the list of members of the - seL4 Foundation. Want to be part of the adventure? -

-

- JOIN NOW - HERE! - -

-
-

Premium Members

-
-
-
- - Horizon Robotics logo - -
-
- Horizon Robotics -
-
-
-
-
- - Jump Trading logo - -
-
- Jump Trading -
-
-
- -
- NIO -
-
-
-
-
- - UNSW logo - -
-
- UNSW Sydney -
-
- Founding member -
- Endorsed Service Provider -
-
-
-

General Members

-
-
- -
- Apple -
-
-
-
- - Cog logo - -
-
- Cog Systems Inc -
-
- Founding member -
- Endorsed Service Provider -
-
-
-
- - DornerWorks logo - -
-
- DornerWorks Ltd -
-
- Founding member -
- Endorsed Service Provider -
-
-
-
- - Kry10 logo - -
-
- Kry10 Limited -
-
- Endorsed Service Provider -
-
-
-
- - Penten logo - -
-
- Penten Pty Ltd -
-
-
-
-
- - Proofcraft logo - -
-
- Proofcraft Pty Ltd -
-
- Endorsed Service Provider -
-
-
-
- - Raytheon logo - -
-
- Raytheon Technologies -
-
-
-
-
- - TII logo - -
-
- Technology Innovation Institute -
-
-
-
-
- - Xcalibyte logo - -
-
- Xcalibyte -
-
-
-
- -

Associate Members

-
-
-
- - Autoware Foundation - -
-
- Autoware Foundation -
-
-
-
-
- - ETH Zurich - -
-
- ETH Zurich -
-
-
-
-
- - Kansas State - -
-
- Kansas State University -
-
-
-
-
- - NCSC - -
-
- NCSC -
-
-
-
-
- - RISC-V International - -
-
- RISC-V International -
-
-
-
-
- - TU Munich - -
-
- TU Munich -
-
-
-
-
- - KU Institute for Information Sciences logo - -
-
- University of Kansas -
-
-
-
-
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Services/cog.html b/PR_400/Foundation/Services/cog.html deleted file mode 100644 index b689a6cc..00000000 --- a/PR_400/Foundation/Services/cog.html +++ /dev/null @@ -1,215 +0,0 @@ - - - - - - Cog | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- Cog -

-

-An Endorsed Service Provider for seL4-based systems -

-
- - - - - - - -
- - Cog Systems Inc - - - - Cog has been preparing for the revolution in connected device - architecture since 2017. The traditional architecture of IoT and - other connected devices has created innumerable opportunities - for bad actors to compromise the device, thereby forcing - security policy to accept higher risk and restricted access, - which in turn poses a burden on users. We have adopted an - embedded solution set, leveraging seL4, built on modularity, - proactive security, trustworthiness, and adaptability to enable - highly secure connected devices.
- - As the leading integrator of type-1 visualization solutions - based on seL4, Cog leverages modularity to isolate critical - functions and services on connected devices. This approach - pro-actively secures these devices by reducing the attack - surface and increases reliability by eliminating single points - of failure. Cog focuses on securing the kernel, data, and - network as the baseline to our security. Additionally, we can - isolate specific applications, operating systems, drivers, or - services to further achieve a full defense in depth based - solution. The system can scale linearly and infinitely, thus - reducing bottlenecks and preserving performance. All of this is - available for the IoT market with the flexibility to run all - applications effectively and securely.
- - - Cog Systems Inc is an Endorsed Service Provider for: -
    -
  • systems: user-level OS (VM)
  • -
  • systems: applications
  • -
- -
- - - -

Cog Systems Services

- -
    -
  • - Strategy Insight for Market, and Technology solutions for security - on SoC, IoT, and Mobile Devices. -
  • -
  • - Integration Services for the full range of Embedded Systems -
  • -
  • - Device Optimization related to performance and user experience for - embeded solution based devices. -
  • -
  • - On-going Maintenance and Support -
  • -
- - - -
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Services/dornerworks.html b/PR_400/Foundation/Services/dornerworks.html deleted file mode 100644 index f7d25d4b..00000000 --- a/PR_400/Foundation/Services/dornerworks.html +++ /dev/null @@ -1,225 +0,0 @@ - - - - - - DornerWorks | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- DornerWorks -

-

-An Endorsed Service Provider for seL4-based systems -

- -
- - - - - -
- - DornerWorks Ltd - - - - DornerWorks helps product makers turn their ideas into - reality with FPGA, hardware, and embedded software engineering - expertise. We accelerate your product development and lower - risk for adopting advanced technologies. One of our - specialties is seL4 microkernel-based - development. DornerWorks, a founding member of the seL4 - Foundation, can accelerate integration of seL4 as the trusted - software base for your products. -
- - DornerWorks Ltd is an Endorsed Services Provider for: -
    -
  • systems: kernel platform port
  • -
  • systems: user-level OS (VM)
  • -
  • systems: application
  • -
-
- -

DornerWorks Ltd Services

- -
    -
  • seL4 Microkernel
  • -
  • -
      -
    • Configuration, integration, customization, and system optimization
    • -
    -
  • -
  • Guest OS and hardware porting
  • -
  • Virtualization and hypervisor distributions
  • -
  • FPGA platforms
  • -
  • -
      -
    • Hardware based acceleration
    • -
    • FPGA IP
    • -
    • High-speed video
    • -
    • DSP
    • -
    • Synchronized networking
    • -
    -
  • -
  • Connected products for IoT
  • -
  • Medical device product development
  • -
- -

Industries

- -
    -
  • Defense
  • -
  • Medical
  • -
  • Aerospace
  • -
  • Automotive
  • -
  • Industrial
  • -
- -

Contact

- -

-DornerWorks, Ltd.
-3445 Lake Eastbrook Blvd SE
-Grand Rapids, MI 49546
-Phone: +1.616.245.8369
-Email: sales@DornerWorks.com
-

- - - -
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Services/endorsement.html b/PR_400/Foundation/Services/endorsement.html deleted file mode 100644 index 292375e0..00000000 --- a/PR_400/Foundation/Services/endorsement.html +++ /dev/null @@ -1,330 +0,0 @@ - - - - - - Endorsement | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- Information about the endorsement scheme -

- -

- The type of services that the member has expertise on and is being endorsed for, are described in detail, and taken from a template list of services, namely: -

-
    -
  • systems: kernel
  • -
  • systems: kernel platform ports
  • -
  • systems: user-level OS
  • -
  • systems: applications
  • -
  • verification: kernel
  • -
  • verification: user-level OS
  • -
  • verification: applications
  • -
-

- Endorsement in one of the category above means that the member has one or multiple people in-house who have that expertise and have already contributed in this area. This is reviewed annually. -

-

- Each category can have qualifiers/examples, which can be suggested by the member, eg "user-level OS (VM)” or “user-level OS (CAMkES).” -

-

- The endorsement of services is limited to members and provided for free. -

- - - -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Services/hc.html b/PR_400/Foundation/Services/hc.html deleted file mode 100644 index f115fccd..00000000 --- a/PR_400/Foundation/Services/hc.html +++ /dev/null @@ -1,289 +0,0 @@ - - - - - - HENSOLDT Cyber | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- HENSOLDT Cyber GmbH -

-

-An Endorsed Service Provider for seL4-based systems -

-
- - - - - - - -
- - HENSOLDT Cyber - - - - In the development of high assurance systems with military grade - security, HENSOLDT Cyber works intensively with the seL4 - microkernel. As we aim to increase the usability of seL4 - technologies, we develop user-friendly components bundled in the - seL4 operating system TRENTOS, providing an easy-to-use basis - for the development of embedded systems. We support our - customers by guiding them with our seL4 experience and improving - their development time by advising them on the correct - application of the seL4 technologies.
- - HENSOLDT Cyber GmbH is an Endorsed Service Provider for seL4-based systems in operating systems: -
    -
  • systems: kernel platform port
  • -
  • systems: user-level OS (TRENTOS, CAmkES)
  • -
  • systems: applications
  • -
  • verification: user-level OS
  • -
  • verification: applications
  • -
- Additionally, the seL4 Foundation previously assessed and endorsed HENSOLDT Cyber GmbH's TRENTOS training and product. -
- - - -

HENSOLDT Cyber GmbH Services

- -
    -
  • - seL4 microkernel: -
      -
    • - HW selection, configuration, integration, customization -
    • -
    • - Virtualization of Legacy OS -
    • -
    -
  • -
  • - Userland components: -
      -
    • - (consultancy for) userland component development -
    • -
    • - (consultancy for) driver porting / development -
    • -
    -
  • -
  • - Security Consultancy: -
      -
    • - Create a systems view from IT Security perspective -
    • -
    • - Identify possible threats -
    • -
    • - Identify means to address identified threats -
    • -
    • - Support you in setting up Aviation development standards (e.g. RTCA-DO 335) -
    • -
    • - Support you in creating high assurance systems based on seL4 -
    • -
    • - HW / SW Codesign -
        -
      • - Support of HW (Crypto) accelerators -
      • -
      • - ASIC (esp. RISC-V processors) design -
      • -
      -
    • -
    -
  • -
  • - TRENTOS Training -
      -
    • - Introduction of the fundamental aspects of TRENTOS, a - novel, seL4-based, secure embedded operating system - developed by HENSOLDT Cyber; -
    • -
    • - Background and basics of seL4 and CAmkES; -
    • -
    • - Creating your first TRENTOS application. -
    • -
    • - The module will be taught by Sebastian Eckl, an seL4 and - TRENTOS expert. -
    • -
    -
  • -
  • - TRENTOS SDK -
      -
    • - TRENTOS is a seL4-based operating system. -
    • -
    • - It provides a complete development environment that equips - a developer with all the tools required for building, - testing and deploying TRENTOS-based systems to the real - world. -
    • -
    • - The SDK contains the actual operating system (OS) source - code, consisting of seL4, CAmkES and TRENTOS, but also - offers a collection of additional resources designed to - make developer's work easier by increasing efficiency and - reducing complexity. -
    • -
    -
  • -
- -

Industries

- -
    -
  • Defense
  • -
  • Aerospace
  • -
  • Industrial
  • -
- -
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Services/home.pml b/PR_400/Foundation/Services/home.pml deleted file mode 100644 index d4b1bd05..00000000 --- a/PR_400/Foundation/Services/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Services/index.html b/PR_400/Foundation/Services/index.html deleted file mode 100644 index 65bff7a0..00000000 --- a/PR_400/Foundation/Services/index.html +++ /dev/null @@ -1,469 +0,0 @@ - - - - - - Commercial Support | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- Services endorsed by the Foundation -

-
-

- seL4 is an attractive platform for building highly resilient - systems, but to do so requires a fair degree of understanding of - the technology. Fortunately, help is available from a growing - number of community members offering consulting and development - services around seL4. -

-

- Below are the seL4 Service Providers that are endorsed by the seL4 Foundation -

-

- If you are a member and would like to be endorsed, you can find more information on the endorsement scheme. If you are not a member yet, you can join the seL4 Foundation. -

- -

Endorsed Service Providers

- - - - - - - - - - - - - - - - - - - - - - -
- - DornerWorks Ltd - - - DornerWorks Ltd
- Innovative companies are building products on a trusted - software base with the guidance of DornerWorks engineers. As - a founding member of the seL4 Foundation, DornerWorks can - accelerate the integration of seL4 as the trusted software - base for your products. -
-
- DornerWorks Ltd is an Endorsed Services Provider for: -
    -
  • systems: kernel platform port
  • -
  • systems: user-level OS (VM)
  • -
  • systems: application
  • -
- Further details available on services and seL4 Microkernel Engineering Services. -
- - Cog Systems Inc - - - Cog Systems Inc
- As the leading integrator of type-1 visualization solutions - based on seL4, Cog leverages modularity to isolate critical - functions and services on connected devices. All of this - is available for the IoT market with the flexibility to run - all applications effectively and securely. -
-
- Cog Systems Inc is an Endorsed Service Provider for: -
    -
  • systems: user-level OS (VM)
  • -
  • systems: applications
  • -
- See services or visit Cog for further information. -
- - UNSW Sydney - - - UNSW Sydney
- - The Trustworthy Systems (TS) team is the creator of seL4 and - the seL4 Foundation, and for a long time was the sole source - of support. With the seL4 Foundation now in place, and at its - new home at UNSW, TS is now focusing on seL4-related research - and driving development, leaving engineering mostly to other - ecosystem players. However, TS is happy to take on research and - consultancy contracts, as well as providing engineering - (systems and verification) services when no commercial player - is available. -
-
- Trustworthy Systems specialises is an Endorsed Service proider for: -
    -
  • systems: kernel
  • -
  • systems: kernel platform port
  • -
  • systems: user-level OS
  • -
  • verification: user-level OS (seL4CP)
  • -
- For more information, see services, Trustworthy Systems and UNSW. -
- - Proofcraft - - - Proofcraft Pty Ltd
- - Formal verification is what makes seL4 unique. With increasing uptake - and adoption, seL4 is evolving, supporting more platforms, - architectures, configurations, and features. An increasing number of - high assurance systems are built with seL4 as a trustworthy foundation. - - As seL4 code evolves, so must its formal proofs. As more systems are - built on seL4, there is an increased need to ensure correct - configuration and initialisation, and correctness of critical - components. - - Proofcraft is here to help. Founded by the seL4 verification leaders, it - offers commercial support, verification projects, training and - consulting on formal verification in general, and involving seL4 - specifically. - - By applying mathematical machine-checked software verification, - Proofcraft increases critical software systems' reliability, safety and - security, for a verified future. - -
-
- Proofcraft is a Trusted Service Provider for: -
    -
  • systems: kernel
  • -
  • systems: kernel platform port
  • -
  • verification: kernel
  • -
  • verification: user-level OS
  • -
  • verification: applications
  • -
- For further information, visit Proofcraft - or email contact@proofcraft.systems. -
- - Kry10 - - - Kry10 Limited
- - Kry10 offers support to enable seL4-based secure projects to be - affordable, maintainable, and remotely manageable. Kry10 offers a - full-featured operating system on top of the seL4 kernel, along with - tooling, services, key management and more. The Kry10 Platform is a fast - and easy way to build highly secure, next-generation cyber-physical - devices. We leverage the verification of seL4 to bring you a secure, - self-healing, truly dynamic system with minimal downtime, even during - upgrades. Whether you are working on national assets, vehicles or - sensors on a wall, you require deep confidence and easy to use - tools. Come talk to us. - -
-
- Kry10 is an Endorsed Service Provider for: -
    -
  • systems: kernel
  • -
  • systems: kernel platform port
  • -
  • systems: user-level OS (Kry10 OS, CAmkES)
  • -
  • systems: applications
  • -
  • verification: kernel
  • -
  • verification: user-level OS
  • -
  • verification: applications
  • -
- For further information, visit Kry10 or contact us. -
- - -
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2022/abstracts2022.html b/PR_400/Foundation/Summit/2022/abstracts2022.html deleted file mode 100644 index af82c322..00000000 --- a/PR_400/Foundation/Summit/2022/abstracts2022.html +++ /dev/null @@ -1,1101 +0,0 @@ - - - - - - Summit abstracts | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2022 -

-

- Munich, Germany (hybrid) -

-

- 10-13 Oct 2022 -

- -

- Abstracts -

-
- -

- State of seL4-related research -

-

- Keynote -

-

- Presented by Gernot Heiser, UNSW -

-

-I will provide an overview of the seL4-related research activities of the Trustworthy Systems group at UNSW, and how they relate to each other and the overall seL4 vision. Some of these activities will be covered in more detail in the afternoon session (seL4 Core Platform and seL4 Device Driver Framework), so I will mostly provide context for them and focus on the activities that will not be discussed further. These include: -

-
    -
  • update on verifying time protection (systematic prevention of microarchitectural timing channels)
  • -
  • the Pancake language for verifying device drivers
  • -
  • provably secure general-purpose OS
  • -
  • improvements to the MCS kernel API
  • -
-

-I will also attempt to provide some context for various pull requests against the kernel originating from TS. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- The seL4 Verification Roadmap -

-

- Talk -

-

- Presented by Rafal Kolanski, Gerwin Klein & June Andronick, Proofcraft -

-

- Verification makes seL4 unique. With increasing adoption, seL4 is evolving to support more platforms, architectures, configurations, and features, meaning its formal proofs must evolve as well. Proofcraft is committed to keep this evolution alive. In this talk, we will present the status of the seL4 verification roadmap. -

-

- seL4’s extensive formal verification comprises formal proofs of a number of properties for various hardware architectures: AArch32, Intel x64 and RISC-V (64-bit). These properties include: -

-
    -
  • Functional correctness: the C code behaves exactly as its abstract specification says.
  • -
  • Binary correctness: the machine code running on the processor behaves exactly as the C code and, by extension, the specification.
  • -
  • Security: the specification prevents an applications running on top of seL4 from modifying data without authorisation (integrity), interfering with another’s resource access (availability) and learning information without authorisation (confidentiality).
  • -
  • System initialisation: combining the above proofs and the capDL specification language, a verified system initialiser can build secure systems where some components require static isolation from others, by correctly setting up access rights at boot time to ensure desired security properties.
  • -
-

- The verification matrix of architectures, properties, configurations and seL4 features is ever evolving. AArch32 still has the most complete proof stack, but RISC-V is catching up. Intel x64 and AArch32 with hypervisor extensions have verified functional correctness. The current roadmap includes completion of the seL4 MCS configuration (support for mixed-criticality systems), functional correctness of seL4 on AArch64, and progress on multicore seL4 verification. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Explaining the seL4 integrity theorems -

-

- Talk -

-

- Presented by Matt Brecknell, Kry10 -

-

- Kry10 is building a cost-effective platform for connected devices, with extreme security and reliability. We choose to build on seL4 because its capability model gives us the mechanisms, and its verification gives us the confidence that we need. But how do we understand what the verification says about how we should use seL4's mechanisms to build secure systems? -

-

- From the functional correctness and invariant proofs, we know that the implementation has no behaviours that aren't permitted by the specification, and that the specification is internally consistent. But the specification still contains considerable detail. When viewed from the perspective of a user outside the kernel, it can be hard for a mere mortal to infer the security properties of a particular system design. -

-

- In this presentation, we will look at the seL4 integrity theorems, which give us an abstract way to understand the authorities that components in a system have over each other. We'll see how to construct abstract authority graphs, called policies, and how they relate to individual system states through policy refinement. Policy refinement is a purely static view of the system state, which is appropriate for system initialisation, but we're also interested in how the system evolves from its initial state. So we define integrity as the system state changes that we want to allow for a given policy, and prove that actual state changes are bounded by that definition. Note that integrity does not tell us whether the new state is governed by the same policy, so a separate proof, called authority confinement, shows that state changes preserve the policy refinement. -

-

- Both theorems are subject to some well-formedness assumptions about the policy. These assumptions are important for system designers who want the benefit of the theorems, because they act as constraints on their system designs. So we'll examine these conditions in detail, and consider what they mean for static systems such as those produced by the CAmkES tool and the capDL loader. We'll also look at more dynamic systems, where we'll see that with careful design, the theorems can still provide some benefit. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- The seL4 Core Platform (seL4CP) -

-

- Talk -

-

- Presented by Zoltan Kocsis, UNSW -

-

- The seL4CP is a very lightweight OS environment for seL4 that’s presently being developed by Breakaway in collaboration with TS. Compared to CAmkES, seL4CP abstractions map more directly on seL4 primitives, and it dissociates app development from the kernel build system, allowing easier integration into the developer’s preferred development environment. The seL4CP was originally presented as a concept at the 2020 seL4 Summit. It now has an implementation that is already used in products. The talk will provide a refresher on the seL4CP’s concepts and will the discuss recent/on-going work, which falls into two broad categories: -

-

-a) Verification: this has itself two thrusts: -

-
    -
  • functional correctness of the seL4CP itself
  • -
  • verified mapping of the seL4CP spec to CapDL, similar as was done for CAmkES
  • -
-

- b) Adding dynamic features to seL4CP. This is a multi-step process, of making apps restartable to supporting empty app slots that can load arbitrary apps at run time -

-

- Both categories are work in progress, with prototypes of partial functionality available at time of writing, significant progress is expected by the time of the Summit. -

- -YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- The seL4 Device Driver Framework (sDDF) -

-

- Talk -

-

- Presented by Lucy Parker, UNSW -

-

- Here we present a framework for high-performance I/O on seL4 that enables formal reasoning, eventual verification and demonstrates performance competitive with Linux in a networking focused system. Unlike monolithic kernels, the seL4 microkernel prescribes device drivers to run as user level programs. This has the advantage that a driver’s special privileges are reduced to just the ability to access the control registers of the device it drives, thus significantly reducing the system’s trusted computing base. However, the extra context switches involved in such a system can degrade performance. The seL4 Device Driver Framework (sDDF) aims to provide interfaces and protocols for writing and porting device drivers to run as seL4 user-level programs. It assumes a simple and general device model, and presents an asynchronous transport layer as a means of communication to other components in the system. It currently supports network devices to run at near wire speed. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Multiprocessing on seL4 with verified kernels -

-

- Talk & Discussion -

-

- Presented by Kent McLeod, Kry10 -

-

- Verified multicore seL4 seem too far away? Think again, this talk presents a simple multikernel approach to achieve this goal that is attainable using the verified unicore kernel we already have. While this solution does not provide all the benefits of a single system image it allows us to build static systems on a verified seL4 using multiple cores today. This talk will detail how to construct such a system, the work involved and examples of how it can be used. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Using QEMU to extend seL4 VirtIO support -

-

- Talk -

-

- Presented by Hannu Lyytinen, in collaboration with Markku Ahvenjärvi, TII -

-

- The traits of seL4 makes it an appealing hypervisor platform. Today hypervisors are increasingly used to build complex security- and safety critical systems. Good and stable abstractions are required to build upon, and that in turn needs a vivid community of developers and maintainers. Having access to stable and high quality drivers can help building such a community, and is one step towards having seL4 on par feature-wise with the other hypervisors. At TII we explored if QEMU could be used as a VirtIO backend for seL4. The QEMU would bring the tried and tested VirtIO backend, and already thriving ecosystem to work with. Having VirtIO backend running in a Linux VMs user space has its benefits, but also comes with an overhead cost. This talk walks through our journey with having a QEMU within a Linux VM on top of seL4 to provide paravirtualized devices to the other VMs. We share how we went about getting the QEMU working with seL4 along with the benchmarks, the learnings and the pain points. We share where we are at the moment, and our plans for the future. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- QEMU as prototyping platform for seL4 systems -

-

- Talk -

-

- Presented by Axel Heider, HENSOLDT Cyber -

-

- The talk gives an overview about what works more or less out of the box for ARM and RISC-V and what advances configuration and debug options can be used. Then we will look at the limitations of the various emulated machines and some pitfalls. Finally we will explain some of the modifications we have done to the QEMU sources, so it provides some otherwise missing features. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Porting U-Boot drivers to seL4 -

-

- Talk -

-

- Presented by Mark Jenkinson, in collaboration with Stephen Williams, Capgemini -

-

- Our work has been aimed towards easing the overheads for new users to adopt seL4. To support this, we have developed a relatively quick and easy method for providing a high level of driver coverage for an i.MX8MQ-based board (Avnet MaaXBoard). The approach implements a framework to support the U-Boot Driver Model, a standard model employed by U-Boot for defining and interfacing to device drivers. With that framework implemented, the drivers already available in U-Boot (which comprise a very large set) can be made available within seL4 with either limited or zero code changes to the driver itself. -

-

- Our approach has so far been used to port several drivers from U-Boot including USB3.0, Ethernet, MMC, GPIO, I2C, SPI. -

-

- This approach is not optimised for performance or verifiability and is unlikely to be used for drivers where this is paramount. However, our approach is intended to be complementary to such use cases, with significantly less handcrafting of bespoke drivers, helping to lower the bar for entry into seL4 development. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- fence.t: hardware support for preventing microarchitectural timing channels -

-

- Talk -

-

- Presented by Nils Wistoff, ETH -

-

- Microarchitectural timing channels enable information transfer between security domains that are supposed to be isolated, bypassing the operating system's security boundaries. They result from shared microarchitectural state that depends on execution in one security domain and impacts timing in another. Since modern ISAs do not specify timing behaviour, they are insufficient to address these channels. -

-

- In this talk, we present fence.t, a novel RISC-V instruction that clears the processor's microarchitectural state and thus any timing dependence on execution history. We show how this instruction was implemented in an open-source RISC-V core and integrated into an experimental version of seL4 with time protection. Furthermore, we will address the challenges of fence.t and its future roadmap. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Kry10 Secure Platform: Trust but Isolate -

-

- Keynote -

-

- Presented by Boyd Multerer, Kry10 -

-

- The Kry10 Secure Platform is a new seL4-based platform that brings security and reliability to industrial connected devices. The platform is based on a philosophy of "Trust but Isolate" - build trusted software to the best quality, but isolate it so that if problems do occur, they cannot spread to the rest of the system. -

-

- "Trust but isolate" requires: strict spatial and temporal isolation for OS processes, modular system design that benefits from and takes advantage of isolation to contain any errors, and the ability for application and OS software to be restarted and updated without causing downtime for the rest of the system. -

-

- The foundation of the Kry10 Secure Platform is Kry10 OS (KOS), an OS based on the guaranteed isolation provided by the seL4 microkernel. KOS builds on top of seL4, providing a dynamic runtime environment that allows for a flexible and updateable system architecture. KOS integrates an Elixir-based application environment bringing the resilience and concurrency benefits of the BEAM to connected devices. KOS also enables fine-grained and efficient system updates, so that updates can be performed on specific application or system components without affecting other running components, thus virtually eliminating the need for scheduled downtime. Finally, KOS provides a high quality development environment with API and tools that are designed to be consistent, understandable, and usable. -

-

- In this presentation we will introduce the Kry10 Secure Platform with its Trust but Isolate philosophy, and then show how the Kry10 Operating System implements this philosophy to achieve a secure and robust platform for industrial connected devices. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- seL4 and BEAM: a match made in Erlang -

-

- Talk -

-

- Presented by Ihor Kuz, Kry10 -

-

- When building secure and robust systems, the general strategy is to "prevent, contain, and recover". Ideally we prevent problems (like errors and vulnerabilities) from occurring in the first place, contain the effects of any problems that do occur, and recover from those problems by repairing any damage and ensuring the problems do not happen again in the future. -

-

- SeL4 provides excellent spatial and temporal isolation mechanisms to help contain any potential problems, but it does not address prevention and recovery - gaps left for user-level software running on top of the kernel. The BEAM virtual machine and its Erlang and Elixir programming environments provide one of the best opportunities to fill these gaps. Developing code based on the BEAM and its programming environments prevents many errors from occurring, leading to robust user-level components. The BEAM also provides strong fault-recovery mechanisms based on its supervision trees and a "crash and restart" philosophy coupled with dynamic code (re)loading. This, combined with seL4's strong isolation, leads to systems that can realise the full "prevent, contain, and recover" strategy. -

-

- In this presentation we will demonstrate what can be achieved by combining seL4 and the BEAM. We will also describe our experience with building BEAM-based systems on seL4, including porting the BEAM to run on seL4, integrating the BEAM with seL4 inter-process communication mechanisms and other C-based components, and creating a powerful Elixir-based development environment for seL4 systems. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Trustworthy board management controllers -

-

- Talk -

-

- Presented by Daniel Schwyn & Ben Fiedler, in collaboration with Michael Giardino, David Cock & Timothy Roscoe, ETH -

-

- Most modern computing platforms are so complex that they need a separate embedded system to manage them. These systems are referred to as (Base-)Board Management Controllers or BMCs. BMCs handle power and clock distribution and sequencing, firmware for other components on the board, and usually offer remote management capabilities (e.g. console access and firmware updates). This makes them the root of trust in such systems. -

-

- Although BMCs have absolute power over modern computing platforms they are not engineered in the rigorous way that warrants the implicit trust that we put in them. In our talk we will present ongoing work on declarative power and clock management and our broader vision of a trustworthy BMC software stack with, at its heart, seL4 as a separation kernel. Not only will a trustworthy BMC stack improve safety and security of modern computing platforms but, with the right tools for generating code from declarative models, it has the potential to shorten bringup times for new platforms. -

- -YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Rust support in seL4 userspace: Present and future -

-

-

-

- Presented by Nick Spinale -

-

- The Rust programming language and ecosystem offer memory safety and developer productivity even at lower levels of the software stack. There are numerous efforts within the seL4 community towards laying groundwork for an accessible development story for Rust in the seL4 userspace. This talk explores the technical considerations related to Rust in the seL4 userspace, surveys the accomplishments and directions of these efforts, and then calls for the participation of interested parties in the ongoing design and implementation of Rust support in the upstream seL4 software ecosystem. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Early experiences proving the correctness of a network stack implementation -

-

- -

-

- Presented by Alain Kägi, in collaboration with Aubrey Birdwell, Caitlyn Wilde, Jens Mache & Richard Weiss, Lewis & Clark College -

-

- We are investigating the question of whether the field of software verification has matured enough to allow a small group of researchers at two undergraduate institutions to prove correctness properties of network protocols implemented in operating system distributions, in general, and IoT devices, in particular. As a proof of concept, we are designing a networked temperature sensor, to monitor incubators, built on top of the seL4 microkernel and seL4® core platform. In this talk, we will share our early experience building and proving some properties about such a system. In particular, we will describe our efforts developing our own UDP networking stack, testing IPv6-based protocols, proving properties about reassembly of network fragments, and finding possible inconsistencies in specifications published by the Internet Engineering Task Force. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- CASE Overview: Cyber Assured Systems Engineering -

-

- Talk -

-

- Presented by Darren Cofer, Collins Aerospace -

-

- Formal methods tools that provide mathematical proof of system properties have improved dramatically in their power and capabilities. As part of DARPA's Cyber Assured Systems Engineering (CASE) program, our team has developed a model-based systems engineering environment called BriefCASE that integrates formal methods at all levels of system design, including the ability to build systems targeting seL4. We will present an overview of the CASE project and the capabilities of the BriefCASE tools. We will also describe an application of the BriefCASE tools and workflow to the mission computing system in a military helicopter. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- A Verified Achitecture for Trustworthy Remote Attestation -

-

- Talk -

-

- Presented by Grant Jurgensen, The University of Kansas -

-

- Remote attestation is a process where one digital system gathers and provides evidence of its state and/or identity to an external system. The external system appraises the attestation evidence to make judgments over the attesting system. For this process to be successful, the appraiser must find the attestation evidence to be convincingly trustworthy. Remote attestation is difficult to make trustworthy due to the appraiser’s limited access to the attestation target. In contrast to local attestation, the appraising system is unable to directly observe and oversee the attestation target. In this work, we present a system architecture design and prototype implementation that we claim enables trustworthy remote attestation. -

-

- This architecture defines a layered system consisting of seL4 and a Linux virtual machine contained therein. Existing Linux systems may easily be run within the virtual machine, and augmented by coordinated attestation components running both at the Linux and seL4 level. We argue that this layered design offers both the flexibility to accommodate existing systems as wells as rigorous and trustworthy attestation capabilities. -

YouTube icon - slides icon -
See this talk in the program
- -
- -

- FerrOS: Rust-y unikernels on seL4 w/ compile-time assurances -

-

- Experience report -

-

- Presented by Zack Pierce, Auxon -

-

- Even though seL4 promises that our resources are isolated, how can we know those resources are enough to fuel our applications? FerrOS is an approach to answering that question by using Rust's type system to layer resource management abstractions on top of seL4 primitives. This talk covers the productivity advantages of teaching a compiler to check that the right kinds of capabilities are in the right places, the tradeoffs between rigid and fluid modes of development, and the branching future paths for Rust with seL4. -

-YouTube icon -   -slides icon -
See this talk in the program
- - - -
- -

- Make seL4 an ASIL-D Certified System -

-

- Experience report -

-

- Presented by Yuning Liang, Xcalibyte -

- A few important criteria have to be satisfied for a piece of software system before becoming ASIL-D certified, two of those are MISRA coding standard and Code Coverage. -

-

- First, MISRA is an important coding standard for automotive industry. Making seL4 source code MISRA compliant is a key point to boost the adoption of seL4 in automotive industry. In this talk, we’ll present a joint work from us and our partners, how to make seL4 code MISRA compliant, who has chosen seL4 as the fundamental kernel for their OS product. We’ll discuss typical implementation issues which don’t follow MISRA guidance, the fixes and impacts on proofs. -

-

- Second, Code Coverage has been an important metric to measure the code quality in automotive industry. Although seL4 is a formally proven, Code Coverage is still important for two reasons. One is Code Coverage can work orthogonally with formal proof to assure the code quality. The other is Code Coverage rate is key metric in many certifications. We’d like to share our work regarding measure seL4 kernel code coverage. We will present the measuring results and ways we have tried to improve code coverage rate. -

-YouTube icon -   -slides icon -
See this talk in the program
- - - -
- -

- Funding agencies: priorities and vision -

-

- Panel & discussion -

-

- We are very fortunate to welcome four leaders at major funding agencies to participate in a session Funding agencies: priorities and vision. They will each give their views on the priorities and vision of their agency in terms of high-assurance systems. -

-
- -

- William “Brad” Martin -
- Program Manager DARPA I2O -
-
- DARPA -

- -

- The Defense Advanced Research Projects Agency (DARPA), established in 1958, is an agency within the Department of Defense (DOD) responsible for catalyzing the development of technologies that maintain and advance the capabilities and technical superiority of the U.S. military. -

-

- William Martin currently serves as a program manager in the Information Innovation Office at DARPA. He joined DARPA from the National Security Agency (NSA), where he served in a variety of roles, most recently as acting technical director and cybersecurity subject matter expert of the Laboratory for Advanced Cybersecurity Research. His research interests include formal methods, domain-specific languages, system analysis, and trustworthy artificial intelligence. -

-

-
slides icon
-

-
- -

- - Paul Waller -
-
- UK National Cyber Security Centre (NCSC) -

-

- NCSC is the UK national technical authority for cyber security. Part of the UK government, we provide expert leadership and guidance to help make the UK the safest place to live and work online. -

-

- Paul has worked in cryptography and hardware security since graduating with a degree in mathematics in 2001. He has represented the NCSC and its predecessor organisation in various standards bodies, including the Trusted Computing Group, Global Platform and FIDO. His current role allows him to spend time with academic and industry partners learning what the future holds for security technology, and also to help user communities take advantage of new features. Outside of work Paul likes to cycle up small hills in summer, and ski down bigger ones in winter. -

-
- -

- - Dr. Sebastian Jester -
- Head of Secure Hardware and Supply Chains -
-
- Agentur für Innovation in der Cybersicherheit -

-

- The Agentur für Innovation in der Cybersicherheit (Cyberagentur) funds high-risk research and development projects with a high disruptive potential in the field of cybersecurity. The Cyberagentur’s goal is to advance internal and external security and technological sovereignty. It was created in 2020 by the German Federal Government and is funded by the Federal Ministry of Defence and the Federal Ministry of the Interior and Home Affairs. -

-

- Sebastian Jester is Head of Secure Hardware and Supply Chains at the Agentur für Innovation in der Cybersicherheit, which he joined in June 2022. Previously, he was at Germany’s Federal Ministry of Education and Research, latterly responsible for microelectronics R&D policy at the national and EU level. He holds a doctorate in astronomy from the University of Heidelberg and a Master of Physics from the University of Oxford. -

-

-
slides icon
-

-
-
- - -

- - Dr. Shreekant (Ticky) Thakkar -
-
- TII -

-

- Technology Innovation Institute (TII) is pioneering global research institute that focuses on applied research and a new-age technology capabilities. The institute has seven initial dedicated research centers in Secure Systems, Quantum, Autonomous Robotics, Cryptography, Advanced Materials, Digital Security and Directed Energy. -

-

- TII advances research rapidly through a defined research roadmap, approved research funding and state-of-the-art-facilities. By working with an exceptional talent, universities, research institutions and industry partners from all over the world, the institute connects an intellectual community and contributes to building an R&D ecosystem in Abu Dhabi and the UAE. The institute pursues the development of breakthrough technologies that have practical use-cases and global impact. Technology Innovation Institute also reinforces Abu Dhabi and the UAE’s status as hub for innovation and contributes to the broader development of the knowledge-based economy. -

-

- Dr Shreekant (Ticky) Thakkar is Chief Research Officer at the Secure Systems Research Centre at the Technology Innovation Institute (TII), a cutting-edge UAE-based scientific research Centre and Adjunct Research Professor at Khalifa University. In this role, he is -responsible for carrying out advanced research that is driving end-to-end security and resilience in cyber physical and autonomous systems of systems (swarm of drones). These includes secure technologies in silicon, edge and mobile and cloud platforms working with open-source ecosystems (Dronecode, RISC-V, Linux, Apache, ROS) and research institutions across USA, Europe, and UAE. -

-

-
slides icon
-

YouTube icon -
See this talk in the program -
- -

- Overview: seL4 principles, abstractions and use -

-

- Plenary -

-

- Presented by Gernot Heiser, seL4 Foundation -

-

- Gernot will start the day by providing background on seL4 and its philosophy. Specifically he will talk about the principles that drive seL4’s design and abstractions. Given the low-level nature of seL4’s abstractions and mechanisms, and the deliberate policy-freedom, it is not always clear what constitutes “proper use”. Gernot will highlight some of the do’s and don’ts that developers should keep in mind to produce good designs. He will link this back to earlier presentations on user-level frameworks and how they support proper use. -

YouTube icon -   -slides icon -
See this talk in the program -
- -

- Overview: what's verified, what's not, and what does it mean? -

-

- Plenary -

-

- Presented by June Andronick, Proofcraft -

-

- seL4 is commonly referred to as "the most verified microkernel". While this statement is true, the notion of being “verified” requires careful handling to ensure appropriate expectations and valid claims. seL4’s verification is its key differentiator. Inappropriate claims will damage its reputation and could have serious consequences in real systems. -

-

- Not all seL4 configurations and features are verified, and not all “verified” configurations are verified to the same degree. While we should celebrate and promote the high-assurance that seL4 and seL4-based systems provide, it is important to ensure understanding of what exactly is proved, as well as the conditions under which the proofs hold and what they imply in practice. Such precision is also important and necessary to allow a suitable comparison with other alternative solutions. -

-

- In this talk we will give a brief overview of what seL4 verification claims can be made and what they mean, and which claims should not be made. -

- -YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- The seL4 GitHub test suite -

-

- Plenary -

-

- Presented by Gerwin Klein, Proofcraft -

-

- The seL4 foundation manages a collection of over 55 repositories in the seL4 GitHub organisation. -

-

- This talk gives an overview of the Continuous Integration (CI) setup for this collection, how the repositories are kept consistent with each other, and how we can tell after a change whether things are still working or not. -

-

- The centre of this collection is the seL4 kernel repository itself. Its test suite includes running the formal verification of the kernel, as well as static compilation checks for all supported hardware platforms, simulation runs for all architectures, automated tests on hardware for most of the supported platforms, running benchmarks, documentation builds, etc. Both, formal verification and runtime tests are necessary – formal verification is good at showing the absence of bad behaviours, tests are good at showing the presence of good behaviours. They are also useful for validating assumptions of the formal verification. Test runs leave behind log files and build artefacts such as compiled kernel binaries or sel4tests binaries that can be simulated or run on hardware. Successful test runs automatically record the constellation of repositories that were involved in that successful run, so developers can easily trace and access known working combinations. The talk will also give an overview on how you can contribute tests, how you can help to improve the CI infrastructure, and how you can run most of these tests locally yourself. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- seL4 mainlining: Experiences, challenges, and solutions -

-

- Talk & Discussion -

-

- Presented by Robbie VanVossen & Chris Guikema, DornerWorks -

-

- The lifeblood of open-source projects are the contributors, developers, and maintainers that work to keep the projects up to date, add new features, and squash bugs. However, there can be quite a few roadblocks that prevent or slow down upstreaming of code. This will be an account of the seL4 mainlining experiences of DornerWorks. This talk will encompass our successes, difficulties, possible improvements, and some open questions. This will be a short talk with a lot of time for open discussion. The goal is to spark a conversation that will lead to even greater collaboration than is seen today. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- seL4 microkernel for virtualization use-cases "The importance of a standard VMM" -

-

- Talk & Discussion -

-

- Presented by Everton de Matos, in collaboration with Jason Sebranek, TII+Cog -

- -

- Using seL4 in complex production environments brings new challenges often quite different from research-oriented environments. At a high level, there are gaps in the seL4 stack, specifically the VMM, userspace, and tooling, which complicate matters for integrators attempting to meet real-world customer use cases. Not all business opportunities require a solution using a VM architecture, but those that do quickly become complex and would benefit enormously from an established standard or reference baseline. The lack of a robust and consistent VMM for seL4 has created a highly fractured environment. Most integrators have their own specialized customer use cases, and they have found that the quickest path is to use a forked and modified VMM. This practice may have short-term benefits to that integrator. Still, it does not allow the community to benefit from commonality and guarantees that the fork will get old and out of sync with the mainline. -

-

- This talk proposes to establish a driving philosophy to design a baseline VMM rather than prescribe a specific system architecture. We intend to discuss the possible missing features of the existing seL4 VMM concerning standardization, more so than a prescription for the right way to do it. Indeed, this will entail recommending high-level architecture patterns but cannot lock an adopter into specific implementations. Each adopting integrator will inevitably start from the new standard and refine the implementation for their use case. The effort here is to close the gap between the current VMM baseline and the point of necessary deviation. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Improving embedded DevOps with seL4 VMM -

-

- -

-

- Presented by Robert VanVossen, DornerWorks -

-

- While seL4 is an amazing technology, it is difficult to develop and build applications from scratch. Even when using virtualization, the development process for OS applications is a long loop of write, build, deploy, test, fix, build, deploy, test, etc. One way to improve on this is to borrow from the server world and support containers in VMs running on seL4. This improves embedded DevOps by allowing developers to test various container applications together on their host target, thereby reducing the number of required deployments. We will be discussing what work we have already done in this space as well as some thoughts on where to take it in the future. This will be a short talk followed by open discussion to explore issues and interests. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Experience teaching seL4 -

-

- Talk & Discussion -

-

- Presented by Sebastian Eckl, HENSOLDT Cyber -

-

- Since the winter term 2020, the practical course "seL4 & TRENTOS" offers students at the TUM an introduction into the fundamental aspects of TRENTOS, a novel secure embedded operating system developed by HENSOLDT Cyber, which is built on top of the seL4 microkernel and the CAmkES framework. The course starts with a respective theory phase, in which students get to know the basic building blocks of both kernel and user space. Afterwards, the course participants work within teams on an individual practical project. They hereby apply a TRENTOS-based setup, running on top of the the Raspberry Pi platform, to a selected real-world use case (e.g. originating from the domains automotive or industrial automation). Besides providing a general course overview, this talk shall therefore demonstrate respective course results and serve as a starting point for follow-up discussions. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- DornerWorks’ VM Composer -

-

- Teaser -

-

- Presented by Robert VanVossen, DornerWorks -

-

- A secure kernel is more and more attractive these days and seL4 is one of the strongest microkernels around. However, the seL4 ecosystem is still maturing and may not be a drop-in replacement for practical applications in real-world systems. With the strictest security needs, it is probably best to use just the microkernel with user-space applications. However, there are many stacks, libraries, and drivers lacking to meet the needs of most systems. Virtualization and the user-space VMM provide an answer to this. For developers new to the seL4 ecosystem, it is difficult to configure the software to meet system requirements. The traditional approach is to start with a known working configuration and tweak it until it fits the specific application. The latest approach is to use DornerWorks’ VM Composer, a graphical, drag-and-drop interface which allows one to easily configure their seL4-based, virtualized systems without needing to modify any CMake, CAmkES, python, or C files. This short, teaser talk will introduce the features and platforms that are supported in VM Composer. -

- -YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- seL4 Foundation: overview, update and vision -

-

- Plenary -

-

- Presented by June Andronick, seL4 Foundation -

-

- The seL4 Foundation is home to the ecosystem of software, developers and adopters for safety- and security-critical systems based on seL4. It was formed in April 2020 as a neutral and community-based organisation that ensures long-term, independent support for seL4 and its ecosystem, and fosters strong community participation and ownership in the ecosystem. It raises funds for continuing and accelerating development, facilitates interoperability, standardisation and sharing of cost for the benefit of all. Its aim is to ensure that seL4 is not only the world’s best secure operating-system technology, but is readily deployable and supported by a diverse and stable ecosystem of services and products. -

-

- In this talk I will give an brief update on the Foundation's successes in increased contributions, increased support, and increased membership, as well as the vision to keep supporting a thriving seL4 ecosystem. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- seL4: from zero to hello world -

-

- Bootcamp -

-

- Presented by Ihor Kuz, Kry10 -

-

- This session will help you setup a development environment for building and running seL4-based systems. -

-

- Most tutorials and trainings begin with a step zero: "set up your development environment and all the prerequisites, then run 'hello world' to confirm that your setup works". It's expected that this step is trivial and "just works" and participants are expected to have already done this (at home) before showing up to the tutorial or training session. -

-

- For many people this works. But for some people it doesn't "just work". Maybe they don't have time or resources to do the preparation, maybe despite their best efforts something doesn't work right, or maybe they want to set up their system a bit differently (e.g. a different OS) and the basic instructions are not enough. If that's you, then this session is for you. -

-

- In this session we'll walk through the development environment setup, and provide assistance to make sure you have a setup that works so that you can actively participate in any of the other tutorials and trainings sessions. -

-

- If you already have a working development environment set up, then you can probably skip this session - unless you want to lend a hand helping others get set up, in which case, come on down. We may even have cookies. -

-See this talk in the program
- -
- -

- CAmkES -

-

- Bootcamp -

-

- Presented by Sebastian Eckl, HENSOLDT Cyber -

-

- CAmkES (Component Architecture for microkernel-based Embedded Systems) is a software development and runtime framework that shall ease systems development by providing an abstraction layer on top of the seL4 microkernel. As part of this workshop, participants shall therefore get to know the general CAmkES architecture as well as its basic building blocks. Finally, the execution of a corresponding CAmkES-based application on top of seL4 will be demonstrated. -

-See this talk in the program
- -
- -

- TRENTOS -

-

- Bootcamp -

-

- Presented by Sebastian Eckl, HENSOLDT Cyber -

-

- With TRENTOS, HENSOLDT Cyber develops a novel secure embedded OS on top of the proven seL4 ecosystem. The CAmkES framework is hereby utilized for providing the respective abstraction layer on top of seL4, which allows for constructing respective OS components and services (e.g. for storage or networking support) within TRENTOS. As part of this workshop, participants shall therefore get to know the general TRENTOS architecture, its basic building blocks as well as the standard TRENTOS operating system components. Finally, with the help of the TRENTOS SDK, a small TRENTOS application will be developed and the corresponding build and deployment process will be demonstrated. -

-See this talk in the program
- -
- -

- The seL4 Core Platform (seL4CP) -

-

- Bootcamp -

-

- Presented by Ivan Velickovic, in collaboration with Peter Chubb, UNSW -

-

- The seL4 Core Platform (seL4CP) is a minimal Operating System built on top of seL4. It was designed to be simple enough that those without prior experience with seL4 can get started easily in building secure performant systems on seL4. seL4CP provides lean abstractions so that seL4 can be used for building reliable systems easily, without being restricted to a specific environment. This workshop will introduce you to seL4CP such that by the end, you will be able to build systems for your own purposes and know how to run them on hardware. We'll also give a brief overview of the internals of seL4CP to make it a little easier for participants to port seL4CP to their own hardware. -

-See this talk in the program
- -
- -

- DornerWorks’ VM Composer: the easy button for virtualized seL4-based systems -

-

- Bootcamp -

-

- Presented by Chris Guikema & Robbie VanVossen, DornerWorks -

-

- A secure kernel is more and more attractive these days and seL4 is one of the strongest microkernels around. However, the seL4 ecosystem is still maturing and may not be a drop-in replacement for practical applications in real-world systems. With the strictest security needs, it is probably best to use just the microkernel with user-space applications. However, there are many stacks, libraries, and drivers lacking to meet the needs of most systems. Virtualization and the user-space VMM provide an answer to this. For developers new to the seL4 ecosystem, it is difficult to configure the software to meet system requirements. The traditional approach is to start with a known working configuration and tweak it until it fits the specific application. The latest approach is to use DornerWorks’ VM Composer, a graphical, drag-and-drop interface which allows one to easily configure their seL4-based, virtualized systems without needing to modify any CMake, CAmkES, python, or C files. This training session will provide step-by-step instructions to configure an example virtualized system using an evaluation version of the tool. It will show basic and advanced configuration options. It will also create some invalid configurations to show the validation that the tool performs. -

-See this talk in the program
- -
- -

- BriefCASE Tutorial -

-

- Bootcamp -

-

- Presented by Isaac Amundson & Darren Cofer, Collins Aerospace -

-

-As part of DARPA's Cyber Assured Systems Engineering (CASE) program, our team has developed a model-based systems engineering environment called BriefCASE that integrates formal methods at all levels of system design, including the ability to build systems targeting seL4. In this hands-on session we will provide a top to bottom demonstration of the tools, transforming a system model to address cyber requirements, verifying the correctness of the model, generating component implementations from formal specifications, generating infrastructure code to run on seL4, automatically producing an assurance case documenting the design rationale, and running the final system in emulation on QEMU. A virtual machine containing all necessary tools and models will be provided before the session. -

- -See this talk in the program
- -

-
Acknowledgement:
-Slide icons created by Syahrul Hidayatullah - Flaticon -

-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2022/bids.html b/PR_400/Foundation/Summit/2022/bids.html deleted file mode 100644 index 3d1c267d..00000000 --- a/PR_400/Foundation/Summit/2022/bids.html +++ /dev/null @@ -1,169 +0,0 @@ - - - - - - Summit | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2022: Bids -

-
-

- Bids -

-

- Bids should be sent to summit@sel4.systems and should include at least the following information: -

-
    -
  • details (name, contact and experience) of the hosting team, with an identified Chair
  • -
  • location, venue, access, transport
  • -
  • indicative financial plan and expected fee
  • -
  • details of the venue: # of rooms, # days, and any social events
  • -
  • details for hybrid and recording capabilities
  • -
  • back-up plan for a fully virtual event, as may be required by the situation (e.g. pandemic related travel restrictions)
  • -
  • optionally, a webpage to be hosted on the Foundation's website with the bid information, e.g. as a pull request on https://github.com/seL4.
  • -
-

- For examples of websites of winning bids for conferences in related areas, see e.g. -

- -

- Deadline -

-

- The deadline for bids is Tuesday, 22 February 2022. -

-
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2022/cfp.html b/PR_400/Foundation/Summit/2022/cfp.html deleted file mode 100644 index 775757d3..00000000 --- a/PR_400/Foundation/Summit/2022/cfp.html +++ /dev/null @@ -1,363 +0,0 @@ - - - - - - CFP | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- Call For Presentations for the seL4 Summit 2022 -

- -
- -

- Important Dates: -

-
    -
  • Abstracts due: 9th of May 2022
  • -
  • Notification of decisions: 30th of May 2022
  • -
  • Summit: 10-12 October 2022, Munich, Germany (hybrid)
  • -
-
- - -
-

- Overview: -

-

- - The seL4 summit aims at gathering the seL4 community to - learn, share, and connect: -

-
    -
  • - - learn about the seL4 technology, its latest progress, use, - successes, challenges, plans; - -
  • -
  • - - share exciting seL4 development, research, experience, - application in the real world; - -
  • -
  • - - connect with other seL4 developers, users, providers, - supporters, potential partners - -
  • -
- - -

- - The seL4 summit covers the complete seL4 ecosystem, consisting of the verified - microkernel, as well as all seL4-related technology, tools, infrastructure, - products, projects, and people. - -

- -

- - The seL4 summit 2022 will be in Munich, Germany, on 10-12 October 2022. - -

- -
-
- -

- We are calling for proposals to present at the seL4 Summit 2022. -

-

Share your seL4 work

-

Share your seL4 experience

-

Share your seL4 thoughts

-

Share your seL4 questions

-
- - - -
- - -

- Topics: -

-

-We solicit proposals on any seL4-related topic, in particular in the areas of: -

-
    -
  • - seL4 on-going and planned R&D, mature or early stage: -
      -
    • - seL4 research efforts -
    • -
    • - seL4 development efforts -
    • -
    • - work-in-progress seL4 development -
    • -
    • - student work on seL4 -
    • -
    • - new/missing/next-gen kernel mechanisms -
    • -
    • - seL4-related roadmaps: what you plan to work on and when -
    • -
    • - seL4 grand challenges -
    • -
    • - OS frameworks and services -
    • -
    • - seL4 userland with programming language support beyond C -
    • -
    • - High performance systems based on seL4: pushing the boundaries -
    • -
    -
  • -
  • - seL4 experience reports -
      -
    • - experience with deploying seL4 in the field, in commercial/deployed products -
    • -
    • - experience with teaching seL4 -
    • -
    • - experience with seL4 in certification schemes and application of industry standards -
    • -
    • - experience with “building a business case for using a verified kernel” -
    • -
    • - experience with porting software from other OSes -
    • -
    -
  • -
  • - seL4 and hardware -
      -
    • - ports to new hardware platforms or architectures -
    • -
    • - multicore systems -
    • -
    • - virtualisation -
    • -
    • - new/proposed hardware features or architectures, which could also enable or broaden the scope of formal reasoning (e.g. about time protection) -
    • -
    • - seL4 in embedded processors on FPGAs, and impact of assured separation -
    • -
    • - IOMMU solutions for various hardware architectures and impact for seL4 -
    • -
    -
  • -
  • - seL4 and assurance: -
      -
    • - application-level verification leveraging seL4 proofs -
    • -
    • - correctness, spatial separation, temporal separation, and real-time proofs -
    • -
    • - formalised interface between or composition of kernel-level proofs and user-level proofs -
    • -
    • - verification engineering at scale, scaling verification productivity -
    • -
    • - security/safety impact/assurance/certification for an seL4-based system -
    • -
    -
  • -
- -
- - - -
-

- Submission: -

-

- - If you would like to propose a talk (or nominate someone else to be invited to - do so), please send an abstract of one page or less for your - proposed talk (or a one paragraph description of your nominee’s proposed talk) - by Monday 9th of May 2022 to summit@sel4.systems. Abstracts and - nomination paragraphs should indicate why the talk fits in the seL4 summit - scope. Notifications of accepted presentations will be made by Monday 30th May - 2022. If you would like to propose a talk to be delivered remotely, please - notify it in the submission. - -

- -
- - - - - - - - - - -
-

- Contact -

-

- If you have questions, please do not hesitate to contact the seL4 Foundation summit team at: summit@sel4.systems. -

- -
-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2022/home.pml b/PR_400/Foundation/Summit/2022/home.pml deleted file mode 100644 index 62dc0f28..00000000 --- a/PR_400/Foundation/Summit/2022/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Summit/2022/index.html b/PR_400/Foundation/Summit/2022/index.html deleted file mode 100644 index 991ec3f6..00000000 --- a/PR_400/Foundation/Summit/2022/index.html +++ /dev/null @@ -1,606 +0,0 @@ - - - - - - Summit | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2022 -

-

- Munich, Germany (hybrid) -

-

- 10-13 Oct 2022 -

- - - - -
- All summits: 2022 2023 2024 -
- -
-

- About -

-

- The seL4 Summit 2022 was the fourth edition of the international summit on the seL4 microkernel, the world's most highly assured OS kernel. -

-

- The first three seL4 Summits were organised by the Trusted Computing Center of - Excellence, and were hosted in the US. -

-

- The seL4 Summit 2022 was the first to be organised by the seL4 Foundation, established in 2020. -

-

- Summit organisation and hosting is based on these principles. -

-
- -
-

- Location & Host -

-

- The seL4 Summit 2022 was held in Munich, Germany (hybrid), 10-13 Oct 2022, hosted by HENSOLDT Cyber GmbH. -

-
- - -
-

- Keynote Speakers -

-
-
-
-
- Gernot Heiser -
-
- Gernot Heiser -
- UNSW -
- -
-
-
- Boyd Multerer - -
-
- Boyd Multerer -
- Kry10 -
- -
-
- -
-

- Panellists -

-

- We were very fortunate to welcome four leaders at major funding agencies to participate in a session Funding agencies: priorities and vision. They each gave their views on the priorities and vision of their agency in terms of high-assurance systems. -

-
-
-
-
- William “Brad” Martin -
- -
-
-
- Paul Waller -
-
- Paul Waller -
- NCSC -
-
-
-
- Cyberagentur -
- -
-
-
- Dr. Shreekant (Ticky) Thakkar -
- -
-
- -
-

- Program, Abstracts, Slides and Videos -

-

- Videos of the seL4 summit 2022 are available on the seL4 YouTube channel! Links and slides can be found on the summit Program and Abstracts pages. Thanks to all the speakers for making the seL4 summit 2022 a great success! -

-
- -
-

- Program committee -

-
- -
- - - -
-
- Darren Cofer -
- -
- -
-
- Anna Lyons -
- -
- -
-
- Axel Heider -
- -
- -
-
- Gernot Heiser -
- -
- -
-
- Ihor Kuz -
-
- Ihor Kuz -
-
- -
-
- John Launchbury -
- -
- -
-
- Kent Mcleod -
- -
- -
-
- Nick Spinale -
- -
- -
-
- Perry Alexander -
- -
- -
-
- Robbie VanVossen -
- -
- -
-
- Todd Carpenter -
- -
-
- - -
-

- Sponsors -

-

- We are grateful to the following sponsors for their financial support of the seL4 summit 2022. -

-
-
- - - -
-
- -
- -
-

- Contact -

- -

- For any questions regarding the summit, please contact summit@sel4.systems. -

-
- - - - - - -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2022/principles.html b/PR_400/Foundation/Summit/2022/principles.html deleted file mode 100644 index df8cd156..00000000 --- a/PR_400/Foundation/Summit/2022/principles.html +++ /dev/null @@ -1,160 +0,0 @@ - - - - - - Principles | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit -

- -

- Principles -

- -
-

- An open call for presentation invites submissions of short abstracts about cool work on seL4. -

- -

- The Program Committee is in charge of the technical content (reviewing submission, selecting invited speakers, defining the program). -

- -

- The Hosting Team is in charge of organising the event (venue, finances, catering, local arrangements). -

- -

- The location is aimed to be on a different continent each year, as far as possible, with a hybrid in-person/online event. -

-
-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2022/program.html b/PR_400/Foundation/Summit/2022/program.html deleted file mode 100644 index aa2d4f1c..00000000 --- a/PR_400/Foundation/Summit/2022/program.html +++ /dev/null @@ -1,647 +0,0 @@ - - - - - - Summit program | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2022 -

-

- Munich, Germany (hybrid) -

-

- 10-13 Oct 2022 -

- -

- Program -

-

- All times are local time in Munich, Germany (UTC+2). -

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Day 1 10 October 2022
Session chair
9:00 - 9:10AnnouncementsWelcomeYouTube iconslides iconDarren Cofer &
June Andronick
9:10 - 10:00KeynoteState of seL4-related research
Gernot Heiser
, - UNSW -
YouTube iconslides iconDarren Cofer
Break
10:15 - 10:45TalkseL4 verification roadmap
Rafal Kolanski, Gerwin Klein & June Andronick
, - Proofcraft
YouTube iconslides iconNick Spinale
10:45 - 11:15TalkExplaining the seL4 integrity theorems
Matt Brecknell
, - Kry10
YouTube iconslides icon
11:15 - 11:45DiscussionAMA (Ask Me Anything) with the Foundation TSCYouTube iconDarren Cofer
Break
12:45 - 13:15Talk The seL4 Core - Platform (seL4CP)
Zoltan Kocsis
, - UNSW
YouTube iconslides iconRobbie VanVossen
13:15 - 13:45TalkThe seL4 Device Driver Framework (sDDF)
Lucy Parker
, - UNSW
YouTube iconslides icon
13:45 - 14:30Talk & DiscussionMultiprocessing on seL4 with verified kernels
Kent McLeod
, - Kry10
YouTube iconslides icon
Break
15:00 - 15:30TalkUsing QEMU to extend seL4 VirtIO support
Hannu Lyytinen
& Markku Ahvenjärvi, - TII
YouTube iconslides iconIhor Kuz
15:30 - 16:00TalkQEMU as prototyping platform for seL4 systems
Axel Heider
, - HENSOLDT Cyber
YouTube iconslides icon
16:00 - 16:30TalkPorting U-Boot drivers to seL4
Mark Jenkinson & Stephen Williams
, - Capgemini
YouTube iconslides icon
16:30 - 17:00Talkfence.t: hardware support for preventing microarchitectural timing channels
Nils Wistoff
, - ETH
YouTube iconslides icon
Traditional Bavarian Dinner 19:00 - 22:30
Day 2 11 October 2022
Session chair
9:00 - 9:50KeynoteKry10 Secure Platform
Boyd Multerer
, - Kry10
YouTube iconslides iconJune Andronick
9:50 - 10:00AnnouncementsFoundation announcementsYouTube iconslides iconJune Andronick
& Darren Cofer
Break
10:15 - 10:45TalkseL4 and BEAM: a match made in Erlang
Ihor Kuz
, - Kry10
YouTube iconslides iconGerwin Klein
10:45 - 11:15TalkTrustworthy board management controllers
Daniel Schwyn, Ben Fiedler
, Michael Giardino, David Cock & Timothy Roscoe, - ETH
YouTube iconslides icon
11:15 - 11:45Talk & DiscussionRust support in seL4 userspace: present and future
Nick Spinale
YouTube iconslides icon
Break
12:45 - 13:15TalkEarly experiences proving the correctness of a network stack implementation
Alain Kägi
, Aubrey Birdwell, Caitlyn Wilde, Jens Mache & Richard Weiss, Lewis & Clark College
YouTube iconslides iconRafal Kolanski
13:15 - 13:45TalkCASE overview: Cyber Assured Systems Engineering
Darren Cofer
, - Collins Aerospace
YouTube iconslides icon
13:45 - 14:15TalkA verified architecture for trustworthy remote attestation
Grant Jurgensen
, - The University of Kansas
slides icon
Break
14:45 - 15:05Experience reportFerrOS: Rust-y unikernels on seL4 w/ compile-time assurances
Zack Pierce
, - Auxon
YouTube iconslides iconKent McLeod
15:05 - 15:25Experience reportMake seL4 an ASIL-D certified system
Yuning Liang
, - Xcalibyte
YouTube iconslides icon
15:25 - 15:45Experience reportseL4 Summit and TCCOE - an overview -
Renato Levy, Jason Li & Ray Richards, - TCCOE -
YouTube iconslides icon
15:45 - 17:00Panel & DiscussionFunding agencies: priorities and vision -
- William “Brad” Martin, DARPA -
- Paul Waller, NCSC -
- Sebastian Jester, Cyberagentur -
- Dr. Shreekant (Ticky) Thakkar, TII
YouTube icon -
slides icon
-

-
slides icon
-
-
slides icon
-
-
Gernot Heiser
Day 3 12 October 2022
Session chair
9:00 - 9:45PlenaryOverview: seL4 principles, abstractions and use
Gernot Heiser
, - seL4 Foundation
YouTube iconslides iconMatt Brecknell
9:45 - 10:00PlenaryOverview: what's verified, what's not, and what does it mean?
June Andronick
, - seL4 Foundation
YouTube iconslides icon
10:00 - 10:45PlenaryThe seL4 GitHub test suite
Gerwin Klein
, - Proofcraft
YouTube iconslides icon
Break
11:00 - 11:15AnnouncementsDiscussion teaser and suggestions for Birds of a FeatherAnna Lyons
11:15 - 12:00Room 1:
Talk & Discussion
seL4 mainlining: experiences, challenges, and solutions
Robbie VanVossen & Chris Guikema
, - DornerWorks
YouTube iconslides iconAnna Lyons
Room 2:
BoF
Birds of a Feather on a topic to be suggested
Break
12:45 - 13:30Room 1:
Talk & Discussion
seL4 microkernel for virtualization use-cases “The importance of a standard VMM”
Everton de Matos
& Jason Sebranek, TII+Cog
YouTube iconslides iconRoom 1:
Axel Heider

Room 2:
self-organised
Room 2:
BoF
Birds of a Feather on a topic to be suggested
13:30 - 14:15Room 1:
Talk & Discussion
Improving embedded DevOps with seL4 VMM
Robbie VanVossen
, - DornerWorks
YouTube iconslides icon
Room 2:
BoF
Birds of a Feather on a topic to be suggested
14:15 - 15:00Room 1:
Talk & Discussion
Experience teaching seL4
Sebastian Eckl
, - HENSOLDT Cyber
YouTube iconslides icon
Room 2:
BoF
Birds of a Feather on a topic to be suggested
Break
15:15 - 16:00PlenaryBoFs report backGernot Heiser
16:00 - 16:15AnnouncementsBootcamp overviewGernot Heiser
16:15 - 16:30TeaserDornerWorks’ VM Composer
Robbie VanVossen
, - DornerWorks
YouTube iconslides iconGernot Heiser
16:30 - 16:45PlenaryseL4 Foundation: overview, update and vision
June Andronick
, - seL4 Foundation
YouTube iconslides icon
16:45 - 17:00AnnouncementsConcluding remarksYouTube iconDarren Cofer,
June Andronick
& Gernot Heiser
Day 4 (Bootcamp, on-site participants only) 13 October 2022
9:00 - 10:00BootcampseL4: from zero to hello world
- Ihor Kuz
, - Kry10
Axel Heider
Break
10:15 - 10:45BootcampCAmkES
Sebastian Eckl,
- HENSOLDT Cyber
Axel Heider
10:45 - 12:00BootcampTRENTOS
Sebastian Eckl
, - HENSOLDT Cyber
Axel Heider
Break
13:00 - 14:30BootcampThe seL4 Core Platform (seL4CP)
Ivan Velickovic
& Peter Chubb, UNSW
Axel Heider
14:30 - 15:15BootcampDornerWorks’ VM Composer: the easy button for virtualized seL4-based systems
Chris Guikema & Robbie VanVossen
, - Dornerworks
Axel Heider
Break
15:30 - 17:00BootcampBriefCASE tutorial
Isaac Amundson & Darren Cofer
, - Collins Aerospace
Axel Heider
17:00 - 17:05PlenaryConcluding remarksJune Andronick
& Darren Cofer
-

- -

-
Acknowledgement:
-Slide icons create by Syahrul Hidayatullah - Flaticon -

-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2022/seL4-Summit_Useful-Info.pdf b/PR_400/Foundation/Summit/2022/seL4-Summit_Useful-Info.pdf deleted file mode 100755 index 726bc508..00000000 Binary files a/PR_400/Foundation/Summit/2022/seL4-Summit_Useful-Info.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d1_01_Welcome_June_Andronick.pdf b/PR_400/Foundation/Summit/2022/slides/d1_01_Welcome_June_Andronick.pdf deleted file mode 100755 index 831bd404..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d1_01_Welcome_June_Andronick.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d1_02_State_of_seL4-related_research_Gernot_Heiser.pdf b/PR_400/Foundation/Summit/2022/slides/d1_02_State_of_seL4-related_research_Gernot_Heiser.pdf deleted file mode 100755 index 2490a5cf..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d1_02_State_of_seL4-related_research_Gernot_Heiser.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d1_03_seL4_verification-roadmap_Proofcraft.pdf b/PR_400/Foundation/Summit/2022/slides/d1_03_seL4_verification-roadmap_Proofcraft.pdf deleted file mode 100755 index ab45bb73..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d1_03_seL4_verification-roadmap_Proofcraft.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d1_04_Explaining_the_seL4_integrity_theorems_Matt_Brecknell.pdf b/PR_400/Foundation/Summit/2022/slides/d1_04_Explaining_the_seL4_integrity_theorems_Matt_Brecknell.pdf deleted file mode 100755 index 9b55fcab..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d1_04_Explaining_the_seL4_integrity_theorems_Matt_Brecknell.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d1_05_The_seL4_Core_Platform_(seL4CP)_Zoltan_Kocsis.pdf b/PR_400/Foundation/Summit/2022/slides/d1_05_The_seL4_Core_Platform_(seL4CP)_Zoltan_Kocsis.pdf deleted file mode 100755 index 0ab9d539..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d1_05_The_seL4_Core_Platform_(seL4CP)_Zoltan_Kocsis.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d1_06_The_seL4_Device_Driver_Framework_(sDDF)_Lucy_Parker.pdf b/PR_400/Foundation/Summit/2022/slides/d1_06_The_seL4_Device_Driver_Framework_(sDDF)_Lucy_Parker.pdf deleted file mode 100755 index e2b93524..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d1_06_The_seL4_Device_Driver_Framework_(sDDF)_Lucy_Parker.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d1_07_Multiprocessing_on_seL4_with_verified_kernels_Kent_Mcleod.pdf b/PR_400/Foundation/Summit/2022/slides/d1_07_Multiprocessing_on_seL4_with_verified_kernels_Kent_Mcleod.pdf deleted file mode 100755 index e293e67d..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d1_07_Multiprocessing_on_seL4_with_verified_kernels_Kent_Mcleod.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d1_08_Using_QEMU_to_extend_seL4_VirtIO_support_Hannu_Lyytinen.pdf b/PR_400/Foundation/Summit/2022/slides/d1_08_Using_QEMU_to_extend_seL4_VirtIO_support_Hannu_Lyytinen.pdf deleted file mode 100755 index c3c61ca5..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d1_08_Using_QEMU_to_extend_seL4_VirtIO_support_Hannu_Lyytinen.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d1_09_QEMU_as_prototyping_platform_for_seL4_systems_Axel_Heider.pdf b/PR_400/Foundation/Summit/2022/slides/d1_09_QEMU_as_prototyping_platform_for_seL4_systems_Axel_Heider.pdf deleted file mode 100755 index 2003a262..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d1_09_QEMU_as_prototyping_platform_for_seL4_systems_Axel_Heider.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d1_10_Porting_U-Boot_drivers_to_seL4_Mark_Jenkinson_&_Stephen_Williams.pdf b/PR_400/Foundation/Summit/2022/slides/d1_10_Porting_U-Boot_drivers_to_seL4_Mark_Jenkinson_&_Stephen_Williams.pdf deleted file mode 100755 index 33790129..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d1_10_Porting_U-Boot_drivers_to_seL4_Mark_Jenkinson_&_Stephen_Williams.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d1_11_fence.t_hardware_support_for_preventing_microarchitectural_timing_channels_Nils_Wistoff.pdf b/PR_400/Foundation/Summit/2022/slides/d1_11_fence.t_hardware_support_for_preventing_microarchitectural_timing_channels_Nils_Wistoff.pdf deleted file mode 100755 index a0d6e3d8..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d1_11_fence.t_hardware_support_for_preventing_microarchitectural_timing_channels_Nils_Wistoff.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_01_Kry10_Secure_Platform_Boyd_Multerer.pdf b/PR_400/Foundation/Summit/2022/slides/d2_01_Kry10_Secure_Platform_Boyd_Multerer.pdf deleted file mode 100755 index 6d01e5c5..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_01_Kry10_Secure_Platform_Boyd_Multerer.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_02_Foundation_announcements.pdf b/PR_400/Foundation/Summit/2022/slides/d2_02_Foundation_announcements.pdf deleted file mode 100755 index 2b73399e..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_02_Foundation_announcements.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_03_seL4_and_BEAM_a_match_made_in_Erlang_Ihor.pdf b/PR_400/Foundation/Summit/2022/slides/d2_03_seL4_and_BEAM_a_match_made_in_Erlang_Ihor.pdf deleted file mode 100755 index 24243be1..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_03_seL4_and_BEAM_a_match_made_in_Erlang_Ihor.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_04_Trustworthy_board_management_controllers_Daniel_Schwyn,_Ben_Fiedler.pdf b/PR_400/Foundation/Summit/2022/slides/d2_04_Trustworthy_board_management_controllers_Daniel_Schwyn,_Ben_Fiedler.pdf deleted file mode 100755 index bb6dc611..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_04_Trustworthy_board_management_controllers_Daniel_Schwyn,_Ben_Fiedler.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_05_Rust_support_in_seL4_userspace_present_and_future_Nick_Spinale.pdf b/PR_400/Foundation/Summit/2022/slides/d2_05_Rust_support_in_seL4_userspace_present_and_future_Nick_Spinale.pdf deleted file mode 100755 index bcf87511..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_05_Rust_support_in_seL4_userspace_present_and_future_Nick_Spinale.pdf and /dev/null differ diff --git "a/PR_400/Foundation/Summit/2022/slides/d2_06_Early_experiences_proving_the_correctness_of_a_network_stack_implementation_Alain_K\303\244gi.pdf" "b/PR_400/Foundation/Summit/2022/slides/d2_06_Early_experiences_proving_the_correctness_of_a_network_stack_implementation_Alain_K\303\244gi.pdf" deleted file mode 100755 index 1c29bb12..00000000 Binary files "a/PR_400/Foundation/Summit/2022/slides/d2_06_Early_experiences_proving_the_correctness_of_a_network_stack_implementation_Alain_K\303\244gi.pdf" and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_07_CASE_overview_Cyber_Assured_Systems_Engineering_Darren_Cofer.pdf b/PR_400/Foundation/Summit/2022/slides/d2_07_CASE_overview_Cyber_Assured_Systems_Engineering_Darren_Cofer.pdf deleted file mode 100755 index 676e21cb..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_07_CASE_overview_Cyber_Assured_Systems_Engineering_Darren_Cofer.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_08_A_verified_architecture_for_trustworthy_remote_attestation_Grant_Jurgenson.pdf b/PR_400/Foundation/Summit/2022/slides/d2_08_A_verified_architecture_for_trustworthy_remote_attestation_Grant_Jurgenson.pdf deleted file mode 100755 index 204bce9c..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_08_A_verified_architecture_for_trustworthy_remote_attestation_Grant_Jurgenson.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_09_FerrOS_Rust-y_unikernels_on_seL4_w_compile-time_assurances_Zack_Pierce.pdf b/PR_400/Foundation/Summit/2022/slides/d2_09_FerrOS_Rust-y_unikernels_on_seL4_w_compile-time_assurances_Zack_Pierce.pdf deleted file mode 100755 index 89cba0ab..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_09_FerrOS_Rust-y_unikernels_on_seL4_w_compile-time_assurances_Zack_Pierce.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_10_Make_seL4_an_ASIL-D_certified_system_Yuning_Liang.pdf b/PR_400/Foundation/Summit/2022/slides/d2_10_Make_seL4_an_ASIL-D_certified_system_Yuning_Liang.pdf deleted file mode 100755 index 4e08b27a..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_10_Make_seL4_an_ASIL-D_certified_system_Yuning_Liang.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_11_seL4_Summit_and_TCCOE_-_an_overview_Renato_Levy.pdf b/PR_400/Foundation/Summit/2022/slides/d2_11_seL4_Summit_and_TCCOE_-_an_overview_Renato_Levy.pdf deleted file mode 100755 index 6002a06e..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_11_seL4_Summit_and_TCCOE_-_an_overview_Renato_Levy.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_01_Sebastian_Jester.pdf b/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_01_Sebastian_Jester.pdf deleted file mode 100755 index 3feeefd9..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_01_Sebastian_Jester.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_03_Brad_Martin.pdf b/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_03_Brad_Martin.pdf deleted file mode 100755 index 4e433201..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_03_Brad_Martin.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_04_Shreekant_Thakkar.pdf b/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_04_Shreekant_Thakkar.pdf deleted file mode 100755 index 0a4d92f8..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_04_Shreekant_Thakkar.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d3_01_Overview_seL4_principles,_abstractions_and_use_Gernot_Heiser.pdf b/PR_400/Foundation/Summit/2022/slides/d3_01_Overview_seL4_principles,_abstractions_and_use_Gernot_Heiser.pdf deleted file mode 100755 index b787dcb7..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d3_01_Overview_seL4_principles,_abstractions_and_use_Gernot_Heiser.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d3_02_Overview_what's_verified,_what's_not,_and_what_does_it_mean_June_Andronick.pdf b/PR_400/Foundation/Summit/2022/slides/d3_02_Overview_what's_verified,_what's_not,_and_what_does_it_mean_June_Andronick.pdf deleted file mode 100755 index 5bf839ca..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d3_02_Overview_what's_verified,_what's_not,_and_what_does_it_mean_June_Andronick.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d3_03_The_seL4_GitHub_test_suite_Gerwin_Klein.pdf b/PR_400/Foundation/Summit/2022/slides/d3_03_The_seL4_GitHub_test_suite_Gerwin_Klein.pdf deleted file mode 100755 index 0591af36..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d3_03_The_seL4_GitHub_test_suite_Gerwin_Klein.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d3_04_seL4_mainlining_experiences,_challenges,_and_solutions_Robbie.pdf b/PR_400/Foundation/Summit/2022/slides/d3_04_seL4_mainlining_experiences,_challenges,_and_solutions_Robbie.pdf deleted file mode 100755 index 5c280786..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d3_04_seL4_mainlining_experiences,_challenges,_and_solutions_Robbie.pdf and /dev/null differ diff --git "a/PR_400/Foundation/Summit/2022/slides/d3_05_seL4_microkernel_for_virtualization_use-cases_\342\200\234The_importance_of_a_standard_VMM\342\200\235.pdf" "b/PR_400/Foundation/Summit/2022/slides/d3_05_seL4_microkernel_for_virtualization_use-cases_\342\200\234The_importance_of_a_standard_VMM\342\200\235.pdf" deleted file mode 100755 index 9bcf5263..00000000 Binary files "a/PR_400/Foundation/Summit/2022/slides/d3_05_seL4_microkernel_for_virtualization_use-cases_\342\200\234The_importance_of_a_standard_VMM\342\200\235.pdf" and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d3_06_Improving_embedded_DevOps_with_seL4_VMM.pdf b/PR_400/Foundation/Summit/2022/slides/d3_06_Improving_embedded_DevOps_with_seL4_VMM.pdf deleted file mode 100755 index ddd09758..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d3_06_Improving_embedded_DevOps_with_seL4_VMM.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d3_07_Experience_teaching_seL4.pdf b/PR_400/Foundation/Summit/2022/slides/d3_07_Experience_teaching_seL4.pdf deleted file mode 100755 index 42ad392e..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d3_07_Experience_teaching_seL4.pdf and /dev/null differ diff --git "a/PR_400/Foundation/Summit/2022/slides/d3_08_DornerWorks\342\200\231_VM_Composer.pdf" "b/PR_400/Foundation/Summit/2022/slides/d3_08_DornerWorks\342\200\231_VM_Composer.pdf" deleted file mode 100755 index faf6d127..00000000 Binary files "a/PR_400/Foundation/Summit/2022/slides/d3_08_DornerWorks\342\200\231_VM_Composer.pdf" and /dev/null differ diff --git a/PR_400/Foundation/Summit/2022/slides/d3_09_seL4_Foundation_overview,_update_and_vision.pdf b/PR_400/Foundation/Summit/2022/slides/d3_09_seL4_Foundation_overview,_update_and_vision.pdf deleted file mode 100755 index 0bd0f288..00000000 Binary files a/PR_400/Foundation/Summit/2022/slides/d3_09_seL4_Foundation_overview,_update_and_vision.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/abstracts2023.html b/PR_400/Foundation/Summit/2023/abstracts2023.html deleted file mode 100644 index cfab7251..00000000 --- a/PR_400/Foundation/Summit/2023/abstracts2023.html +++ /dev/null @@ -1,1151 +0,0 @@ - - - - - - Summit abstracts | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2023 -

-

- Minneapolis, USA -

-

- 19 - 21 September 2023 -

- - -

- Abstracts -

-
- -

- Scoping assurance activities with seL4 -

-

- Keynote -

-

- Presented by Gage B, NCSC -

-

-In both the safety and security industries, high levels of product assurance are sought to mitigate the risk of product failure. Often this means that software developers need to demonstrate that all functions do what they are supposed to do, the product does not do anything it is not supposed to do, and that the product is free from all known bugs and vulnerabilities. -

-

-Whilst none of these requirements have trivial solutions, testing does a reasonable job of checking the correctness of functions. Similarly, taking advantage of tooling (such as static analysis, dynamic analysis), tracking the discovery of bugs and vulnerabilities, and having a refined software patching process helps to mitigate the presence of bugs and vulnerabilities. However, it is much less obvious how one can gain confidence that the software has no unintended functionality without checking the entire software implementation. Even then, the scope of what you need to check is potentially unbounded (we’re looking for the unknown unknowns after all), issues will still be missed, and the resource requirements are high. -

-

-In this talk, I will describe how basing a software product on seL4 facilitates the scoping of this no unintended functionality problem, and in turn, reduces the amount of effort required when it comes to demonstrating assurance of a security product. By walking through an example, we’ll observe the assurance benefits of component isolation, data flow control, how seL4 helps to direct where we should focus our assurance efforts, and any caveats we should be aware of. -

-

-Accepting that the assurance effort should be commensurate with the criticality of the security product, my hope is that this presentation provides a sliding scale of seL4 features we should seek to take advantage of, be it for articulating an assurance case, or conducting an independent assessment. -

-slides icon -
See this talk in the program
- -
- -

- Dynamic seL4 based systems: designing for verifiability -

-

- Talk -

-

- Presented by Matthew Brecknell, Kry10 -

-

- The current state of the art in seL4-based system design is to statically partition system resources into unprivileged components. Components may synchronise and communicate with each other, but otherwise only have rights to their own resources. For such static systems, the seL4 security theorems guarantee that seL4 correctly enforces access controls, and does not allow any component to gain new rights. The main benefit of this approach is that it automatically gives strong guarantees about component isolation, without further verification effort, and these can be used to support arguments about fault tolerance and security. -

-

-However, some things are not possible in static systems. For Kry10, over-the-air software and configuration updates are important. Updates should minimise disruption to the system, and may therefore need to co-ordinate with running components. For example, a server may gain new clients, and an allocation of extra memory it can use to serve them. -

-

-Support for dynamic features like updates adds significant complexity. Dynamic systems must include some privileged components that retain authority to resources used by other components, so isolation guarantees are no longer free. Privileged components should be verified, so we need a way to reason about user-level components, and their interactions with each other and the kernel. -

-

-This talk will report on our initial work on this challenge. We'll discuss our approach to system design, which uses a strict hierarchy of control to ensure that supervisors have complete oversight of their subsystems, and can enforce protocols for resource delegation and revocation. We'll look at our work-in-progress supervisor API design, whose distinguishing feature is the ability to apply complex configuration updates with all-or-nothing semantics. And finally, we'll speculate on how we might eventually back this up with formal guarantees. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Formally Stepping Into The Unverified World -

-

- Talk -

-

- Presented by Sandy Frost, Los Alamos National Laboratory -

-

-With the rise in high profile attacks against safety and security critical systems, formal methods are being considered as a defensive option across many domains, such as with critical infrastructure, since they can prove that software behaves exactly according to specification, therefore minimizing software vulnerabilities. Unfortunately, there has been slow adoption of this technology due to technical (e.g., performance limitation of verification tools) and non-technical (e.g., unfamiliarity with concepts, difficult to implement) reasons. We propose an analysis of the interface between formally (checking software against specifications) and non-formally verified components, to better understand the impacts to system robustness. This work has the potential to be transformational by enabling wider adoption of this defensive measure. -

-

-We are analyzing system interaction impacts between components that are formally verified and those that are not using a e.g., seL4-provided channel with approved access control. The seL4 microkernel, which is the minimal core of an operating system provides strong isolation. To allow communication between components, seL4 must enable fine-grained access control, which is an explicitly enabled communication channel for a desired operation. -

-

-This talk is relevant to the seL4 scope because it covers an seL4 experience report relevant to developing capabilities toward “building a business case for using a verified kernel”. In order to use a verified kernel, especially with critical components, it is important to know its potential limitations and special considerations, therefore exploring the kernel’s interactions with components that might not be verified is paramount. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Reducing the reliance on verification experts for seL4 proofs -

-

- Talk -

-

- Presented by Gerwin Klein, Proofcraft -

-

- The seL4 microkernel is the world’s most highly assured OS kernel. Keeping this claim true is hard work. The formal verification journey of the seL4 microkernel is nearing two decades, and still has a busy roadmap for the years ahead. It started as a research project aiming for a highly challenging problem with the potential of significant impact. Today, the seL4 proofs represent more than a million lines of formal proofs that have been continuously maintained over a system that has evolved considerably, with significant new features being added in response to increased interest and adoption from numerous sectors. -

-

- This unique maintenance of a formally verified, evolving software system is one of the largest examples in the emerging discipline of proof engineering: the art of systematic treatment, management and estimation of large-scale proofs. Proofcraft is constantly developing and refining proof engineering techniques to manage what is probably the world’s largest continually maintained formal proof artefact. -

-

- Importantly, and perhaps paradoxically, proof engineering aims at reducing the reliance - on verification experts, in this case through techniques improving the genericity and automation of the seL4 proofs. - - In this talk we will present the challenges one encounters while maintaining such a large proof base, along with some of Proofcraft’s existing and planned techniques to make seL4 proofs more agile and friendly to change, more robust against predictable change, and less dependent on experts for updates. -

-

- For instance, the current seL4 invariant proofs are split into a generic architecture- independent part and an architecture-dependent part. This allows significantly speed up in development of proofs for new features, as well as reduction of the proof update bur- den on code changes. We plan to improve this architecture split and apply it to other large proof artefacts in seL4. Another example is our plan to almost completely automate the verification of platform ports within existing verified architectures of the seL4 kernel. Currently, porting seL4 to a new platform involves determining which architecture the platform runs on, for instance Arm v7, Intel x64, or RISC-V 64, determining which devices are included, at which memory addresses they reside, etc. These lead to configuration parameters for the kernel and the definition of a set of constants. Instead of requiring the involvement of experts, we can develop proof automation that shows these interface relationships are satisfied by a concrete platform configuration, greatly reducing the verification overhead of porting to a new platform. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-More multiprocessing on seL4: Are efficient SMP virtual machines possible on verifiable seL4 kernels? -

-

- Talk -

-

- Presented by Kent McLeod, Kry10 -

-

-Multicore systems with verified seL4 is just around the corner with multikernels - kernel state is isolated on each core and avoid kernel-mode concurrency for easier verification. Does this mean that it's not possible to support multicore at user level? Let's find out by investigating whether it's possible to efficiently support virtualizing SMP virtual machines -with small core counts using our multikernel mechanisms. -

-

-This talk will detail how to construct such a system, the work involved and examples of how it can be used. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-System Information Flow Analysis -

-

- Talk -

-

- Presented by Ihor Kuz, Kry10 -

-

-Most seL4 systems are multi-server systems - consisting of numerous user-level components that communicate amongst each other. These systems often rely on isolation and restricted communication between components to provide assurance about security and safety properties while minimising the trust put into individual components. For such assurance it is usually necessary to analyse the information and control flow in the systems in order to get an understanding of the isolation (or protection) domains and how the system could behave at runtime. This is something that we are interested in doing for the seL4-based Kry10 OS as well. -

-

-There has been past work looking at analysing static seL4-based systems for various information flow properties, but Kry10 OS is a more dynamic system. This presentation will discuss the problem space of analysing information and control flow in multi-server systems and present options and solutions (both formal and informal) for doing this for static and dynamic seL4-based systems. We will also discuss how such analyses contribute to overall system assurance cases and how they relate to kernel and user-level component proofs. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Advancements for Virtualization Support in seL4:CAmkES and seL4cp -

-

- Talk -

-

- Presented by Markku Ahvenjärvi, TII -

-

-Virtualization enables multiple virtual machines (VMs) to operate on a single physical machine, each with its own operating system, applications, and data, while sharing the underlying physical resources of the host machine. seL4 is a microkernel-based operating system that provides a high-assurance, secure, and efficient platform for the deployment of critical systems. It can be utilized as a hypervisor, providing a minimal and scalable infrastructure for virtualized environments, making it well-suited for use in embedded and real-time systems and high-assurance security-critical systems that require virtualization. -

-

-Our previous talk at the seL4 Summit 2022 presented our architecture on VirtIO-based Virtualization with seL4 Hypervisor and QEMU. We demonstrated how our approach provides VirtIO standard support to devices on top of the seL4 hypervisor using QEMU to provide the VirtIO device backends for the guest VMs. Our approach offered support for practically all VirtIO-device backends with a minimal amount of source code, providing accelerated graphics and proper file system support. -

-

-In this talk at the seL4 Summit 2023, we will show the evolution of our architecture compared to the one presented last year, as well as current efforts that we have been working on regarding virtualization support. We aim to discuss the adaptation and integration of our "VirtIO backend" implementation work from the CAmkES environment to the seL4 Core Platform (seL4cp). We will emphasize how the underlying concepts and principles are orthogonal to the choice between CAmkES and seL4cp, demonstrating the seamless transition of key elements such as CAmkES dataports to seL4cp shared memory regions. Our objective is to showcase the versatility and applicability of this virtualization approach, highlighting its value for rapid prototyping in both CAmkES and seL4cp environments. By presenting our work in this manner, we aim to encourage the adoption of this robust virtualization solution, empowering developers to efficiently prototype and deploy secure embedded systems, irrespective of their chosen -platform. -

-

-Our approach provides a flexible and scalable solution for critical systems, addressing the limitations of existing solutions while building on the foundation of our previous work. Our talk will provide an overview of the implementation details, performance improvements, and future directions for the technology, highlighting the benefits of using the seL4 hypervisor for virtualized environments. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-The seL4 Device Driver Framework -

-

- Talk -

-

- Presented by Lucy Parker, UNSW -

-

-A lack of a good approach to I/O is one of the primary barriers to uptake for seL4. Unfortunately, there’s a distinct lack of guidance, along with too many poor performing solutions that don’t make good use of seL4. We believe a thoughtful design can, and should, demonstrate performance competitive with Linux. We present such a design in the seL4 Device Driver framework (sDDF). Its simple design prioritises a strong separation of concerns by using multiple isolated components, each with a single task in the pipeline, that communicate via a low-overhead, asynchronous transport layer. It’s presently focused on networking systems, and comparison against Linux already shows that simplicity wins. This talk will revisit the design of the sDDF, and discuss ongoing work to further evaluate and optimise the framework for device sharing. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-R&D Update from TS -

-

- Talk -

-

- Presented by Gernot Heiser, UNSW -

-

-I will given an overview of seL4-related research and development at Trustworthy Systems. -

-

-At the core of our present work is the design and implementation of a new OS personality for IoT/embedded/cyberphysical systems that is based on the KISS principle – keep it simple, stupid! We take simplicity to the extreme, with fine-grained modularity driven by strict separation of concerns, resulting in extremely simple modules, most just comprising a few hundred lines of code. This is possible by abandoning the 1980's model of an OS, implemented by almost all contemporary OS designs, that strives to provide general (and thus inherently complex) policies. Our approach is the opposite: extremely use-case-specific policies, that are simple to implement, and trivial to replace. Our experience with networking (see the preceding talk by Lucy) shows that this approach is not only feasible, it can also be highly performant. -

-

-Highly aligned to the above is our work on the use of push-button verification of OS components. We have demonstrated that we can verify the implementation of the seL4 Core Platform this way: Once a suitable specification is created, the SMT solver provides the proof without further manual action. We have furthermore created an automated translation-validation toolchain, using a similar apporach as for the binary verification of seL4, that proves the correctness of a mapping of the seL4CP system specification (SDF) to the CapDL formalism that describes low-level access rights in an seL4 system (and that can produce a verified system initialiser). -

-

-Our experience with verifying seL4CP makes us confident that we can verify (at least) core components of our new KISS-based OS using the same push-button approach. This creates the exciting prospect that in the near future we will have an OS that is not only easy to use, yet high performant, but also at least partially verified. -

-

-Our third major activity is Pancake, our new systems language aimed at easing verification of OS components, especially device drivers. Pancake has a verified compiler, meaning that correctness proofs can be based on the semantics of Pancake rather than dealing with the complexities of C. We have already used Pancake to implement some components of the networking system, although significant work remains to be done. -

-

-I will finally give an update on our work on verified Time Protection, the principled prevention of microarchitectural timing channels, as wel as the SMOS project, which is designing a fully dynamic, general-purpose OS that can be proved to enforce a security policy. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-seL4: Experiences, Improvements and Optimizations -

-

- Talk -

-

- Presented by Chris Guikema, DornerWorks -

-

-Sandboxing legacy code provides a low barrier approach for developers to start implementing systems in the seL4 ecosystem. However, these legacy applications often need to communicate with each other to function properly. seL4 provides a means of communication between virtual machines via a software implementation of an ethernet device called virtio-net, which currently suffers from performance and stability problems. These performance and stability issues present a barrier to adoption of seL4 for multiple markets. DornerWorks will present an overview of the seL4 virtio-net implementation, the challenges using it, how DornerWorks improved it in the mainline, and performance benchmarks which include our IP solution to increase performance by a factor of 40. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-From Zero to a Native xHCl Driver -

-

- Talk -

-

- Presented by Josh Felmeden, Capgemini Engineering -

-

-At the 2022 seL4 summit, our colleagues presented a framework allowing u-boot drivers to be used in seL4. This submission presents follow on work, with the goal of improving seL4 USB support. Specifically, by writing a native xHCI driver and stack for use in seL4. -

-

-We use the Avnet MaaXBoard as our development board although our intention is to make the driver easily portable to other platforms. Our approach has been to port an existing xHCI USB stack from the NetBSD operating system into the Microkit framework, changing as little code as possible. -

-

-We also present an experience report detailing our development with seL4 as a team who had no prior experience with it. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-Crashing For Reliability -

-

- Talk -

-

- Presented by Ihor Kuz, Kry10 -

-

-A reliable OS needs to make sure that it, and the software that runs on it, keeps running and is always available. -

-

-Ideally software would never fail, so reliability would be easy. But even if your software is perfect, there are always hardware problems, or problems when interacting with other software. Also software isn’t perfect (even if it’s formally verified) so we have to deal with inevitable failure. -

-

-One approach to dealing with failure is to let software crash, but monitor it and restart it when it does crash. This allows the system to control (and importantly - recover from) the failures. Erlang OTP-based systems take this approach, and it has worked extremely well for building highly reliable long-running systems. -

-

-We’ve applied this “let it crash” approach in the sel4-based Kry10 OS. In this presentation we will dive into our use of this approach, describe the challenges of applying it in Kry10 OS (such as resource recovery, dependency managements, re-initialisation of resources, etc), explain why seL4 provides all the right features for applying this approach at the system level, and give examples of how it helps to achieve reliability. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-Building a Platform for Critical Devices in the “Real World” -

-

- Gold Sponsor Talk -

-

- Presented by Boyd Multerer, Kry10 -

-

-Boyd Multerer, Founder and CEO of Kry10 will talk about the role of seL4 as a one of the critical ingredients for addressing the “real world” requirements and high level of assurance required by their critical systems. Boyd will talk about the importance of the continued innovation around seL4 and the additional platform services platform work Kry10 is doing to need to deliver addition of seL4 and the new work underway as a key ingredient to any broader platform for critical systems and the importance of new investments done and the critical role that seL4 plays as Boyd will emphasize role of seL4 and the Kry10 Platform. Hear about the design principles of the KRy10 Platform Kry10 Platform that caters to the real-world demands of critical systems. Don't miss this opportunity to learn about the exciting advancements in seL4 and the Kry10 Platform and its potential to support the real-world challenges faced by critical systems. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-CantripOS: An OS for Ambient ML Applications -

-

- Keynote -

-

- Presented by Sam Leffler, Google -

-

-CantripOS is an open source operating system purpose-built to run ML workloads for embedded systems. It is being developed as part of Google’s project Sparrow, whose charter is to build a low-power embedded platform for ML applications with a focus on security and privacy. CantripOS is built in the Rust programming language1, runs under the seL4 microkernel2, and uses a modified CAmkES framework3. This allows CantripOS to run dynamically loaded applications in a controlled sandbox, while still retaining the benefits of a statically designed system. This paper describes the system design, modifications made to seL4 and CAmkES, and future directions. All the work described here is publicly available on GitHub4. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-Magnetite: Rust-Based OS Services for seL4 -

-

- Talk -

-

- Presented by Juliana Furgala, MIT Lincoln Laboratory -

-

-What if the isolation that seL4 provides could be applied at a fine-grained level to individual processes? Frequently seL4 is used as a hypervisor but at MIT Lincoln Laboratory, we explored the potential of seL4 as a foundational block in a new security-focused operating system. Magnetite is a suite of performant, secure-by-design, real-time OS services built upon the formally-verified microkernel seL4 and written in Rust, a memory-safe language. Magnetite offers a feature-rich API for both legacy C and new Rust applications to engage with its variety of resource types, which extend seL4’s capability-based system to provide common OS services. Magnetite is built upon the Principle of Least Privilege (PoLP) to limit trust and time of trust, and also adheres to strong isolation properties with self-contained processes and system services, and isolated domains known as silos. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Showcase: Microkernel OS, TPMs, and WASM in Ilo T Environments -

-

- Talk -

-

- Presented by Sid Hussmann, Gapfruit -

-

-This talk will demonstrate how Gapfruit OS [0], an operating system built with the Genode Framework [1], can be deployed for edge computing in industrial IoT environments. Genode is an operating system framework that supports seL4. -

-

-When it comes to systems engineering, we live in exciting times. On the one hand, we have projects, such as seL4 and Genode, that push the boundaries for a solid computing foundation from the bottom up. On the other hand, Zero-Trust principles move the industry to combine public-key infrastructures with TPM-backed device identities. Third, we can witness a trend from the cloud natives that tries to free us from much of the complex legacy code bases on the application layer with new runtimes such as WebAssembly/WASI. -

-

-I present Gapfruit's journey of deploying WASM code to a microkernel OS with capability-based security. I will explain how we chose the Genode Framework for our products and how we utilize it to port libraries such as tpm2-tss [2] and WasmEdge [3]. -

-

-I will then showcase a live demo demonstrating the zero-touch provisioning capabilities of an IoT gateway running Gapfruit OS. The demo will show how the device boots and connects to its digital twin on Azure [4] with TPM-backed credentials and how the desired-state configuration of its digital twin triggers the deployment of a WebAssembly application with WasmEdge to the device. -

-

-[0] https://gapfruit.com -

-

-[1] https://github.com/genodelabs/genode -

-

-[2] https://github.com/tpm2-software/tpm2-tss -

-

-[3] https://github.com/WasmEdge/WasmEdge -

-

-[4] https://azure.microsoft.com/en-us/products/iot-hub -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-Rust support in seL4 userspace: update and roadmap -

-

- Talk -

-

- Presented by Nick Spinale, Colias Group -

-

-The Rust programming language and ecosystem provide memory safety and enhance developer productivity even at lower levels of the software stack. This talk outlines our efforts, funded by the seL4 Foundation, to apply Rust to seL4 userspace and facilitate its use in the seL4 software ecosystem. This talk will cover new bodies of Rust code related to libsel4, the seL4 Core Platform, and CapDL; information about how to integrate, extend, and contribute to this work; and our vision and roadmap moving forward. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-The seL4 Microkit -

-

- Talk -

-

- Presented by Ivan Velickovic, UNSW -

-

-The seL4 Microkit is an operating system framework on top of seL4 that aims to provide minimal abstractions to make it easier to build statically structured systems on seL4, while still leveraging the kernel’s benefits of security and performance. Since the 2022 seL4 Summit, seL4CP has become more mature and is seeing wider use. At Trustworthy Systems, seL4CP is the basis of much of our work, including the seL4 Device Driver Framework and other OS services such as a virtual machine monitor. The goal of this talk is to give you an understanding of seL4CP and surrounding developments by covering three topics: -

-
    -
  • An introduction to seL4CP and its concepts, and how they map onto seL4 primitives. -
  • How the seL4CP has progressed over the past year and how it can now be used to create more complex systems. -
  • An update on the verification story of seL4CP, which includes the functional correctness of the seL4CP library and runtime code as well as the verified mapping from seL4CP system description to CapDL. -
-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Leveraging Rust for Core Platform -

-

- Talk -

-

- Presented by Ben Hamlin, Galois -

-

-A natural way to perform hardware abstraction in SeL4 is to create a dedicated driver component. Writing such hardware driver components in SeL4 Core Platform for Rust is currently a manual process. Assuming a Rust library to perform register manipulation, etc. already exists (say, as an implementation of embedded-hal traits), it is still necessary to: -

-

-1. Design an RPC protocol that clients will use to access the hardware driver; -

-

-2. Implement the driver-side protocol; -

-

-3. Implement the client-side protocol, adapting any libraries already written to interface with the hardware drivers to use this RPC protocol instead. -

-

-This talk describes a way to use traits from HAL crates, such as embedded-hal to make the code implementing these protocols easily reusable. As an added benefit our approach allows code reuse in two more ways: Existing implementations of HAL traits for specific hardware can be turned into dedicated Core Platform components with a minimum of additional boilerplate; and hardware-agnostic libraries written on top of embedded-hal traits can be used in client components without writing adapters. -This approach is suitable for interactions with a networking stack (smoltcp) and other devices such as UART, and can be extended to other peripherals (timers, SPI, I2C). Our approach should make running Core Platform on various devices more straightforward. -

-

-We will present conclusions and examples developed as part of this work. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- OS on seL4: so many options!
-

-

- Panel -

-

-
-Gernot Heiser, Leader, Trustworthy Systems at UNSW Sydney -

-

-Chairman, seL4 Foundation -

-

-
- -Sid Hussmann, CTO, Gapfruit -

-

-In my first job as an industrial automation engineer, I loved how disciplines came together: Electronics, mechanics, programming, and robotics - like Lego, using building blocks to create something new. -

-

-After my studies in Electrical Engineering and Computer Science, I worked for three years in research of HW/SW co-design for IoT systems. Since 2011, I have been in the defense security industry, first as a firmware engineer and later as a lead systems architect. -

-

-I was responsible for a framework for various security products: 100G link encryption, VPN, VoIP, and secure radio communication. I was also part of a team that developed a secure notebook for governmental agencies, including a new operating system for highly classified information. -

-

-In 2018 I co-founded Gapfruit to bring academic security research to real-world products. -

-

-I still love to create. -

-

-
- -Kent McLeod, KOS engineering lead, Kry10 -

-

-Kent is an operating-systems engineer specialized in formally verifiable trustworthy systems using seL4. His interests include systems engineering and how using different operating system architectures can help construct trustworthy applications. -

-

-His work at Kry10 is focused on designing and developing the new Kry10 secure platform which includes a new device operating system, KOS, that leverages seL4 and the BEAM to make it easier to build and maintain embedded software that still needs to be secure and robust even if it’s connected to the internet. -He previously worked at the Trustworthy Systems Research Group where he helped oversee the technical development of seL4 as an OS engineer. He is currently a member of the seL4 Foundation’s technical steering committee. -

-

-
- -Juliana Furgala, Cybersecurity Researcher, MIT Lincoln Laboratory -

-

-Juliana Furgala is an associate technical staff member in the Secure Resilient Systems and Technology Group. Currently she is researching secure and recoverable satellite systems. Interested in the pursuit of technology built with security in mind, she aims to develop lasting technology that can stand the test of adversaries, not just the test of time. Her recently published research focuses on the needs of embedded and real-time systems, specifically related to operating system development. -

-

-To lower the barrier of entry into STEM fields, she is involved in a variety of academic and outreach efforts. One such activity was founding LL EduCATE, a volunteer group that develops accessible, hands-on courses to introduce middle and high school students to the possibilities of STEM. The first course, an Introduction to Engineering Concepts was created for both independent student study and collaborations with educators. -

-

-Juliana received her BS degree in computer science in 2019 from Tufts University. She is currently pursuing an MS degree in cybersecurity at Georgia Institute of Technology. -

- -

-
Moderator -

-

- -Todd Carpenter, Principal Scientist, Galois, Inc -

-

-Todd's research is focused on tools and techniques to develop safe, -secure, real-time, and dependable systems built on solid foundations. He -has designed and specified system architectures, hardware, and software, -and has developed tools, standards, and processes for enhancing design -flows. -

-

-Galois develops technology to guarantee the trustworthiness of systems -where failure is unacceptable. We apply cutting edge computer science -and mathematics to advance the state of the art in software and hardware -trustworthiness. -

-YouTube icon -
-See this talk in the program
- -
- -

- seL4 VMM on the RISC-V Rocket Chip -

-

- Talk -

-

- Presented by Robbie VanVossen, DornerWorks -

-

- The royalty-free, open-source RISC-V is an ideal ISA for the high-assurance seL4 microkernel since the formal proof requires definitive understanding of its underlying architecture. DornerWorks’ use-case generally utilizes virtualization with seL4 to provide a secure platform which allows for cyber-retrofit, rapid deployment, and cyber resilience. Virtualization is an area where RISC-V is immature. The hypervisor (H) extension has been ratified, but there are still no commercially available silicon processors that support the extension. The Rocket Chip is a soft-core RISC-V implementation which can be instantiated on an FPGA and is essentially equivalent to a real silicon processor. DornerWorks bridged the gap between the seL4 VMM running on QEMU and running on actual silicon by getting a seL4 VMM running, for the first time, on a Rocket Chip instantiation which has the hypervisor extensions implemented. This presentation will provide an overview of the Rocket Chip, the RISC-V H extension, the effort that went into getting the seL4 VMM to run on Rocket Chip, and thoughts on the next steps for seL4 virtualization on RISC-V platforms. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- seL4 on Arm Morello -

-

- Talk -

-

- Presented by Martin Atkins, Mission Critical Applications -

-

-seL4 has a formally-proven kernel, but the safe and secure operation of a system built on seL4 depends on the correct operation of the user-level tasks that implement the system policies, services, and device drivers needed by the application, as well as on the correct operation of the application tasks. Running an seL4 system on a processor with CHERI extensions brings the extra assurance of the capability architecture to these user-level tasks, and thus increases the assurance of the overall application. -

-

-Our project builds on initial work done at Arm Research to port the seL4 kernel to the Arm Morello CHERI processor. The project aims to support a mixture of user-level tasks compiled as Hybrid code (that is, where capabilities are explicitly defined in the source code), and PureCap code (that is, where all pointers are dereferenced as capabilities). The seL4 user-level libraries must be ported to support these compilation options. SeL4 virtual machines will also be extended to support capability-aware operating systems, such as CheriBSD4, Morello Android5, and Morello Linux6. -

-

-This paper will report on the progress of the project, and discuss the requirements and design options for the communication of CHERI capabilities between seL4 tasks, and the implications this has on the seL4 IPC mechanisms. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Incremental assurance for a Rust network stack -

-

- Talk -

-

- Presented by Michal Podhradsky, Galois -

-

-Despite the fact that numerous components and subsystems have been developed on top of or with seL4 over the past few years, sponsored mainly by DoD SBIR grants, seL4 does not have a high-assurance network stack. In earlier work on the HACMS project, Galois integrated an off-the-shelf TCP stack into a seL4 platform. Many other organizations have done something similar, either by shiming in existing low-assurance network code that has poor provenance and no rigorous assurance, or by using the Linux environment to provide networking features. To the best of our knowledge, there is currently no high assurance network stack readily available for embedded systems. -

-

-To mitigate this gap, we started with an existing and widely used Rust network stack smoltcp and are providing an incremental assurance, that is by no means complete, but provides a path towards a high assurance stack in the future. -

-

-This summer, we used Prognosis framework, offering automated closed-box learning and analysis of models of network protocol implementations, for model based veritication of TCP protocol in smoltcp, and Kani Rust verifier to verify TCP protocol logic and packet format correctness via symbolic execution. We have found protocol violations or misimplementations in the library, and have been working with the smoltcp developers to mitigate these violations. Furthermore, we integrated Continuous Verification suite with the smoltcp library, to automatically validate the code after each commit. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

-IOMMU (take the ARM SMMUv3 for instance) solution for seL4 -

-

- Talk -

-

- Presented by Lei Mao, Horizon Robotics -

-

-The IOMMU Stage-2 only scheme (the view of IOMMU Stage-2 is as same as the MMU's) is simple, and seems good at most of time, but in order to go further for a more unrestricted and finely controlled Stage-1, we can apply the classic virtio scheme for IOMMU. The only extra important thing that needs to be done in virtio-smmu backend is managing relationships between messages in virtqueue and IOMMU or VSpace capabilities. -

-

-But what if we use a different page table granularity for SMMU than for MMU? As we know, the IO-mapping request from Guest OS could be as small as one normal page, but seL4 doesn't allow reusing huge or large frames in the same region at the same time. If we already distribute the region into one huge or several large frames, meanwhile, we can not re-segment it into small pages for IO-mapping. Even if leaving capability control aside, we have to use the scheme of Stage1 plus Stage2, and realize Stage1 construction for IO page table which is redundant already exists in VM's OS. -

-

-Now we have the complete Components'&VMs' IOMMU SID/CB capability management, derivation, and configuration. And most importantly, a proven IOMMU nested sw approach which has the advantages of both performance, flexibility and reliability, with few restrictions, with minimal effort and minimum changes using existing capability systems. -

-

-By hosting the installation/uninstallation of the Stage-1 context root, bring multiple benefits: -

-

-1. Not only has finely controlled Stage-1, but also rarely relies on VMM with little restriction and much more flexibility, such as, -

-
    -
  • This design can be applied with all modes of SMMU. -
  • The Linux native SMMU driver keeps all of the original direct operations,so no need to use QEMU or VIRTIO-IOMMU backend driver. -
  • -
-

-2. We can separate out Guest OS internal IO page management, and keep them the same as the native IOMMU drivers. -

-3. Not only can native drivers be highly reused, but also the performance is almost the same as without virtualization -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Toward a Verified, Minimal IPv6 Network Stack Implementation -

-

- Talk -

-

- Presented by Wyeth Greenlaw Rollins, Lewis & Clark College -

-

-We are completing the implementation of a minimal, pure IPv6 network stack optimized to run on IoT endpoints connected to a network through a Layer 2 Ethernet interface. This implementation supports only the minimal set of protocols (IEEE 802.3, ICMP, IP, and UDP) to provide efficient UDP-based communication between an IoT endpoint and any other host. -

-

-We believe our implementation will provide high performance and reliability through a strict application of separation of concerns and elimination of all unnecessary data copies while keeping the codebase amenable to verification. -

-

-In this talk, we report on our progress implementing and verifying this networking stack. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- OS for Software Defined Vehicle -

-

- Gold Sponsor Talk -

-

- Presented by Qiyan Wang, NIO -

-

-This talk provides a brief introduction of NIO – a global smart EV company, and discusses how automotive industry evolves towards software defined vehicle, and how OS could play a key role in this transition, and shares what NIO’s vision and progress of building a vehicle OS using seL4. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Secure Systems in Focus: Challenges, Solutions, and Future Directions -

-

- Gold Sponsor Talk -

-

- Presented by Everton de Matos, TII -

-

-In today's digital age, when cyber threats are everywhere, the importance of building robust and secure systems cannot be overstated. This presentation dives deep into the initiatives undertaken by the Secure Systems Research Center (SSRC). We'll shed light on our collaborations, projects, and the novel solutions we've pioneered to tackle pressing cyber challenges. The SSRC is a pillar among the ten research centers that comprise the Technology Innovation Institute (TII). Situated in Abu Dhabi, TII aims to lead the way in tech research, focusing on critical areas in the digital world today. In this presentation, we will discuss our latest work and how tools like the seL4 microkernel help make our systems even more secure. By the end of this session, attendees will gain a panoramic view of SSRC's achievements over the past year. We'll also offer a glimpse into the future, outlining our strategic plans and emphasizing SSRC's commitment to pushing the barriers of tech security. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- SIG update, Community Update and Discussion -

-

- Update and discussion -

-

- This session will include a community update from Kent McLeod, Kry10, and SIG updates from Matt Brecknell, Kry10, Yanyan Shen, NIO, and Everton DeMatos, TII. There will also be opportunity for discussion. -

-


- Kent McLeod, KOS engineering lead, Kry10 -

-

- Kent is an operating-systems engineer specialized in formally verifiable trustworthy systems using seL4. His interests include systems engineering and how using different operating system architectures can help construct trustworthy applications. -

-

- His work at Kry10 is focused on designing and developing the new Kry10 secure platform which includes a new device operating system, KOS, that leverages seL4 and the BEAM to make it easier to build and maintain embedded software that still needs to be secure and robust even if it’s connected to the internet. -

-

- He previously worked at the Trustworthy Systems Research Group where he helped oversee the technical development of seL4 as an OS engineer. He is currently a member of the seL4 Foundation’s technical steering committee. -

-


- Matthew Brecknell, Verification Engineer, Kry10 -

-

- Matthew is a formal verification practitioner. He has made significant contributions to the seL4 verification story, and is a member of the seL4 Foundation Technical Steering Committee. At Kry10, Matthew is developing the next generation of high-assurance remotely-managed seL4-based devices. -

-


Everton de Matos, TII -

-

- Everton de Matos serves as Lead Security Research Engineer at the Technology Innovation Institute (TII) within the Secure Systems Research Center (SSRC). He earned his Ph.D. in Computer Science from the Pontifical Catholic University of Rio Grande do Sul (PUCRS). During his doctoral studies, he was honored with a Fulbright scholarship, allowing him to further his research at the University of Southern California (USC). Presently, Everton's focus lies in security for embedded systems, specifically within the context of the seL4 Microkernel. He boasts numerous contributions to significant conferences and journals. His primary areas of interest encompass embedded systems security, the Internet of Things, virtualization, and context-aware security. -

-YouTube icon -   -
See this talk in the program
- -
- -

- seL4 Virtualization (ARMv8 Edge Device) Guest OS Performance & HA Recovery -

-

- Talk -

-

- Presented by Lei Mao, Horizon Robotics -

-

- Virtualization technology was widely used in X86 Cloud Server. There are various mature finetunes work was done for GuestOS Performance and High Availability Recovery. -

-

-In comparison, Virtualization in ARM Edge device(ARMv8 AACH64) was not so widely used. And its HW IP device usage model was very different from the Cloud scenario. The performance and HA is a challenge here. -

-

-In our advance research project, we explored some ways to improve that, e.g. -

-

-1) Support sel4 kernel fastpath virtual interrupt(for SPI/PPI/SGI/LPI) to shorten the long interrupt process route. -

-

-With this, Linux 5.10 GuestOS(cyclictest) average schedule latency will be reduced from 30us- ->7us, close to RAW Linux 5.10 which was 5us -

-

-Note: Most++ COST ARMv8 SoC only have GICv3 interrupt controller IP, GOS interrupt direct inject was only supported in GICv4. -

-

-2) Support Virtual Machine Monitor (VMM) with vCPU symmetric multiprocessing (SMP) extension to speedup co-current helper services to GuestOS VMExits. -

-

-3) Support Virtual Machine Monitor (VMM) with HA Recovery extension to make Linux GuestOS recovery to working mode less than 1000 ms while crashing. -

-

-Note: Linux GOS basic system can recover less in 500ms, Linux GOS with an actual complex application may recover less in 1000 ms. -

- -
See this talk in the program
- -
- -

- Building a Commercial Virtualized Mobile Device with seL4 – Part 2 -

-

- Talk -

-

- Presented by Jason Sebranek, Cog Systems -

-

-Cog Systems, Inc. specializes in developing secure solutions leveraging virtualization on connected mobile devices. Cog Systems has developed a Virtualized Mobile Device (VMD) architecture and has placed the seL4 microkernel and Virtual Machine Manager (VMM) at its heart. Thus, the VMD is built on a Type-1 hypervisor which manages physical device hardware and acts as a very small Trusted Computing Base (TCB). -

-

-In 2017 Cog Systems developed a single domain virtualized device on an HTC One A9 smartphone, and successfully validated it against the National Information Assurance Partnership (NIAP) Protection Profile (PP) for Mobile Device Fundamentals (MDF) and Virtual Private Network (VPN). This allowed Cog Systems to register the device with the National Security Agency (NSA) as an Approved Component under its Commercial Solutions for Classified (CSfC) process. Cog Systems is currently leveraging our VMD to develop a next-gen commercial virtualized smartphone - again planned for NIAP evaluation, CSfC inclusion, and commercial availability to the US government. -

-

-At the 2020 seL4 Summit, Cog Systems presented this effort as a case study in applying seL4 to a product commercialization effort. Since then, the project has experienced multiple and varied challenges, and has not yet been completed. Cog Systems feels there is value in giving a follow-up presentation to discuss the progress, setbacks, and lessons learned in the past few years. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- seL4 on RISC-V: Building a Trusted Execution Environment -

-

- Talk -

-

- Presented by Everton de Matos, TII -

-

- The use of Trusted Execution Environments (TEEs) is becoming increasingly common in the design of secure systems. TEEs provide a secure execution environment for sensitive applications and data, ensuring that they are protected from attacks and unauthorized access. TEEs are typically implemented as a separate execution environment within a system, with their own hardware and software resources that are isolated from the rest of the system. The trend towards the use of TEEs is driven by the increasing sophistication of cyber-attacks and the need for more robust security solutions. As such, the use of TEEs is becoming increasingly important in the design of secure systems, and technologies such as seL4 and RISC-V are playing a key role in their development. -

-

- In this talk, we will present our efforts on using seL4 on RISC-V to build a TEE service. We will discuss the challenges we faced during the development process and the solutions we implemented to address them. Additionally, we will provide an in-depth overview of our TEE architecture by discussing its features and demonstrating its functionality through real-world use cases. Our experimentation tests with the PolarFire Icicle kit have played a crucial role in enhancing our understanding of the platform and refining our implementation. Furthermore, we will discuss our ongoing efforts to improve and expand upon the TEE service and its potential applications, as well as outline our future research and development directions in this domain. -

-YouTube icon -   -slides icon -
See this talk in the program
- -
- -

- Trustworthy Measurements of a Linux Kernel and Layered Attestation via the seL4 -

-

- Talk -

-

- Presented by Michael Neises, University of Kansas -

-

-This application-in-development leverages the seL4 proofs to provide assurance for the trustworthy and remote attestation of a Linux VM. By focusing on a Linux VM running on an ODROID XU4 platform, this work demonstrates the potential of seL4-based remote attestation across different hardware architectures and platforms. -

-

-The principles of remote attestation demand that the mechanisms of attestation are trustworthy. The seL4 guarantees properties of confidentiality and integrity, and these can be jointly understood as the seL4 enforcing the isolation of processes. This isolation allows the use of virtual machine introspection without fear of the virtual machine escape exploits to which previous software solutions are vulnerable. Here, the tools that introspect are trusted to measure a target because they are isolated from that target. -

-

-This attestation is layered in order to confine the adversary, and the layering is implemented at the architectural level using CAmkES. The adversary is confined to either corrupt the attestation tools or to rapidly corrupt and restore the target, bypassing the attestation tools. The seL4 permits an argument for the infeasibility of these strategies. However, the principles of remote attestation also demand that comprehensive information be generated over the target. Without a comprehensive measurement of the Linux environment, the adversary gains the option of hiding their corruption. -

-

-In support of a comprehensive measurement suite, an introspection library was implemented for a narrow range of Linux kernels. The library required a pathway for using arbitrary kernel modules in an arbitrary version of Linux, but the range of applicable kernels is narrow due to changes in how Linux manages its memory. The library facilitated the measurements of kernel modules, kernel and user processes, and kernel read-only data. Much more is required for a comprehensive measurement. -

-

-The principles also demand fresh information and constrained disclosure, which are simple matters of cryptography. Finally, the principles demand semantic explicitness, and this is largely considered in adjacent work that implements the Copland attestation language in CakeML extracted from Coq theorems. That work is integrated into this system. A way to use the latest versions of CakeML in seL4 threads independent from HOL4 was required. -

-

-It remains to implement a more comprehensive suite of measurements for the Linux kernel and the target program, and to demonstrate layered attestation on the bare metal of the ODROID XU4. If the measurements suffice to detect corruption, the appraiser will learn of this. Possible future work includes implementing this work for a wider range of Linux kernels and hardware platforms or formalizing a composition of seL4 kernel-level proofs and proofs over the attestation tools. -

-YouTube icon -   -slides icon -
See this talk in the program
-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2023/cfp.html b/PR_400/Foundation/Summit/2023/cfp.html deleted file mode 100644 index ec48351b..00000000 --- a/PR_400/Foundation/Summit/2023/cfp.html +++ /dev/null @@ -1,340 +0,0 @@ - - - - - - CFP | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- Call For Presentations for the seL4 Summit 2023 -

- -
-

- Important Dates: -

-
    -
  • Abstracts due: 24 April 2023
  • -
  • Notification of decisions: 9 June 2023
  • -
  • Summit: 19-21 September 2023
  • -
-
- - -
-

- Overview -

-

- - The seL4 summit aims at gathering the seL4 community to - learn, share, and connect: -

-
    -
  • - - learn about the seL4 technology, its latest progress, use, - successes, challenges, plans; - -
  • -
  • - - share exciting seL4 development, research, experience, - application in the real world; - -
  • -
  • - - connect with other seL4 developers, users, providers, - supporters, potential partners, and enthusiasts. - -
  • -
- - -

- - The seL4 summit covers the complete seL4 ecosystem, consisting of the verified - microkernel, as well as all seL4-related technology, tools, infrastructure, - products, projects, and people. - -

- -

- - The seL4 summit 2023 will be in Minneapolis, USA. - -

- -
- - - -
-

- Topics -

-

-We solicit proposals on any seL4-related topic, in particular in the areas of: -

-
    -
  • - seL4 on-going and planned R&D, mature or early stage: -
      -
    • - seL4 research efforts -
    • -
    • - seL4 development efforts -
    • -
    • - work-in-progress seL4 development -
    • -
    • - student work on seL4 -
    • -
    • - new/missing/next-gen kernel mechanisms -
    • -
    • - seL4-related roadmaps: what you plan to work on and when -
    • -
    • - seL4 grand challenges -
    • -
    • - OS frameworks and services -
    • -
    • - seL4 userland with programming language support beyond C -
    • -
    • - High performance systems based on seL4: pushing the boundaries -
    • -
    -
  • -
  • - seL4 experience reports -
      -
    • - experience with deploying seL4 in the field, in commercial/deployed products -
    • -
    • - experience with teaching seL4 -
    • -
    • - experience with seL4 in certification schemes and application of industry standards -
    • -
    • - experience with “building a business case for using a verified kernel” -
    • -
    • - experience with porting software from other OSes -
    • -
    -
  • -
  • - seL4 and hardware -
      -
    • - ports to new hardware platforms or architectures -
    • -
    • - multicore systems -
    • -
    • - virtualisation -
    • -
    • - new/proposed hardware features or architectures, which could also enable or broaden the scope of formal reasoning (e.g. about time protection) -
    • -
    • - seL4 in embedded processors on FPGAs, and impact of assured separation -
    • -
    • - IOMMU solutions for various hardware architectures and impact for seL4 -
    • -
    -
  • -
  • - seL4 and assurance: -
      -
    • - application-level verification leveraging seL4 proofs -
    • -
    • - correctness, spatial separation, temporal separation, and real-time proofs -
    • -
    • - formalised interface between or composition of kernel-level proofs and user-level proofs -
    • -
    • - verification engineering at scale, scaling verification productivity -
    • -
    • - security/safety impact/assurance/certification for an seL4-based system -
    • -
    -
  • -
- -
- - - -
-

- Submission -

-

- - If you would like to propose a talk, please upload an abstract of one page or less for your - proposed talk by 24 April 2023 on the submission portal. Abstracts should indicate why the talk fits in the seL4 summit - scope. Notifications of accepted presentations will be made by 2 June 2023. - -

-

- If you'd love to hear about some specific work from other people in the community, we encourage you to reach out to them to incite them to submit a proposal :-) else you can also let us know at summit@sel4.systems. -

- -
- - - -
-

- Contact -

-

- If you have questions, please do not hesitate to contact the seL4 Foundation summit team at: summit@sel4.systems. -

- -
-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2023/home.pml b/PR_400/Foundation/Summit/2023/home.pml deleted file mode 100644 index f97a988d..00000000 --- a/PR_400/Foundation/Summit/2023/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Summit/2023/index.html b/PR_400/Foundation/Summit/2023/index.html deleted file mode 100644 index fa01be38..00000000 --- a/PR_400/Foundation/Summit/2023/index.html +++ /dev/null @@ -1,607 +0,0 @@ - - - - - - Summit | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2023 -

-

-Minneapolis, USA -

-

- 19 - 21 September 2023 -

- - - - -
- All summits: 2022 2023 2024 -
- - - -
-

- About -

-

- The seL4 Summit is the annual international summit on the seL4 microkernel, the world's most highly assured OS kernel, as well as on all seL4-related technology, tools, infrastructure, products, projects, and people. -

-

- It aims to gather all the seL4 community to learn, share, and connect: -

-
    -
  • learn about the seL4 technology, its latest progress, use, successes, challenges, plans;
  • -
  • share exciting seL4 development, research, experience, application in the real world;
  • -
  • connect with other seL4 developers, users, providers, customers, supporters, potential partners and enthusiasts.
  • -
-

- The seL4 Summit is organised by the seL4 Foundation, in a location aimed to be on a different continent each year, as far as possible. -

-

- An open call for presentations invites submissions of short abstracts about cool work on seL4, and a Program Committee made of a wide range of representatives of the seL4 community is in charge of the technical content (reviewing submission, selecting invited speakers, defining the program). -

-
- - - -
-

- Location & Venue -

-

- The seL4 Summit 2023 was held in Minneapolis, USA, 19 - 21 September 2023, at the Elliot Park Hotel. The summit was organised by the Linux Foundation. -

-
- -
-

- Keynote Speakers -

-
- - -
-

- Panellists -

-

-

- We were very fortunate to welcome five industry leaders to participate at the seL4 Summit 2023, in a session OS on seL4: so many options!. Gapfruit, Kry10, Magnetite (MIT), and UNSW presented their views on the priorities and vision for their OS on seL4. The panel was moderated by Todd Carpenter from Galois. -

- -
-
-
- Sid Hussmann -
-
- Sid Hussmann -
- Gapfruit -
-
-
-
- Kent McLeod -
-
- Kent McLeod -
- Kry10 -
-
-
-
- Juliana Furgala -
-
- Juliana Furgala -
- MIT Lincoln Laboratory -
-
-
-
- Gernot Heiser -
-
- Gernot Heiser -
- Trustworthy Systems UNSW -
-
-
-
- Todd Carpenter -
-
- Todd Carpenter, Moderator
- Galois -
-
-
-
- -
-

- Program, Abstracts, Slides and Videos -

-

- Videos of the seL4 summit 2023 are available on the seL4 YouTube channel! Links and slides can be found on the summit Program and Abstracts pages. Thanks to all the speakers for making the seL4 summit 2023 a great success! -

-
- -
-

- Program committee -

-

-

- Our awesome team comes from various parts of the seL4 ecosystem: users, contributors, committers, experts, advocates, researchers, and engineers. -

-
-
-
-
- Darren Cofer -
- -
- Raytheon -
-
- -
-
- Ihor Kuz -
- -
- Kry10 -
-
- -
-
- Perry Alexander -
- -
- U of Kansas -
-
- -
-
- June Andronick -
- -
- Proofcraft -
-
- -
-
- Todd Carpenter -
- -
- Galois Inc -
-
- - - -
-
- Axel Heider -
- -
- Hensoldt Cyber -
-
- -
-
- Gernot Heiser -
- -
- UNSW -
-
- - - -
-
- Nick Spinale -
- -
- Colias Group -
-
- -
-
- Robbie VanVossen -
- -
- Dornerworks -
-
- - -
-
- NCSC -
- -
- NCSC -
-
- -
- - - -
-

- Sponsors -

-

- We are grateful to the following sponsors for their financial support of the seL4 summit 2023. -

-
-
- - - -
-
- -
-
- -
-
- -
- -
-

- Contact -

-

- For any questions regarding the summit, please contact summit@sel4.systems. -

-
-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2023/program.html b/PR_400/Foundation/Summit/2023/program.html deleted file mode 100644 index 206dfdf2..00000000 --- a/PR_400/Foundation/Summit/2023/program.html +++ /dev/null @@ -1,639 +0,0 @@ - - - - - - Summit program | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2023 -

-

- Minneapolis, USA -

-

- 19 - 21 September 2023 -

- -

- Program -

-

- All times are local time in Minneapolis, USA (GMT-5). -

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Day 1 19 September 2023
Session chair
9:00 - 9:10AnnouncementsWelcomeYouTube iconslides iconDarren Cofer &
Ihor Kuz
9:10 - 10:00KeynoteScoping assurance activities with seL4
Gage B
, - NCSC -
slides iconDarren Cofer
Break
10:15 - 10:45TalkDynamic seL4 based systems: designing for verifiability
Matthew Brecknell
, - Kry10 -
YouTube iconslides iconGerwin Klein
10:45 - 11:15TalkFormally Stepping Into The Unverified World
Sandy Frost
, - Los Alamos National Laboratory -
YouTube iconslides icon
Break
11:30 - 12:00TalkReducing the reliance on verification experts for seL4 proofs
Gerwin Klein
, - Proofcraft -
YouTube iconslides iconMatthew Brecknell
12:00 - 12:30TalkMore multiprocessing on seL4: Are efficient SMP virtual machines possible on verifiable seL4 kernels?
Kent McLeod
, - Kry10 -
YouTube iconslides icon
Lunch
13:30 - 14:00TalkSystem Information Flow Analysis
Ihor Kuz
, - Kry10 -
YouTube iconslides iconRobbie VanVossen
14:00 - 14:30TalkAdvancements for Virtualization Support in seL4:CAmkES and seL4cp
Markku Ahvenjärvi
, - TII -
YouTube iconslides icon
Break
14:45 - 15:15TalkThe seL4 Device Driver Framework
Lucy Parker
, - UNSW -
YouTube iconslides iconNick Spinale
15:15 - 15:45TalkR&D Update from TS
Gernot Heiser
, - UNSW -
YouTube iconslides icon
Break
16:00 - 16:15TalkseL4: Experiences, Improvements and Optimizations
Chris Guikema
, - DornerWorks -
YouTube iconslides iconAxel Heider
16:15 - 16:30TalkFrom Zero to a Native xHCl Driver
Josh Felmeden
, - Capgemini Engineering -
YouTube iconslides icon
16:30 - 16:45TalkCrashing For Reliability
Ihor Kuz
, - Kry10 -
YouTube iconslides icon
16:45 - 17:00UpdateseL4 Foundation update
June Andronick, - seL4 Foundation -
YouTube iconslides icon
Break
17:00 - 17:15Gold SponsorBuilding a Platform for Critical Devices in the “Real World”
Boyd Multerer
, - Kry10 -
YouTube iconslides iconJune Andronick
Break
Networking event: drinks and nibbles 18:00
Day 2 20 September 2023
Session chair
9:00 - 9:50KeynoteCantripOS: An OS for Ambient ML Applications
Sam Leffler
, - Google -
YouTube iconslides iconIhor Kuz
9:50 - 10:00Announcements
- -
YouTube icon
Break
10:15 - 10:45TalkMagnetite: Rust-Based OS Services for seL4
Juliana Furgala
, - MIT Lincoln Laboratory -
YouTube iconslides iconLucy Parker
10:45 - 11:15TalkShowcase: Microkernel OS, TPMs, and WASM in Ilo T Environments
Sid Hussmann
, - Gapfruit -
YouTube iconslides icon
Break
11:30 - 12:00TalkRust support in seL4 userspace: update and roadmap
Nick Spinale
, - Colias Group -
YouTube iconslides iconKent McLeod
12:00 - 12:30TalkThe seL4 Microkit
Ivan Velickovic
, - UNSW -
YouTube iconslides icon
Lunch
13:30 - 14:00TalkLeveraging Rust for Core Platform
Ben Hamlin
, - Galois -
YouTube iconslides iconTodd Carpenter
14:00 - 14:30PanelOS on seL4: so many options!
- Gernot Heiser, UNSW
- SidHussmann, - Gapfruit
- Kent McLeod, Kry10
- Juliana Furgala, - MIT Lincoln Laboratory
-
YouTube icon
Break
14:45 - 15:15TalkseL4 VMM on the RISC-V Rocket Chip
Robbie VanVossen
, - DornerWorks -
YouTube iconslides iconGernot Heiser
15:15 - 15:45TalkseL4 on Arm Morello
Martin Atkins
, - Mission Critical Applications -
YouTube iconslides icon
Break
16:00 - 16:30TalkIncremental assurance for a Rust network stack
Michal Podhradsky
, - Galois -
YouTube iconslides iconGerwin Klein
16:30 - 16:45TalkToward a Verified, Minimal IPv6 Network Stack Implementation
Wyeth Greenlaw Rollins
, - Lewis & Clark College -
YouTube iconslides icon
16:45 - 17:00TalkIOMMU (take the ARM SMMUv3 for instance) solution for seL4
Lei Mao
, - Horizon Robotics -
YouTube iconslides icon
17:00 - 17:15Gold SponsorOS for Software Defined Vehicle
Qiyan Wang
, - NIO -
YouTube iconslides iconJune Andronick
17:15 - 17:30Gold SponsorSecure Systems in Focus: Challenges, Solutions, and Future Directions
Everton de Matos
, - TII -
YouTube iconslides icon
Break
Dinner 19:00
Day 3 21 September 2023
Session chair
9:00 - 9:30UpdateSIG update + Community update/discussion
Yanyan Shen, - NIO
- Matthew Brecknell, - Kry10
- Everton de Matos, - TII
- Kent McLeod, - Kry10
-
YouTube iconDarren Cofer
9:30 - 10:00TalkseL4 Virtualization (ARMv8 Edge Device) Guest OS Performance & HA Recovery
Lei Mao
, - Horizon Robotics -
Break
10:15 - 10:30TalkBuilding a Commercial Virtualized Mobile Device with seL4 - Part 2
Jason Sebranek
, - Cog Systems -
YouTube iconslides iconIhor Kuz
10:30 - 10:45TalkseL4 on RISC-V: Building a Trusted Execution Environment
Everton de Matos
, - TII -
YouTube iconslides icon
10:45 - 11:00TalkTrustworthy Measurements of a Linux Kernel and Layered Attestation via the seL4
Michael Neises
, - University of Kansas -
YouTube iconslides icon
Break
11:30 - 11:45PlenaryBoFs teasers - Darren Cofer
& Ihor Kuz
11:45 - 12:30 - Plenary - BoF Room 1 -
11:45 - 12:30BoF Room 2 -
Lunch
13:30 - 14:15 - Plenary - BoF Room 1 -
13:30 - 14:15BoF Room 2 -
14:15 - 14:30PlenaryReport from BoFs + Discussion - Darren Cofer
& Ihor Kuz
Break
14:45 - 16:30Training - A quick start to seL4 with the Core Platform
Ivan Velickovic, - UNSW -
-
-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2023/slides/day1-00-cofer.pdf b/PR_400/Foundation/Summit/2023/slides/day1-00-cofer.pdf deleted file mode 100755 index f2f9bf71..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-00-cofer.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-01-gage.pdf b/PR_400/Foundation/Summit/2023/slides/day1-01-gage.pdf deleted file mode 100755 index 5eab62f9..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-01-gage.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-02-brecknell.pdf b/PR_400/Foundation/Summit/2023/slides/day1-02-brecknell.pdf deleted file mode 100755 index 9ecd2bf3..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-02-brecknell.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-03-frost.pdf b/PR_400/Foundation/Summit/2023/slides/day1-03-frost.pdf deleted file mode 100755 index af28dfa7..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-03-frost.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-04-klein.pdf b/PR_400/Foundation/Summit/2023/slides/day1-04-klein.pdf deleted file mode 100755 index 55857098..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-04-klein.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-05-mcleod.pdf b/PR_400/Foundation/Summit/2023/slides/day1-05-mcleod.pdf deleted file mode 100755 index ef789076..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-05-mcleod.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-06-kuz.pdf b/PR_400/Foundation/Summit/2023/slides/day1-06-kuz.pdf deleted file mode 100755 index d3d97fed..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-06-kuz.pdf and /dev/null differ diff --git "a/PR_400/Foundation/Summit/2023/slides/day1-07-ahvenj\303\244rvi.pdf" "b/PR_400/Foundation/Summit/2023/slides/day1-07-ahvenj\303\244rvi.pdf" deleted file mode 100755 index a46be72d..00000000 Binary files "a/PR_400/Foundation/Summit/2023/slides/day1-07-ahvenj\303\244rvi.pdf" and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-08-parker.pdf b/PR_400/Foundation/Summit/2023/slides/day1-08-parker.pdf deleted file mode 100755 index b8832429..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-08-parker.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-09-heiser.pdf b/PR_400/Foundation/Summit/2023/slides/day1-09-heiser.pdf deleted file mode 100755 index c925e068..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-09-heiser.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-10-guikema.pdf b/PR_400/Foundation/Summit/2023/slides/day1-10-guikema.pdf deleted file mode 100755 index 2f6d4c78..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-10-guikema.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-11-felmeden.pdf b/PR_400/Foundation/Summit/2023/slides/day1-11-felmeden.pdf deleted file mode 100755 index 2a44c65e..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-11-felmeden.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-12-andronick.pdf b/PR_400/Foundation/Summit/2023/slides/day1-12-andronick.pdf deleted file mode 100755 index 0365dfba..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-12-andronick.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-12-kuz.pdf b/PR_400/Foundation/Summit/2023/slides/day1-12-kuz.pdf deleted file mode 100755 index 470cc970..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-12-kuz.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day1-13-multerer.pdf b/PR_400/Foundation/Summit/2023/slides/day1-13-multerer.pdf deleted file mode 100755 index febcc944..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day1-13-multerer.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-01-leffler.pdf b/PR_400/Foundation/Summit/2023/slides/day2-01-leffler.pdf deleted file mode 100755 index 82149670..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-01-leffler.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-02-furgala.pdf b/PR_400/Foundation/Summit/2023/slides/day2-02-furgala.pdf deleted file mode 100755 index ec954ed2..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-02-furgala.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-03-hussman.pdf b/PR_400/Foundation/Summit/2023/slides/day2-03-hussman.pdf deleted file mode 100755 index f47bd9b0..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-03-hussman.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-04-spinale.pdf b/PR_400/Foundation/Summit/2023/slides/day2-04-spinale.pdf deleted file mode 100755 index 9d089756..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-04-spinale.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-05-velickovic.pdf b/PR_400/Foundation/Summit/2023/slides/day2-05-velickovic.pdf deleted file mode 100755 index e5f7bc67..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-05-velickovic.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-06-hamlin.pdf b/PR_400/Foundation/Summit/2023/slides/day2-06-hamlin.pdf deleted file mode 100755 index a34fad60..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-06-hamlin.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-08-vanvossen.pdf b/PR_400/Foundation/Summit/2023/slides/day2-08-vanvossen.pdf deleted file mode 100755 index 4aa2b4a7..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-08-vanvossen.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-09-atkins.pdf b/PR_400/Foundation/Summit/2023/slides/day2-09-atkins.pdf deleted file mode 100755 index c69216fa..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-09-atkins.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-10-podhradsky.pdf b/PR_400/Foundation/Summit/2023/slides/day2-10-podhradsky.pdf deleted file mode 100755 index bebbcad8..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-10-podhradsky.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-11-rollins.pdf b/PR_400/Foundation/Summit/2023/slides/day2-11-rollins.pdf deleted file mode 100755 index 19b1bb0d..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-11-rollins.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-12-mao.pdf b/PR_400/Foundation/Summit/2023/slides/day2-12-mao.pdf deleted file mode 100755 index e04bd77d..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-12-mao.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-13-wang.pdf b/PR_400/Foundation/Summit/2023/slides/day2-13-wang.pdf deleted file mode 100755 index 6c15879a..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-13-wang.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day2-14-dematos.pdf b/PR_400/Foundation/Summit/2023/slides/day2-14-dematos.pdf deleted file mode 100755 index d9e74d66..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day2-14-dematos.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day3-03-sebranek.pdf b/PR_400/Foundation/Summit/2023/slides/day3-03-sebranek.pdf deleted file mode 100755 index d63b5ad2..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day3-03-sebranek.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day3-04-dematos.pdf b/PR_400/Foundation/Summit/2023/slides/day3-04-dematos.pdf deleted file mode 100755 index 5830b032..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day3-04-dematos.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/slides/day3-05-neises.pdf b/PR_400/Foundation/Summit/2023/slides/day3-05-neises.pdf deleted file mode 100755 index 12277146..00000000 Binary files a/PR_400/Foundation/Summit/2023/slides/day3-05-neises.pdf and /dev/null differ diff --git a/PR_400/Foundation/Summit/2023/submit.html b/PR_400/Foundation/Summit/2023/submit.html deleted file mode 100644 index 3fad5ec8..00000000 --- a/PR_400/Foundation/Summit/2023/submit.html +++ /dev/null @@ -1,164 +0,0 @@ - - - - - - submit | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2023 -

-

-Minneapolis, USA -

-

-19-21 September 2023 -

- -
-

- Important Dates: -

-
    -
  • Abstracts due: 10 April 2023 24 April 2023
  • -
  • Notification of decisions: 2 June 2023 9 June 2023
  • -
  • Summit: 19-21 September 2023 (date TBD)
  • -
-

- Further information on the Call for Presentations. -

-

- Summit submissions are now closed. Please contact summit@sel4.systems if you have any questions. -

-
- - - -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2024/abstracts2024.html b/PR_400/Foundation/Summit/2024/abstracts2024.html deleted file mode 100644 index b762c4ce..00000000 --- a/PR_400/Foundation/Summit/2024/abstracts2024.html +++ /dev/null @@ -1,854 +0,0 @@ - - - - - - Summit abstracts | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2024 -

-

- Sydney, Australia -

-

- 15-17 October 2024 -

- - -

- Abstracts -

-
- -

- Industrial Scale Proof Engineering for Critical Trustworthy Applications (INSPECTA) -

-

- Keynote -

-

- Presented by Darren Cofer, Collins Aerospace -

-

-Formal methods have been successfully deployed at scale in production environments at large internet -companies, but barriers remain to their adoption by defense companies developing national security -systems. The goal of the INSPECTA project (part of the DARPA PROVERS program which has just started -in 2024) is to improve the security of defense and aerospace systems by dramatically improving the -usability, flexibility, and accessibility of formal methods-based development and verification tools. We -will leverage memory-safe programming languages (Rust), a provably secure microkernel (seL4), and new -formal methods tools and make them accessible to the defense industry workforce. These open source -technologies will be integrated into an aerospace CertDevOps workflow automation processes and -applied to the development of mission critical systems to demonstrate their usability, practicality, and -effectiveness. We will demonstrate the tools and workflow by addressing emerging security -requirements for the Air Launched Effects (ALE) mission computing platform. This will include re- -architecting the mission sotfware as a collection of virtual machines running legacy code and selected -high-criticality components, producing an architecture model for the system, porting selected software -to Rust, building software to run on seL4, and verifying critical safety and security properties. This -presentation will provide an overview of the PROVERS program objectives, the INSPECTA workflow to be -developed, and the assurance evidence to be produced. -

-
See this talk in the program
- -
- -

- seL4 Verification: Status and Plans -

-

- Talk -

-

- Presented by June Andronick, Rafal Kolanski, Gerwin Klein, Corey Lewis, Michael McInerney, Proofcraft -

-

- In this talk we will give an overview of Proofcraft's recent milestones, as well as ongoing and future plans for the formal verification of seL4 to support more platforms, architectures, configurations, and features. -

-

- In particular, we will report on the completion of the functional correctness proof of seL4 on AArch64. AArch64 is now on par with Arm 32-bit, RISC-V 64-bit and Intel x86 64-bit with respect to functional correctness, the strongest assurance that can be given about the correctness of software. Functional correctness is also the cornerstone of even stronger overall assurance, such as the security properties of integrity and confidentiality, which are next inseL4's AArch64 verification roadmap. -

-

- We will further report on where the verification of the seL4 extensions for mixed-criticality systems (MCS) is at, and share our plans for DARPA's PROVERS program where, as part of the INSPECTA team, we are aiming at increasing verification automation and scope while reducing the reliance on formal methods experts. -

-
See this talk in the program
- -
- -

- seL4 multikernel roadmap and concurrency verification -

-

- Talk -

-

- Presented by Corey Lewis, Proofcraft -

-

- In this talk we will present Proofcraft's roadmap for producing a verified static multikernel configuration of seL4, allowing the use of multiple CPU cores with one kernel per core. In this roadmap, we are planning to increase formal assurance incrementally, providing a tractable path to multicore verification -with early usable results for the seL4 community. -

-

- Formally proving correctness on a multicore platform requires the ability to model fully concurrent execution, and then prove that any interactions either do not occur or are safe. This requires a new formal model of execution, supporting concurrency reasoning. -

-

- We will report on our progress in building such a framework, with the aim to maximise the reuse of existing proofs. We will also present how starting with a static multikernel design is the fastest path to providing the community with an seL4 kernel that allows utilisation of multiple processor cores, opening the path to building multicore seL4-based systems that come with a formal proof of correctness. -

-
See this talk in the program
- -
- -

- The Neutrality Atoll Hypervisor and the seL4 Multikernel -

-

- Talk -

-

- Presented by David Cock, Neutrality -

-

- Neutrality(1) is building the Atoll hypervisor as a high-assurance platform for the secure multitenant virtualisation of workloads which are likely targets of well-resourced attackers. Atoll will use seL4 configured as a multikernel to provide verified isolation between multi-vCPU VMs on datacenter-class hardware containing hundreds of CPU cores, terabytes of main memory, and 100GbE-class self-virtualising (SR-IOV) NICs. This project places seL4 on a wholly new playing field, with orders-of-magnitude increases in hardware performance and the associated scaling challenges, while retaining the full verified assurance of the seL4/ARM stack. In particular, Atoll will provide fully-verified Integrity and Confidentiality between customer VMs, while efficiently handling commercial-scale workloads. -

-

- In this talk, we will give an overview of Atoll’s design, and explain how it addresses the challenges unique to this application domain. In particular we will motivate the choice of the multikernel as the ultimate design rather than as a stepping stone on the way to a verified SMP kernel, the benefits and challenges that arise from this choice, and other details of likely interest to others building multi-processor systems on seL4. In particular we will discuss the implications for verification, including on our own verification plan, and where we expect to coordinate with and contribute to the overall seL4 proof roadmap. -

-

- (1) https://neutrality.ch/ -

-
See this talk in the program
- -
- -

- Lions OS: Secure, fast, adaptable! -

-

- Talk -

-

- Presented by Gernot Heiser, UNSW Sydney -

-

- Lions OS is a new, seL4-based, open-source operating systems aimed at the embedded/IoT/cyberphysical space. Based on the Microkit, Lions OS features a static system architecture, i.e. all (potential) components and their (maximum) connectivity are known at system build time. Lions OS is characterised by a highly modular design, driven by the principles of strong separation of concerns and strict adherence to the KISS principle – keep it simple, stupid! The “radical simplicity” design, when done right, enables excellent performance despite the many context switches resulting from the fine-grained modularity. Critically, this modularity, coupled with keeping each module as simple as possible, should enable formal verification of Lions OS. -

-

- Taking the KISS principle to the extreme, Lions OS radically departs from the idea of universal policies, adaptable to many different use cases, that characterise most existing OSes. In contrast, Lions OS keeps all policies minimal and specific to the particular use case; it achieves use-case diversity by isolating each policy in an individual module that can be easily rewritten/replaced when a different policy is required. -

-

- In the talk I will explain the principles of Lions OS and its design, looking at concrete examples. I will present performance data that show that the approach can work and provide an overview of our current work on verification. This will be complemented by Ivan Velickovic’s talk covering Lions OS from a developer’s point of view, and Rob Sison’s and Courtney Darville’s talks on verifying Lions OS. -

- -
See this talk in the program
- -
- -

- In and Around Lions OS -

-

- Talk -

-

- Presented by Ivan Velickovic, UNSW Sydney -

-

- LionsOS is a new Operating Systems developed at Trustworthy Systems aimed at embedded, IoT, and cyberphysical systems. LionsOS is based on the seL4 Microkit and is desgined to formally verifiable, performant, and adaptable to a wide class of use-cases. -

-

- Gernot's talk will discuss the principles and design of LionsOS, while this talk will be focused on aspects of LionsOS from a developer's perspective. -

-

- We will dive into what it is like to use LionsOS by showcasing the tooling and surrounding infrastructure that has been created for developing a LionsOS-based system. This will cover topics such as I/O, virtualisation, debugging, profiling, as well as how to put all these pieces together. -

- -
See this talk in the program
- -
- -

- The Secure Multiserver Operating System Framework -

-

- Talk -

-

- Presented by Alwin Joshy, UNSW Sydney -

-

- Several frameworks, such as CAmkES and the seL4 Microkit, have been built on top of seL4 to enable the development of performant and provably secure operating systems. Most of these have static architectures and use system descriptions that define a complete system including all components and the resources they can access. The system specification is then passed to tools like CapDL, which generate the described system with the correct capability distribution. An important attribute of frameworks like CAmkES and Microkit is that they do not allow this initial distribution to evolve, preventing the runtime transmission of capabilities within an initialized system. This makes them well-suited for static analysis and verification, but comes with the caveat that some behaviours become more difficult or even impossible to represent. In particular, static frameworks are unsuitable for dynamic systems that adhere to complex security policies, especially ones that depend on runtime behaviour, or require functionality such as the ability to create new, sandboxed components, or temporarily transfer privileges between components at runtime. -

-

- The Secure Multiserver Operating System (SMOS) project aims to create a secure, dynamic OS framework on top of seL4. Our goal is to enable the development of systems as dynamic as mainstream operating systems like Linux, that allow you to, for example, download and run arbitrary executables, while leveraging the security properties of seL4 to ensure that a global security policy is always correctly upheld. This talk will focus on the key principles behind the design of SMOS, the progress we have made on its implementation, and an overview of some of the challenges we have encountered, both in development and in correctly enforcing a variety of arbitrary, often complex security policies at runtime. -

- -
See this talk in the program
- -
- -

- Running Certified Operating Systems under the seL4 Hypervisor -

-

- Talk -

-

- Presented by Chris Guikema, DornerWorks -

-

- Upstream hypervisor support has expanded in recent years to support additional configurations on x86, ARM, and RISC-V. Every upstream example simply runs Linux, which is an excellent use case for highly functional, general purpose computing platforms, however there are other guest Operating Systems that solve different use cases. Running seL4 in Hypervisor mode allows for the untrusted code in Linux to be sandboxed and isolated from trusted components in the system. What if the guest Operating System was fully trusted? Deos is a DO-178C DAL A certified RTOS for Avionics Applications, an area seL4 has struggled to break into. DornerWorks expanded seL4 Hypervisor support to run Deos under the CAmkES VM. This presentation will overview the changes that needed to be made to support a certifiable RTOS guest, how a Hypervisor effects the safety certification considerations of Deos, and the next steps needed to create a certifiable system with seL4. -

- -
See this talk in the program
- -
- -

- Securing ROS Systems with seL4 -

-

- Talk -

-

- Presented by Nathan Studer, DornerWorks -

-

- ROS (Robotic Operating System), a modular componentized architecture for robot applications, has made it possible to quickly develop and deploy systems utilizing autonomous or human guided robots. Focusing on ease of use and portability, ROS has enabled a community of developers to create autonomy solutions that were previously restricted to well-funded companies. However, ROS depends on many services included in a full Linux distribution to function properly. Beyond the Operating System itself, these distributions contain many unvetted software packages, which when used in high assurance environments, such as factory automation, could present an unacceptable amount of overhead and potential vulnerabilities. -

-

- Even in less critical environments, a compromised robot could surreptitiously spy on an end user or subtly/overtly cause harm to the environment in which it operates. While securing such systems with seL4 seems like an obvious solution, the lack of support for common software APIs and middleware presents a significant hurdle. Once this is overcome wider adoption of seL4 and more resilient robotic systems would be enabled. This presentation will show how the cyber-retrofit approach is being used to enable secure autonomous operation of an x86 based ground vehicle, how this approach is being extended to enable native seL4 ROS applications, and the barriers to further system hardening. -

- -
See this talk in the program
- -
- -

- Experience Developing Code for the seL4 Environment -

-

- Talk -

-

- Presented by Caitlyn Wilde and Wyeth Greenlaw Rollins, Lewis & Clark College -

-

- We have developed a minimal networking stack (Ethernet, IP, UDP, and ICMP) with the overarching goal of proving that it implements its specification correctly. We target our implementation for the embedded market and therefore we have chosen to develop our solution around the seL4 Microkit and the seL4 Device Driver Framework. -

-

- In this talk, we report on our experience developing, testing, and characterizing the performance of our implementation using the seL4 ecosystem. We have containerized our development environment to simplify building our application and to support users with differing platforms. In addition to relying on automated theorem prover assistants and model checkers, we have written many unit and integration tests to help write correct software. Using a network benchmark, we show that our solution exhibits competitive, if not superior, performance characteristics both in terms of average behavior and variance. -

- -
See this talk in the program
- -
- -

- Transitioning from CAmkES VMM to MicroKit VMM -

-

- Talk -

-

- Presented by Leigha VanderKlok, DornerWorks -

-

- This talk presents an experience report on migrating seL4-based systems from the CAmkES VMM to the Microkit VMM. Microkit is a simple framework and SDK created to enable more efficient designs and lower the barrier to entry to seL4. The presentation will compare and contrast MicroKit with CAmkES and highlight a few reasons to start using Microkit. In addition, it will examine how MicroKit can make learning and developing seL4-based systems easier and breakdown roadblocks encountered by new users when porting to a new platform. Finally, we will present our gap analysis between the two VMMs and highlight what still needs to be addressed so users can start developing real-world products. -

- -
See this talk in the program
- -
- -

- seL4 Foundation Update -

-

- Update -

-

- Presented by June Andronick, seL4 Foundation -

-

- In this talk, June Andronick, CEO of the seL4 Foundation, will give a brief overview of the latest updates and future plans for the seL4 Foundation. -

-

- The seL4 Foundation is home to the ecosystem of software, developers and adopters for safety- and security-critical systems based on seL4. It was formed in April 2020 as a neutral and community-based organisation that ensures long-term, independent support for seL4 and its ecosystem, and fosters strong community participation and ownership in the ecosystem. It raises funds for continuing and accelerating development, facilitates interoperability, standardisation and sharing of cost for the benefit of all. Its aim is to ensure that seL4 is not only the world’s best secure operating-system technology, but is readily deployable and supported by a diverse and stable ecosystem of services and products. -

-
See this talk in the program
- -
- -

- First steps towards verification of user-space systems -

-

- Talk -

-

- Presented by Matthew Brecknell, Kry10 -

-

- The Kry10 operating system supports some dynamic behaviours, including incremental updates to running systems. To ensure that the OS always enforces the access controls specified by device owners, we must verify the privileged OS components that manage system resources across updates. Verification will soon be further complicated by the addition of support for multikernel systems, because the OS will need to coordinate resource management across cores. -

-

- Concurrency is therefore fundamental to our approach. There is concurrency between the resource managers on different cores, and also between each resource manager and the apps and kernels in the system. We hope to use the structure of the system to avoid fine-grained reasoning as much as possible. But we want a framework which will allow us to prove that such structural reasoning is sound, rather than forcing us to assume it. -

-

- Though our plans might be grand, our first steps must be small. In particular, we need experience with techniques and frameworks for reasoning about concurrency. -

-

- In this talk, we present our initial experiments with concurent user-space verification. We use the Iris separation logic framework to build an abstract model of a simple system in which components interact using shared memory and notifications, and we prove a simple correctness property. We explain the limitations of this experiment, and how we plan to address them in our next steps. -

- -
See this talk in the program
- -
- -

- Generating Trustworthy Hardware/Software I2C Drivers for Board Management Controllers -

-

- Talk -

-

- Presented by Zikai Liu, ETH Zurich -

-

- At the heart of every modern server platform sits an embedded system called theboard management controller (BMC) that is responsible for the low-levelfunctioning of the platform. Despite their critical nature, they are generallynot built as trustworthy systems. We have embarked on a journey tocyber-retrofit BMC firmware with seL4 as the kernel. In this talk, we present anupdate on our efforts -- generate trustworthy hardware/software I2C drivers. I2C is a low-level protocol used by BMCs to communicate with many peripherals(e.g. the power regulators). Unlike memory-mapped devices with one-to-oneinterfaces with the BMC, multiple I2C devices may share the same bus. Quirks ofone device can influence the whole assemblage. Therefore, to produce a correctdriver for I2C (and other bus-based protocols), we need to consider thespecifications of not only the controller but all devices on the bus. -

-

- We present Efeu, a framework that allows us to specify both the host-side driverand the peripherals. The specifications are composed of layers, which enableefficient modeling of different devices (including those with quirks). Theentire system is then model-checked using SPIN to ensure interoperability. Fromthat, Efeu generates trustworthy drivers in software and hardware. The softwareimplementations target seL4, but could also address other operating systems.Furthermore, when I2C communication speed or CPU usage is a concern, Efeu allowsgenerating hybrid hardware/software drivers, where the hardware part can bematerialized on programmable hardware such as Field Programmable Gate Arrays(FPGAs). We evaluated Efeu-generated I2C stacks on a Zynq MPSoC and show thatmodel-checking the whole system and generating the full stack is not onlypractical but that the resulting implementations can saturate the I2C bus andachieve competitive performance with off-the-shelf solutions. -

- -
See this talk in the program
- -
- -

- Using Model Checking to Develop and Verify Inter-Component Signalling Protocols -

-

- Talk -

-

- Presented by Courtney Darville, UNSW Sydney -

-

- The seL4 Device Driver Framework (sDDF) provides a lightweight library of device drivers and supporting virtualising components which allow clients to securely access and share devices. Each sDDF component is designed to handle one primary concern, and as a result, components have minimal knowledge of the system as a whole and instead communicate only with their direct neighbours. Components are event driven and and require a signal to be scheduled to process incoming data. A signalling protocol is the decision process a component goes through when deciding whether to signal its neighbour. -

-

- If a component signals its neighbour unconditionally when data is available, the system progresses without deadlock, however this often results in a large number of unnecessary signals - meaning the receiver was already awake, or had already been signalled but was yet to be scheduled. Designing a signalling protocol that avoids these unnecessary signals, but does not skip any necessary ones can be challenging, since the experimental absence of deadlocks does not necessarily imply deadlock freedom, and if a deadlock is encountered, it can be hard to replicate and understand. -

-

- Using formal methods, and in particular model checking, vastly improves the development process of signalling protocols, since the tool can verify for deadlock freedom whilst also producing detailed traces (interleavings of executions) when a deadlock is found. This talk details how the model checker SPIN was used to develop and analyse sDDF signalling protocols, ultimately resulting in a verified protocol that reduces the number of unnecessary signals by 47% when compared to unconditionally signalling. -

- -
See this talk in the program
- -
- -

- Rust Support in seL4 Userspace: Overview and Update -

-

- Talk -

-

- Presented by Nick Spinale, Colias Group, LLC -

-

- The development and maintenance of Rust support in seL4 userspace has been an official seL4 Foundation project since last year’s summit. This project’s scope includes libraries for interacting with the seL4 API, higher-level libraries for use in seL4 userspace (e.g. support for asynchronous programming and integration with the seL4 Device Driver Framework), Rust language runtimes for root tasks and Microkit protection domains, modular building blocks for custom seL4 userspace Rust language runtimes, a CapDL system initializer implementation, and an easy-to-use kernel loader. The past year has seen the expansion and refinement of this project’s library offerings, the release of relevant educational materials, and further integration with the rest of the seL4 software ecosystem. In this talk, we will cover progress since last year’s summit, demonstrate how to leverage this work in your own systems, and share our vision and goals for the path ahead. -

- -
See this talk in the program
- -
- -

- Pancake: a language for verified systems programming -

-

- Talk -

-

- Presented by Miki Tanaka, UNSW Sydney -

-

- We introduce Pancake, a new language for verifiable, low-level systems programming, especially device drivers. Pancake features a simple type system that makes it attractive to systems programmers, while at the same time aiming to ease the formal verification of code. Pancake has well-defined semantics which the compiler is proven to preserve, meaning that each generated binary code preserves the semantics of its original program. We have now extended Pancake with the shared memory capability which allows the programs to access device registers without escaping to C. -

-

- We present the design of the language and its verified compiler, as well as demonstrating its usability, performance and current limitations through case studies of device drivers and related systems components for an seL4-based operating system. -

- -
See this talk in the program
- -
- -

- Assured Reserve Modes -

-

- Talk -

-

- Presented by Ihor Kuz, Kry10 -

-

- When a digital system is undergoing cyber attack or is failing in some way, it is often necessary to take action different from its usual operating mode. These alternative modes of operation are called Reserve Modes. -

-

- There are several challenges in implementing reserve modes in systems. The first challenge is developing a mechanism for defining and loading all modes into a system at boot time and enabling alternative modes as necessary. The second challenge is making these changes without affecting or disturbing parts of the system not involved in the reserve modes. The final and hardest challenge is being able to perform such system level changes with assurance that the reserve modes will be enabled as required and operate as expected, without modification. -

-

- This presentation introduces Assured Reserve Modes on the seL4-based Kry10 OS. Assured Reserve Modes are a mechanism for providing reserved modes that successfully address the above challenges - implementing reserved mode functionality and providing assurance that they work correctly. We explain the concept of reserve modes and provide examples of reserve modes and their benefits, present the Assured Reserve Mode design and implementation, and discuss how to provide the assurance that they require. -

- -
See this talk in the program
- -
- -

- Assured Reserve Modes in Action -

-

- Talk -

-

- Presented by Ihor Kuz, Kry10 -

-

- Assured Reserve Modes are a mechanism that we’ve developed for the seL4-based Kry10 OS that allows a system to switch between pre-configured operating modes at runtime in response to security, safety, and other routine operational events. In this presentation we show the operation of assured reserve modes in action. -

-

- We present the Kry10 OS design and implementation of assured reserve modes, demonstrating their application to a representaive industrial control system (based on the Fischertechnik Training Factory 4.0). The system is exposed to security and safety incidents, which it will detect and then switch into appropriate reserve modes in order to mitigate, resolve, or contain the problem. -

-

- This presentation is a companion to the Assured Reserve Modes presentation that describes the assured reserve mode model and mechanism itself. -

- -
See this talk in the program
- -
- -

- Supporting container applications on Kry10 OS -

-

- Talk -

-

- Presented by Alison Felizzi, Kry10 -

-

- Container solutions have been instrumental throughout cloud computing, influencing how developers build and automate their application deployments. A core benefit behind containers is that they provide a standardised abstraction layer of an application's underlying OS infrastructure. These abstractions help isolate an application's code and system dependencies, whilst conveniently packaging said dependencies into images that can be easily revision controlled and managed in CI/CD pipelines. When applying this technology to embedded systems, containers offer the potential for simplifying application development workflows, whilst also providing a useful CI/CD mechanism for deploying software updates to deployed devices. seL4 is uniquely suited to power a modern generation of embedded devices and using containers brings with it modern software development practices that makes it easier to manage fleets of devices. -

-

- Deploying containers on embedded systems is not necessarily new and has been demonstrated across various embedded Linux deployments. At Kry10 we recognise the value of using containers and see the conveniences it can bring to a developers workflow and the capabilities it provides for developing update-able and maintainable systems. We've implemented first-class container support in Kry10 OS that allows developers to define and package native and VM-based applications. In this talk, I'll present the design and implementation behind our seL4-based container support. I'll step through how container builds are used to package and deploy different types of applications on Kry10 OS, starting from simple native applications, and as the needs and runtime requirements of the application grow, moving onto more complex microVM-style applications. -

- -
See this talk in the program
- -
- -

- Exploring an seL4-based Trusted Execution Environment in a RISC-V Platform -

-

- Talk -

-

- Presented by Everton de Matos, TII -

-

- The utilization of seL4, a high-assurance microkernel, in a Trusted Execution Environment (TEE) on RISC-V hardware, presents a robust solution for secure computing. This year, we build upon our foundational work with new insights into the performance impacts and enhancements of our TEE. -

-

- We present empirical data on the CPU, memory, and I/O performance impacts of having a seL4 TEE on a PolarFire RISC-V platform and run different TEE services performance measurements. The insights into performance nuances, such as the minimal overhead introduced by the seL4 TEE and its operational efficiency in handling cryptographic tasks, solidify the practical benefits of our architecture. Furthermore, we outline ongoing advancements and future directions in enhancing the seL4-based TEE. -

- -
See this talk in the program
- -
- -

- Bridging Academia and Industry -

-

- Talk -

-

- Presented by Yanyan Shen, NIO -

-

- A formally-verified microkernel is a great start, and an OS needs more than a microkernel. Over the past years, we have been building a vehicle operating system and toolsets based on seL4 from scratch. It is very challenging, especially when dependability is the top priority. In this talk, we would like to share our experiences along the journey, with an emphasis on the following topics: (1) POSIX or not, that is not a question. To leverage the existing code base and 3rd party libraries, a layered approach is adopted: The system has a core system call layer and a POSIX layer based on the core layer. System components use the core layer. Applications and 3rd party libraries use the POSIX interfaces. (2) Tooling is especially important for development efficiency and system usability. System status monitoring and comprehensive logging are critical since we rely on them to analyze issues remotely. Additionally, a building and integration tool is specifically designed to manage the building and releasing process of the OS and applications. (3) Resource management needs more thoughts. Seasoned system developers are surprised by another form of resource leakage: capability slot leakage. Access control to resources that are not managed by the kernel directly through capabilities also deserves some discussion. (4) Product-level maturity is paramount. We wish that the major OS components could be verified, but at least for now, realistically, various levels of testing are used to stabilize and mature the new OS. -

- -
See this talk in the program
- -
- -

- seL4 Infrastructure: USB and Beyond -

-

- Talk -

-

- Presented by Bill Ellis, Capgemini -

-

- Since 2021, a small team at Capgemini have been making contributions toward the seL4 infrastructure, assisting developers in getting started with seL4. Previously, building atop CAmkES, we presented a Developer Kit (from zero to "hello world"), a framework to access the U-boot driver suite, and initial efforts in preparing a native xHCI driver (USB 3.0). Now, we present the conclusion of these efforts. -

-

- We transition our entire suite of contributions from CAmkES to Microkit. A greater range of USB device classes are now supported. A simple native HDMI driver is introduced. And we leverage sDDF and VMM, in permitting the secure routing of a selected physical USB device into a guest host. While our primary focus has been the Avnet MaaXBoard, many of these contributions would be readily portable to other platforms. More generally, as our focus on seL4 infrastructure reaches a conclusion, we describe our journey with seL4 thus far, summarising our overall contributions and experiences. -

-
See this talk in the program
- -
- -

- Building a Commercial Virtualized Mobile Device with seL4 – Part 3 -

-

- Talk -

-

- Presented by Jason Sebranek, Cog Systems, Inc. -

-

- In 2017 Cog Systems developed a single domain virtualized device on an HTC One A9 smartphone, and successfully validated it against the National Information Assurance Partnership (NIAP) Protection Profile (PP) for Mobile Device Fundamentals (MDF) and registered the device with the National Security Agency (NSA) as an Approved Component under its Commercial Solutions for Classified (CSfC) process. In the past few years we have been building the next-gen version of this solution. -

-

- At the 2020 seL4 Summit, Cog Systems presented this effort as a case study in applying seL4 to a product commercialization effort. Since then, the project has experienced multiple and varied challenges, and has not yet been completed. At the 2023 Summit we gave a follow-up presentation detailing the progress, setbacks, and lessons learned of the past few years. Now, in the 2024 continuation of the series, Cog Systems will provide an update and share some of the technical, logistical, and financial challenges we encountered while building a commercial smartphone product with seL4. -

- -
See this talk in the program
- -
- -

- Doing Nix for seL4: Towards more Infrastructure-as-Code -

-

- Talk -

-

- Presented by Wanja Zaeske, Deutsches Zentrum für Luft- und Raumfahrt (DLR) -

-

- Compiling the seL4 kernel itself might be simple, but once more and more of the seL4 ecosystem is involved, transitive dependencies from Python to Haskell complicate things. To tackle this complexity, we added yet another layer on top, a declarative build system that allows to provide all the (transitive-) dependencies from one hand: Nix. -

-

- This talk introduces you to the seL4-nix-utils, a collection of Nix expressions to compile but also ease integration and project bring-up with seL4. After a brief introduction to the mechanism behind Nix, we outline the provided Nix expressions and their use-cases. The talk closes with a list of remaining pain-points and a reference to a hands-on you may try after the talk. -

- -
See this talk in the program
- -
- -

- seL4 in Software-Defined Vehicles: Vision, Roadmap, and Impact at NIO -

-

- Keynote -

-

- Presented by Ning Qu, NIO -

-

- The automotive industry is rapidly evolving, with software-defined vehicles (SDVs) at the forefront of this transformation. At NIO, we are leveraging the seL4 microkernel to redefine vehicle architecture, ensuring robust safety, reliability, and performance. This presentation will explore the vision behind integrating seL4 into our SDV platform. We will share the journey of delivering the seL4-based SkyOS-M within the ONVO vehicle on our latest NT3 platform, highlight the significant impact this integration has had on our vehicle design and functionality, and outline our future roadmap beyond the current launch. -

-
See this talk in the program
- -
- -

- Enhancing seL4’s C/C++ userspace memory safety using CHERI -

-

- Talk -

-

- Presented by Hesham Almatary, Capabilities Limited -

-

- seL4 currently provides, formally verified, memory safety guarantees in the kernel and isolation guarantees between seL4's userspace tasks, but there is no safety within a single seL4 task or protection domain itself (e.g., VMs or single-address-space servers such as rumprun). According to a recent Microsoft study, memory safety vulnerabilities account for 70% of all software vulnerabilities. CHERI is a capability-based hardware-software architecture aiming to address memory-safety and software compartmentalisation issues. The goal of this project is to have a complete memory-safe C/C++ seL4-based software stack using CHERI on Morello, without having to re-write the existing seL4 C/C++ userspace libraries (currently over 250 KLoC, using sloc tool) from scratch or formally verify them. This talk will describe the progress of CHERIfying the existing seL4's userspace in order to have complete (spatial) memory and pointer safety. -

- -
See this talk in the program
- -
- -

- Hardware Support for Time Protection -

-

- Talk -

-

- Presented by Nils Wistoff, ETH Zurich -

-

- Timing channels enable information leakage across address spaces, bypassing an operating system’s security boundaries. They can result from any shared microarchitectural state that depends on previous execution and affects a system’s timing. Closing timing channels (aka “time protection”) requires strict partitioning of microarchitectural state, which is not feasible (or extremely expensive) in current ISAs. -

-

- At the 2022 seL4 summit, we presented the custom RISC-V fence.t instruction to temporally partition on-core processor state in CVA6, a simple in-order RV64GC processor. This year’s talk will propose a minimal ISA extension that enables hybrid spatial and temporal partitioning of a complete system-on-chip comprising complex out-of-order CPUs, last-level caches, and DRAMs, making system-wide microarchitectural state a first-class resource that can be managed by the OS. We will highlight hardware design implications in different system components and present preliminary experimental results detailing the efficacy and performance overheads of the proposed solution based on extended hardware systems running seL4. -

- -
See this talk in the program
- -
- -

- Verification Status of Time Protection and Microkit-based OS Services -

-

- Talk -

-

- Presented by Robert Sison, UNSW Sydney -

-

- This talk will give an overview of the status of ongoing and planned research and development at Trustworthy Systems to expand the scope of proofs about seL4-based operating systems in two directions: (1) downwards, to prove that the seL4 kernel implements time protection correctly at the abstract and C specification levels, and (2) upwards, to prove functional specifications of seL4's system calls and on that basis carry out SMT-based automated deductive verification of the user-level seL4 Microkit and Lions OS service components built on top of it. Here I will lay out the research and engineering challenges facing us on both these fronts and the planned subprojects for which we seek talented PhD students, postdocs and engineers to tackle them. -

- -
See this talk in the program
- -
- -

- seL4 as a CPU Driver for an OS for Real Computers -

-

- Talk -

-

- Presented by Roman Meier, ETH Zurich -

-

- Modern operating systems—including seL4—are written to a fictional model of machine hardware from the 1960s and 1970s: a set of homogeneous cores accessing a common physical address space containing main memory, plus memory-mapped devices. However, modern SoCs and server platforms are really a complex network of heterogeneous cores and intelligent devices, many of which are running their own firmware and "operating systems". The result is a catastrophe of system design, including a plethora of security exploits like remote over-the-air compromises due to weaknesses in WiFi modem firmware. Link: https://googleprojectzero.blogspot.com/2017/04/over-air-exploiting-broadcoms-wi-fi_11.html. -

-

- We are building Kirsch, a new OS that solves this problem by embracing and formally capturing the heterogeneity and multiple trust domains of modern hardware. To this end, Kirsch formally models what each hardware context can access using a decoding net representation of the platform (Link "Putting out the hardware dumpster fire", https://doi.org/10.1145/3593856.3595903), which induces a trust relationship between contexts. This trust relationship is the basis for reasoning about isolation, protection and authorization in the system. An seL4 instance can run from, and manage, a region of RAM which is explicitly isolated from untrusted contexts in the system, by using the trust an access information we formally derived. Kirsch thus recovers the power of the seL4 correctness proofs, and we can finally use the seL4 kernel to run truly isolated processes and virtual machines. -

- -
See this talk in the program
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2024/cfp.html b/PR_400/Foundation/Summit/2024/cfp.html deleted file mode 100644 index 81ac5794..00000000 --- a/PR_400/Foundation/Summit/2024/cfp.html +++ /dev/null @@ -1,354 +0,0 @@ - - - - - - CFP | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- Call For Presentations for the seL4 Summit 2024 -

- -
-

- Important Dates: -

-
    -
  • Abstracts due: 22 April 2024 29 April 2024
  • -
  • Notification of decisions: 7 June 2024
  • -
  • Summit: 15-17 October 2024
  • -
-
- - -
-

- Overview -

-

- - The seL4 summit aims at gathering the seL4 community to - learn, share, and connect: -

-
    -
  • - - learn about the seL4 technology, its latest progress, use, - successes, challenges, plans; - -
  • -
  • - - share exciting seL4 development, research, experience, - application in the real world; - -
  • -
  • - - connect with other seL4 developers, users, providers, - supporters, potential partners, and enthusiasts. - -
  • -
- - -

- - The seL4 summit covers the complete seL4 ecosystem, consisting of the verified - microkernel, as well as all seL4-related technology, tools, infrastructure, - products, projects, and people. - -

- -

- - The seL4 summit 2024 will be in Sydney, Australia. - -

- -
- - - -
-

- Topics -

-

-We solicit proposals on any seL4-related topic, in particular in the areas of: -

-
    -
  • - seL4 on-going and planned R&D, mature or early stage: -
      -
    • - seL4 research efforts -
    • -
    • - seL4 development efforts -
    • -
    • - work-in-progress seL4 development -
    • -
    • - student work on seL4 -
    • -
    • - new/missing/next-gen kernel mechanisms -
    • -
    • - seL4-related roadmaps: what you plan to work on and when -
    • -
    • - seL4 grand challenges -
    • -
    • - OS frameworks and services -
    • -
    • - seL4 userland with programming language support beyond C -
    • -
    • - High performance systems based on seL4: pushing the boundaries -
    • -
    -
  • -
  • - seL4 experience reports -
      -
    • - experience with deploying seL4 in the field, in commercial/deployed products -
    • -
    • - experience with teaching seL4 -
    • -
    • - experience with seL4 in certification schemes and application of industry standards -
    • -
    • - experience with “building a business case for using a verified kernel” -
    • -
    • - experience with porting software from other OSes -
    • -
    -
  • -
  • - seL4 and hardware -
      -
    • - ports to new hardware platforms or architectures -
    • -
    • - multicore systems -
    • -
    • - virtualisation -
    • -
    • - new/proposed hardware features or architectures, which could also enable or broaden the scope of formal reasoning (e.g. about time protection) -
    • -
    • - seL4 in embedded processors on FPGAs, and impact of assured separation -
    • -
    • - IOMMU solutions for various hardware architectures and impact for seL4 -
    • -
    -
  • -
  • - seL4 and assurance: -
      -
    • - application-level verification leveraging seL4 proofs -
    • -
    • - correctness, spatial separation, temporal separation, and real-time proofs -
    • -
    • - formalised interface between or composition of kernel-level proofs and user-level proofs -
    • -
    • - verification engineering at scale, scaling verification productivity -
    • -
    • - security/safety impact/assurance/certification for an seL4-based system -
    • -
    -
  • -
- -
- - - -
-

- Submission -

-

- - If you would like to propose a talk, please upload an abstract of one page or less for your - proposed talk by 22 April 2024 29 April 2024 on the submission portal. Abstracts should indicate why the talk fits in the seL4 summit - scope. Notifications of accepted presentations will be made by 7 June 2024. - -

-

- If you'd love to hear about some specific work from other people in the community, we encourage you to reach out to them to incite them to submit a proposal. :-) Alternatively, let us know at summit@sel4.systems. -

- -
- -
-

- Open invitation for a 5-minute slot to talk about your seL4 deployment -

-

- The community loves to hear about the deployment of seL4. So, if you: -

-
    -
  1. are selling an end-user product that has seL4 embedded within, or
  2. -
  3. have integrated an seL4-based system/component into a deployed system,
  4. -
-

- you are welcome to a 5-min slot at the summit to talk about it, regardless of whether you are submitting an abstract for a full presentation! Simply send a short description by email to summit@sel4.systems by . -

-
- -
-

- Contact -

-

- If you have questions, please do not hesitate to contact the seL4 Foundation summit team at: summit@sel4.systems. -

- -
-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2024/index.html b/PR_400/Foundation/Summit/2024/index.html deleted file mode 100644 index 08e1d0ff..00000000 --- a/PR_400/Foundation/Summit/2024/index.html +++ /dev/null @@ -1,651 +0,0 @@ - - - - - - Summit | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - - -

- seL4 Summit 2024 -

-

- Sydney, Australia -

-

- 15-17 October 2024 -

- - - - - -
- All summits: 2022 2023 2024 -
- -
-

- Important Dates: -

-
    -
  • Abstracts due: 22 April 2024 29 April 2024
  • -
  • Notification of decisions: 7 June 2024
  • -
  • Early bird cut-off: 15 September 2024
  • -
  • Summit: 15-17 October 2024
  • -
-
- -
-

- About -

-

- The seL4 Summit is the annual international summit on the seL4 microkernel, the world's most highly assured OS kernel, as well as on all seL4-related technology, tools, infrastructure, products, projects, and people. -

-

- It aims to gather all the seL4 community to learn, share, and connect: -

-
    -
  • learn about the seL4 technology, its latest progress, use, successes, challenges, plans;
  • -
  • share exciting seL4 development, research, experience, application in the real world;
  • -
  • connect with other seL4 developers, users, providers, customers, supporters, potential partners and enthusiasts.
  • -
-

- The seL4 Summit is organised by the seL4 Foundation, aiming for a location on a different continent each year, to the extent possible. -

-

- An open call for presentations invites submissions of short abstracts about cool work on seL4, and a Program Committee made of a wide range of representatives of the seL4 community is in charge of the technical content (reviewing submission, selecting invited speakers, defining the program). -

-
- -
-

- Registration -

-

- The seL4 summit will cover the complete seL4 ecosystem, consisting of the verified microkernel, as well as all seL4-related technology, tools, infrastructure, products, projects, and people. -

-

- Tickets include: -

-
    -
  • Participation in the 3-day conference, including talks, keynotes, seL4 updates & discussions
  • -
  • Networking with other seL4 experts and enthusiasts
  • -
  • Reception and dinner
  • -
-

- Register here -

-

- The early bird cut-off date is 15 September 2024. -

-
- -
-

- Location & Venue -

-

- The seL4 Summit 2024 will be held in Sydney, Australia in 15-17 October 2024 at Holiday Inn Sydney Potts Point. -

-

- Further information about location, venue and travel is available on the Linux Foundation registration site. -

-
- - -
-

- Program & Abstracts -

-

- Check out the summit Program and Abstracts for our list of speakers and presentations. -

-

-

- See the Schedule on LF Events. -

-
- - - -
-

- Submissions and Call for Presentations -

-

- Share your seL4 work, experience and thoughts at the seL4 summit 2024 in Sydney by submitting a presentation proposal by 22 April 2024 29 April 2024. Find all the submission information in the Call for Presentations. -

-
- - - -
-

- Keynote Speakers -

-
- - - -
-

- Training day @ UNSW -

-

- 18 October 2024 -

-

- Room G10 in the Electrical Engineering Building -

-

Registration for training day

-

- Register for the LionsOS, Rust or both tutorials -

-

- Training day @ UNSW is free, but please register by 15 September 2024 30 September 2024 so that we can account for numbers. Lunch is not included but there are plenty of coffee and food outlets on campus. -

-
-

Using LionsOS

-

- Ivan Velickovic, - UNSW Sydney -

-

- 10:00 - 12:30 -

-

- LionsOS is a new Operating Systems developed at Trustworthy Systems aimed at embedded, IoT, and cyberphysical systems. LionsOS is based on the seL4 Microkit and is desgined to formally verifiable, performant, and adaptable to a wide class of use-cases. -

-

- LionsOS, by design, is not a conventional OS and hence it may be overwhelming for users who want to get started and are not familiar with the ideas and goals of LionsOS. -

-

- This hands-on tutorial aims to ease people into creating a LionsOS-based system. We will be using the components and tools provided by LionsOS to, step-by-step, transform a minimal boilerplate system to a functional system involving various drivers, virtual machines and other components. -

-

- See the training in the program. -

-

What to bring:

-
    -
  • Your own laptop
  • -
-
-
-

Using Rust in seL4 Userspace

-

- Nick Spinale, - Colias Group, LLC -

-

- 14:00 - 16:30 -

-

- - Rust logo - - Rust has been an officially supported language for use in seL4 userspace since last year's summit. In this workshop, participants will be led through a tutorial that demonstrates how to leverage Rust and its ecosystem to rapidly build memory-safe components for seL4-based systems. This tutorial will cover a range of scenarios, including Microkit protection domains as well as building on seL4 directly. -

-

- See the training in the program. -

-

What to bring:

-
    -
  • Your own laptop with Docker installed.
  • -
-
-
- - -
-

Social activities

-

- A number of informal social activities are being organised by local Sydney-siders. Check out the list and contact the organisers to register your interest. -

-
- - -
-

- Program Committee -

- -

- Our awesome team comes from various parts of the seL4 ecosystem: users, contributors, committers, experts, advocates, researchers, and engineers. -

- -
-
-
- Ihor Kuz -
- -
- Kry10 -
-
- -
-
- Nick Spinale -
- -
- Colias Group -
-
- -
-
- NCSC -
- -
- NCSC -
-
- -
-
- Alison Felizzi -
- -
- Kry10 -
-
- -
-
- David Hardin -
- -
- Collins -
-
- -
-
- Everton de Matos -
- -
- TII -
-
- -
-
- Gernot Heiser -
- -
- UNSW -
-
- - - -
-
- John Hatcliff -
- -
- KSU -
-
- - -
-
- - Lucy Parker -
- -
- -
-
- Matthew Brecknell -
- -
- Kry10 -
-
- -
-
- Michal Podhradsky -
- -
- Galois -
-
- -
-
- Robbie VanVossen -
- -
- Dornerworks -
-
-
-
- -
-

- Sponsors -

-

- We are grateful to the following sponsors for their financial support of the seL4 summit 2024. -

-
- -
- -
-
- - -
-
- - -
-
-

- See here if - you are interested in sponsoring the seL4 summit 2024. -

-
- - -
-

- Contact -

-

- For any questions regarding the summit, please contact summit@sel4.systems. -

-
-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2024/program.html b/PR_400/Foundation/Summit/2024/program.html deleted file mode 100644 index 61036777..00000000 --- a/PR_400/Foundation/Summit/2024/program.html +++ /dev/null @@ -1,524 +0,0 @@ - - - - - - Summit program | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2024 -

-

- Sydney, Australia -

-

- 15-17 October 2024 -

- -

- Program -

-
-

- All times are local time in Sydney, Australia (GMT+11). -

-

- See the Schedule on LF Events. -

-
-
-

Social activities

-

- A number of informal social activities are being organised by local Sydney-siders. Check out the list and contact the organisers to register your interest. -

-
- -

Summit

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Day 1 15 October 2024
Session chair
9:00 - 9:10AnnouncementsWelcomeIhor Kuz
9:10 - 10:00KeynoteIndustrial Scale Proof Engineering for Critical Trustworthy Applications (INSPECTA)
Darren Cofer, - Collins Aerospace -
Break
10:30 - 11:00TalkseL4 Verification: Status and Plans
Gerwin Klein, June Andronick, Rafal Kolanski, Gerwin Klein, Corey Lewis, Michael McInerney, - Proofcraft -
Matthew Brecknell
11:00 - 11:30TalkseL4 multikernel roadmap and concurrency verification
Gerwin Klein, Corey Lewis, - Proofcraft -
11:30 - 12:00TalkThe Neutrality Atoll Hypervisor and the seL4 Multikernel
David Cock, Mathieu Mirmont, Stevens Le Blond, - Neutrality -
Lunch
13:30 - 13:45TalkLions OS: Secure, fast, adaptable!
Gernot Heiser, - UNSW Sydney -
Everton de Matos
13:45 - 14:15TalkIn and Around Lions OS
Ivan Velickovic, - UNSW Sydney -
14:15 - 14:30TalkThe Secure Multiserver Operating System Framework
Alwin Joshy, Kevin Elphinstone, Gernot Heiser, Craig McLaughlin, - UNSW Sydney -
14:30 - 15:00TalkRunning Certified Operating Systems under the seL4 Hypervisor
Chris Guikema, - DornerWorks -
Break
15:30 - 16:00TalkSecuring ROS Systems with seL4
Nathan Studer, Alex Pavey, Zach Clark, DornerWorks, Dariusz Mikulski, Cristian Balas, Yale Empie, - US Army - Ground Vehicle Robotics -
Gernot Heiser
16:00 - 16:15TalkExperience Developing Code for the seL4 Environment
Caitlyn Wilde, Wyeth Greenlaw Rollins, Alain Kägi, - Lewis & Clark College -
16:15 - 16:30TalkTransitioning from CAmkES VMM to MicroKit VMM
Leigha VanderKlok, - DornerWorks -
16:30 - 16:45UpdateseL4 Foundation Update
June Andronick, - seL4 Foundation
Cocktail reception @ Verandah Public 18:00
Day 2 16 October 2024
Session chair
9:00 - 10:00Panel
- -
Nick Spinale
Break
10:30 - 11:00TalkFirst steps towards verification of user-space systems
Matthew Brecknell, - Kry10 -
Gerwin Klein
11:00 - 11:30TalkGenerating Trustworthy Hardware/Software I2C Drivers for Board Management Controllers
Daniel Schwyn, Zikai Liu, Timothy Roscoe, - ETH Zurich -
11:30 - 11:45TalkUsing Model Checking to Develop and Verify Inter-Component Signalling Protocols
Courtney Darville, - UNSW Sydney -
11:45 - 12:00TalkRust Support in seL4 Userspace: Overview and Update
Nick Spinale, - Colias Group, LLC -
12:00 - 12:15TalkPancake: a language for verified systems programming
Miki Tanaka, Johannes Åman Pohjola, Gernot Heiser - UNSW Sydney -
Lunch
13:45 - 14:15TalkAssured Reserve Modes
Ihor Kuz, - Kry10, Lance Joneckis, Idaho National Laboratory -
Robbie VanVossen
14:15 - 14:30TalkAssured Reserve Modes in Action
Ihor Kuz, - Kry10, Lance Joneckis, Idaho National Laboratory -
14:30 - 14:45TalkSupporting container applications on Kry10 OS
Alison Felizzi, - Kry10 -
14:45 - 15:00TalkExploring an seL4-based Trusted Execution Environment in a RISC-V Platform
Everton de Matos, - TII -
Break
15:30 - 16:00TalkBridging Academia and Industry
Yanyan Shen, Dhammika Elkaduwe, - NIO -
June Andronick
16:00 - 16:30TalkseL4 Infrastructure: USB and Beyond
Bill Ellis, James Nevell, Stephen Williams, Josh Felmeden, Daniel Storer, Tom Harvey, - Capgemini -
16:30 - 16:45TalkBuilding a Commercial Virtualized Mobile Device with seL4 – Part 3
Jason Sebranek, - Cog Systems, Inc. -
16:45 - 17:00TalkDoing Nix for seL4: Towards more Infrastructure-as-Code
Wanja Zaeske, - Deutsches Zentrum für Luft- und Raumfahrt (DLR) -
Dinner @ The Butler 18:00
Day 3 17 October 2024
Session chair
9:00 - 9:50KeynoteseL4 in Software-Defined Vehicles: Vision, Roadmap, and Impact at NIO
Ning Qu, - NIO -
Ihor Kuz
9:50 - 10:00Announcements
- -
Break
10:30 - 11:00TalkEnhancing seL4’s C/C++ userspace memory safety using CHERI
Hesham Almatary, - Capabilities Limited -
Lucy Parker
11:00 - 11:15TalkHardware Support for Time Protection
Nils Wistoff, ETH Zurich, Gernot Heiser, UNSW Sydney, Luca Benini, ETH Zurich & University of Bologna -
11:15 - 11:45TalkVerification Status of Time Protection and Microkit-based OS Services
Robert Sison, - UNSW Sydney -
11:45 - 12:15TalkseL4 as a CPU Driver for an OS for Real Computers
Roman Meier, Zikai Liu, Ben Fiedler, Timothy Roscoe, - ETH Zurich -
Lunch
13:30 - 13:45PlenaryDiscussion, BoF TeasersIhor Kuz/Nick Spinale
14:00 - 15:00PlenaryBoFs
Break
15:30 - 16:30PlenaryBoFsIhor Kuz/Nick Spinale
16:30 - 16:45PlenaryReport from BoFs + Discussion
16:45 - 17:00Concluding remarks
- -
Day 4 18 October 2024 Training day @ UNSW 
10:00 - 12:30TrainingUsing LionsOS
Ivan Velickovic, - UNSW Sydney
14:00 - 16:30TrainingUsing Rust in seL4 Userspace
Nick Spinale, - Colias Group, LLC -
-
-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2024/social-activities.html b/PR_400/Foundation/Summit/2024/social-activities.html deleted file mode 100644 index 3aedc5cb..00000000 --- a/PR_400/Foundation/Summit/2024/social-activities.html +++ /dev/null @@ -1,282 +0,0 @@ - - - - - - Summit program | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2024 -

-

- Sydney, Australia -

-

- 15-17 October 2024 -

- -

- Social Activities -

-

- A number of informal social activities are being organised by local Sydney-siders. Check out the list and contact the organiser to register your interest. -

-

- This list is in chronological order. Note that some activities require advanced bookings, by 20 September 2024. -

- - -
-

Blue Mountains bush walk

- Blue Mountains -

- Gernot plans to take a group on a walk, most likely in the stunning Blue Mountains, which are about a 1.5 hours drive from Sydney. Please contact Gernot Heiser for further details. -

-

- When: Sunday 13 Oct 2024 -

-

- Bring: -

-
    -
  • Hat
  • -
  • Sunscreen
  • -
  • Water bottle
  • -
  • Raincoat (depending on weather)
  • -
-

- Contact: Gernot Heiser -

-
- -
-

Bondi to Coogee walk

- Bondi Beach -

- June will take a group on the iconic Bondi to Coogee walk, with optional dinner to follow at Coogee for people who are interested. -

-

- When: Monday 14 Oct 2024, starting at 3:30pm -

-

- Where: Bondi Beach -

-

- Cost: Free, with the option of buying dinner at Coogee -

-

- Bring: -

-
    -
  • Hat
  • -
  • Sunscreen
  • -
  • Water bottle
  • -
  • Umbrella or raincoat (depending on weather)
  • -
  • Swimmers and towel (optional, if you want to have a swim at Bondi before 3:30pm, or at Coogee on arrival)
  • -
-

- Contact: June Andronick -

-
- -
-

A guided tour of The Rocks

- Sydney Opera House -

- Birg will organise a guided tour of The Rocks, which gives an account of Sydney's colonial heritage. -

-

- Bookings are required by 4 October 2024. Min group size 12. Max group size 20. -

-

- When: Monday 14 Oct 2024, meet at 3:15pm, tour 3:30-5pm -

-

- Where: The Rocks Walking Tours -

-

- Cost: $35 AUD per person -

-

- Bring: -

-
    -
  • Hat
  • -
  • Sunscreen
  • -
  • Water bottle
  • -
  • Umbrella or raincoat (depending on weather)
  • -
-

- Contact: Birgit Brecknell -

-
- -
-

A guided tour of the Maritime Museum

- Sydney Harbour -

- Peter will lead a guided tour of the Australian National Maritime Museum. The tour will include onboard experiences of the major vessels: -

- -

- Please contact Peter Chubb for further details, including how to make your booking. -

-

- Bookings are required by 4 October 2024. -

-

- When: Saturday 19 Oct 2024, 11am. If there is more interest, Peter will also lead a tour on Saturday 12 Oct 2024, 11am. -

- Where: Australian National Maritime Museum -

-

- Cost: $25 AUD per person -

-

- Bring: -

-
    -
  • Flat, closed shoes. Note that headroom clearances aboard Endeavour are 1200mm in places, and all ships except Duyfken involve ladders, which is why you can't wear high heels or flip-flops.
  • -
-

- Contact: Peter Chubb. -

-
-
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/2024/submit.html b/PR_400/Foundation/Summit/2024/submit.html deleted file mode 100644 index c0c1e377..00000000 --- a/PR_400/Foundation/Summit/2024/submit.html +++ /dev/null @@ -1,166 +0,0 @@ - - - - - - submit | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit 2024 -

-

- Sydney, Australia -

-

-15-17 October 2024 -

- -
-

- Important Dates: -

-
    -
  • Abstracts due: 22 April 2024 29 April 2024
  • -
  • Notification of decisions: 7 June 2024
  • -
  • Summit: 15-17 October 2024
  • -
-

- The submissions portal is now closed. Further information on the Call for Presentations. -

-

- Please contact summit@sel4.systems if you have any questions. -

-
- -
- -
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Summit/abstracts2022.html b/PR_400/Foundation/Summit/abstracts2022.html deleted file mode 100644 index faa91540..00000000 --- a/PR_400/Foundation/Summit/abstracts2022.html +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Summit/abstracts2022.pml b/PR_400/Foundation/Summit/abstracts2022.pml deleted file mode 100644 index faa91540..00000000 --- a/PR_400/Foundation/Summit/abstracts2022.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Summit/abstracts2023.html b/PR_400/Foundation/Summit/abstracts2023.html deleted file mode 100644 index e63b2f73..00000000 --- a/PR_400/Foundation/Summit/abstracts2023.html +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Summit/abstracts2023.pml b/PR_400/Foundation/Summit/abstracts2023.pml deleted file mode 100644 index e63b2f73..00000000 --- a/PR_400/Foundation/Summit/abstracts2023.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Summit/cfp.html b/PR_400/Foundation/Summit/cfp.html deleted file mode 100644 index 2996d835..00000000 --- a/PR_400/Foundation/Summit/cfp.html +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Summit/home.pml b/PR_400/Foundation/Summit/home.pml deleted file mode 100644 index cb2a5a64..00000000 --- a/PR_400/Foundation/Summit/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Summit/index.html b/PR_400/Foundation/Summit/index.html deleted file mode 100644 index 58e19071..00000000 --- a/PR_400/Foundation/Summit/index.html +++ /dev/null @@ -1,157 +0,0 @@ - - - - - - The seL4 Summit | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 summit logo - -

- seL4 Summit -

-

The annual summit organised by the seL4 Foundation

- -
- -
- - seL4 summit 2024 -
- -
- - seL4 summit 2023 -
- -
- - seL4 summit 2022 -
- -
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Support/home.pml b/PR_400/Foundation/Support/home.pml deleted file mode 100644 index b1fff520..00000000 --- a/PR_400/Foundation/Support/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Support/index.html b/PR_400/Foundation/Support/index.html deleted file mode 100644 index c0909eee..00000000 --- a/PR_400/Foundation/Support/index.html +++ /dev/null @@ -1,199 +0,0 @@ - - - - - - Support | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- Funding the next big steps for the seL4 project -

-
-

- Alongside growing the seL4 ecosystem, protect and promote the seL4 brand - and provide longevity to seL4, one of the aims of the - seL4 foundation is to provide an avenue for - funding on-going research, - on-going engineering as well as sharing the cost of "big-ticket" - verification items, through its membership revenue, and through specific - fund-raising to address particular needs. -

-

- Together, we can change the world of critical systems, - to achieve real security! - -

- -

- Support by joining -

-

- By joining the adventure, you can support: -

-
    -
  • - The funding of an on-going support of the community, maintenance of existing versions, - improvements of the infrastructure (in particular the automation of the seL4 verification - framework), evolution of the kernel, and, importantly, development of the ecosystem. -
  • -
  • - The funding of big-ticket items that are crucial to our aim of making seL4 ubiquitous. - The biggest of these are: -
      -
    • Verification of the 64-bit Arm kernel -
    • -
    • Verification of the multicore kernel -
    • -
    • Completion of the verification of the MCS (Mixed-Criticality System) kernel -
    • -
    - The interest for these items is strong but the investment required - is above the pain limit of most single organisations. The foundation - provides a vehicle to pool investments to achieve these. -
    - These three projects are open for donations, and we have started receiving partial funding to tackle them. If you would like to contribute to this pooled investment, please do so with a donation marked specifically for one of these projects. Please contact us and we'll assist you through the process. -
  • -
- -

- Support by donating -

-

- You can contribute to seL4 though the Linux Foundation's - crowdfunding portal. -

-

- Alternatively, for larger donations, we can raise an invoice through - the Linux Foundation, - please contact us if you - want to take this route. -

- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/TSC/home.pml b/PR_400/Foundation/TSC/home.pml deleted file mode 100644 index bc12ad38..00000000 --- a/PR_400/Foundation/TSC/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/TSC/index.html b/PR_400/Foundation/TSC/index.html deleted file mode 100644 index 2eeb3397..00000000 --- a/PR_400/Foundation/TSC/index.html +++ /dev/null @@ -1,300 +0,0 @@ - - - - - - seL4 TSC | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

Technical Steering Committee

- -

The Technical Steering Committee (TSC) of the seL4 Foundation is - responsible for overseeing all technical aspects of the seL4 project - (technical direction, code of conduct, procedures, workflows, - quality control, etc). It is made up of seL4 developers, proof engineers, - and technical leaders. - Their role is described in detail in the - seL4 - Foundation Technical Charter. -

- - -

Members

- -
- -
-
- Yanyan Shen -
- -
- -
-
- Matthew Brecknell -
- -
- -
-
- Ihor Kuz -
-
- Ihor Kuz -
-
- -
-
- Gerwin Klein -
-
- Gerwin Klein (chair) -
-
- -
-
- Rafal Kolanski -
- -
- -
-
- Corey Lewis -
- -
- -
-
- Anna Lyons -
- -
- -
-
- Kent Mcleod -
- -
- -
-
- June Andronick -
- -
- -
-
- Kevin Elphinstone -
- -
- -
-
- Gernot Heiser -
- -
- -
- -

Meetings

-

-After the constituting meeting, TSC meetings are planned to be public, and minutes will be -made publicly available from this page.

-

-If you have an issue that you'd like to bring to the attention of the TSC, -please email any of its members listed above.

-

-The following meetings and decisions have so far been recorded:

- - -

Joining the TSC

-

-TSC members are the technical leadership of the foundation. New members can -join the TSC by decision (vote) of the TSC, and potential new members can be nominated -by any current TSC member. -

-

-New members are generally expected to be active current contributors with the technical - knowledge required for the role and a vision for the future of the seL4 ecosystem.

-

-There are separate roles for repository write access (Committer), organisational admin -access (SysAdmin), and the ability to approve pull request and manage issues (Reviewer). -

-

If you would like to nominate someone for any of these roles, please email the chair (Gerwin Klein) of the TSC.

- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/TSC/notes/tsc-meeting-2020-05-20.pdf b/PR_400/Foundation/TSC/notes/tsc-meeting-2020-05-20.pdf deleted file mode 100644 index 7c8d4e67..00000000 Binary files a/PR_400/Foundation/TSC/notes/tsc-meeting-2020-05-20.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/tsc-meeting-2021-01-29.pdf b/PR_400/Foundation/TSC/notes/tsc-meeting-2021-01-29.pdf deleted file mode 100644 index 99eb71c1..00000000 Binary files a/PR_400/Foundation/TSC/notes/tsc-meeting-2021-01-29.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/tsc-meeting-2021-02-12.pdf b/PR_400/Foundation/TSC/notes/tsc-meeting-2021-02-12.pdf deleted file mode 100644 index 056c7065..00000000 Binary files a/PR_400/Foundation/TSC/notes/tsc-meeting-2021-02-12.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/tsc-meeting-2021-12-17.pdf b/PR_400/Foundation/TSC/notes/tsc-meeting-2021-12-17.pdf deleted file mode 100644 index c7aea489..00000000 Binary files a/PR_400/Foundation/TSC/notes/tsc-meeting-2021-12-17.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/tsc-meeting-2022-12-16.pdf b/PR_400/Foundation/TSC/notes/tsc-meeting-2022-12-16.pdf deleted file mode 100644 index 56f76b2c..00000000 Binary files a/PR_400/Foundation/TSC/notes/tsc-meeting-2022-12-16.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/tsc-meeting-2023-09-12.pdf b/PR_400/Foundation/TSC/notes/tsc-meeting-2023-09-12.pdf deleted file mode 100644 index d8b7f9f7..00000000 Binary files a/PR_400/Foundation/TSC/notes/tsc-meeting-2023-09-12.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/tsc-meeting-2024-03-22.pdf b/PR_400/Foundation/TSC/notes/tsc-meeting-2024-03-22.pdf deleted file mode 100644 index b028a669..00000000 Binary files a/PR_400/Foundation/TSC/notes/tsc-meeting-2024-03-22.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/vote-2020-05-21.pdf b/PR_400/Foundation/TSC/notes/vote-2020-05-21.pdf deleted file mode 100644 index 15ffb601..00000000 Binary files a/PR_400/Foundation/TSC/notes/vote-2020-05-21.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/vote-2021-05-27.pdf b/PR_400/Foundation/TSC/notes/vote-2021-05-27.pdf deleted file mode 100644 index 77cc2257..00000000 Binary files a/PR_400/Foundation/TSC/notes/vote-2021-05-27.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/vote-2021-08-18.pdf b/PR_400/Foundation/TSC/notes/vote-2021-08-18.pdf deleted file mode 100644 index 7accf686..00000000 Binary files a/PR_400/Foundation/TSC/notes/vote-2021-08-18.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/vote-2021-09-29.pdf b/PR_400/Foundation/TSC/notes/vote-2021-09-29.pdf deleted file mode 100644 index 68bb4bed..00000000 Binary files a/PR_400/Foundation/TSC/notes/vote-2021-09-29.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/vote-2021-09-30.pdf b/PR_400/Foundation/TSC/notes/vote-2021-09-30.pdf deleted file mode 100644 index 16ba3415..00000000 Binary files a/PR_400/Foundation/TSC/notes/vote-2021-09-30.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/vote-2021-12-16.pdf b/PR_400/Foundation/TSC/notes/vote-2021-12-16.pdf deleted file mode 100644 index 917858a4..00000000 Binary files a/PR_400/Foundation/TSC/notes/vote-2021-12-16.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/vote-2022-04-14.pdf b/PR_400/Foundation/TSC/notes/vote-2022-04-14.pdf deleted file mode 100644 index 4918fed9..00000000 Binary files a/PR_400/Foundation/TSC/notes/vote-2022-04-14.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/vote-2022-12-15.pdf b/PR_400/Foundation/TSC/notes/vote-2022-12-15.pdf deleted file mode 100644 index 5389ecb7..00000000 Binary files a/PR_400/Foundation/TSC/notes/vote-2022-12-15.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/vote-2023-05-30.pdf b/PR_400/Foundation/TSC/notes/vote-2023-05-30.pdf deleted file mode 100644 index bdbe6a41..00000000 Binary files a/PR_400/Foundation/TSC/notes/vote-2023-05-30.pdf and /dev/null differ diff --git a/PR_400/Foundation/TSC/notes/vote-2023-07-17.pdf b/PR_400/Foundation/TSC/notes/vote-2023-07-17.pdf deleted file mode 100644 index 2385d943..00000000 Binary files a/PR_400/Foundation/TSC/notes/vote-2023-07-17.pdf and /dev/null differ diff --git a/PR_400/Foundation/Trademark/home.pml b/PR_400/Foundation/Trademark/home.pml deleted file mode 100644 index ece7afff..00000000 --- a/PR_400/Foundation/Trademark/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/Trademark/index.html b/PR_400/Foundation/Trademark/index.html deleted file mode 100644 index 468d2e27..00000000 --- a/PR_400/Foundation/Trademark/index.html +++ /dev/null @@ -1,337 +0,0 @@ - - - - - - seL4 Trademark Guidelines | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- seL4 Trademark Guidelines -

- -

- We encourage the use of the seL4® name and logo - in your work, following the usage rules below. -

-

- The Linux Foundation has registered seL4® as a - trademark in the United States and other countries. Please use ® - with the first mention of seL4 in all materials. In addition to the - guidelines below, the Trademark Usage Guidelines of the LF Projects, LLC, - available at - https://lfprojects.org/policies/trademark-policy/, - also apply to any use of the seL4 trademarks and logos.

-

Needed Approvals

-
    -
  • - You may not use the seL4 marks in domain names - for products, events, or services related to the seL4 microkernel - without prior approval. Obtain approval - via .
  • -
-

Marketing Materials and Press Releases

-
    -
  • - We recommend, if you prepare marketing - collateral, training material, or press releases that use the seL4 - mark, that you submit these - to for discussion and - approval. -
  • -
-

Compliance Rules

-

- The usage guidelines - at https://lfprojects.org/policies/trademark-policy/ - apply to the seL4 mark and logos. In addition: -

-

- Do not modify the seL4 trademark or logos, e.g., do - not add other characters, or change the colors, orientation or any - other visual aspect of any logos.

-

- Do not use the seL4 trademark in a misleading - way. This includes: -

-
    -
  • - Do not use the seL4 mark to refer to code that - is modified in any way from the repository - at http://github.com/seL4/seL4. -
  • -
  • - You may use the seL4 mark to refer to the seL4 - microkernel, the seL4 Foundation, or the seL4 proofs if you use - them accurately. The seL4 microkernel refers to the master branch - of the code hosted - at https://github.com/seL4/seL4. The seL4 proofs - refer to the formal mathematical proofs hosted - at https://github.com/seL4/l4v.
    For any - modified versions make clear it is a modification of seL4, not - seL4 itself; for academic research modifications you may use the - term experimental seL4.
    Cloning the repository, - working on features, modifications, evaluations, research, etc, - and referring to these is fine and encouraged. The purpose of the - restriction is to ensure clarity and consistency on what the mark - refers to. When referring to modifications and work-in-progress on - the seL4 kernel, the name seL4 should refer to the official seL4 - code from the foundation repository. Therefore examples - of incorrect use are: -
      -
    • company Y’s seL4 with feature X
    • -
    • enhanced seL4 with feature X
    • -
    - Examples of correct use are (where accurate): -
      -
    • - feature X by company Y is under review for inclusion into the - seL4 kernel -
    • -
    • - feature X developed by company Y is under review to be - included in the next release of the seL4 kernel -
    • -
    • - feature X by company Y is on the roadmap to be included in the seL4 kernel -
    • -
    • company Y has developed a modification X to the seL4 kernel and has evaluated its performance/impact/benefits. -
    • -
    • - company Y is working on feature X to be included in the seL4 kernel -
    • -
    - The important difference between xyz seL4 and a - modification to seL4 is that in the former (incorrect) use - the mark refers to the modified version, and in the latter - (correct) use the mark refers to the code in the foundation - repository.
    - For use in academic research publications only, - the foundation allows the use of the forms experimental - seL4 and experimental version of seL4 for referring - to modifications to the seL4 code that are experimental research - code. The form is explicitly meant for modifications that are not - ready for commercial use, and not checked or endorsed by the - foundation. An example of correct such use in a research paper - would be “running on an experimental version of seL4 that supports - feature X”. -
  • -
  • - Do not use the seL4 mark to make misleading - claims about the strength and completeness of its formal - verification. In particular, do not claim configurations of seL4 - to be formally verified when they are not, and do not claim - properties to be verified that are not. See the source code - repository for which configurations are verified. If unsure, - contact . We will be happy to - review and help phrase formal verification claims. -
  • -
  • - You may only make use of formal verification - claims of seL4 in relation with your product if your product - actually uses a verified configuration of seL4. -
  • -
  • - Do not add your company logo(s) to seL4 - Foundation training and marketing materials, such as official - presentations, unless expressly permitted to do so by the seL4 - Foundation. -
  • -
  • - Do not create marketing or training materials - that look as if they come from the seL4 Foundation rather than - your company. -
  • -
  • - Do not present the seL4 logos or marks larger - than your own company’s logo(s). -
  • -
-

Naming Open Source Projects

-

- For many libraries and language bindings it makes sense to include - the seL4 mark in the name of your project. -

-

- You may do so in the following forms. Do - use a capital L in seL4: -

-
    -
  • <project>-for-seL4
  • -
  • <language>-seL4-bindings
  • -
  • <language>-libseL4
  • -
-

- Do not use e.g. seL4-<project> or - seL4-<language>-bindings. -

-

- If for some reason a different form is preferable, this can often be - accommodated. To use such a different form, obtain written - permission from . -

-

- If your project is a generally useful part of the ecosystem of - components, libraries, and frameworks around the seL4 kernel, - consider hosting it under the seL4 Foundation GitHub organisation - at github.com/seL4. Contact - one of the members of the TSC of the - foundation if you would like to do so with a description of the - project, its current state and plans for the future. -

-

- Projects and repositories hosted under the seL4 Foundation GitHub - organisation may use the seL4 mark more freely in their name. -

-

Questions and Comments

-

- We look to our community to help us retain the value of the seL4 - trademark and promote the seL4 brand. -

-

- If you have questions about these guidelines or would like to report - concerns regarding the use or misuse of the seL4 trademark, or to - obtain written permission for a proposed use, please - contact . -

-

Updates

-

- The seL4 Foundation and/or Linux Foundation Projects may release new versions - of the seL4 trademark guidelines or The Linux Foundation Projects Trademark - Usage Guidelines from time to time. -

- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Trademark/logo.html b/PR_400/Foundation/Trademark/logo.html deleted file mode 100644 index d96ba830..00000000 --- a/PR_400/Foundation/Trademark/logo.html +++ /dev/null @@ -1,160 +0,0 @@ - - - - - - seL4 Logo Pack | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- seL4 Logo Pack -

- -

- This page provides an seL4 logo pack for download. - Use it to show off your work with the seL4 kernel! -

- -
-
- -
- seL4 logo -
-
- Download the seL4 Logo Pack -
-
-

- Please note the trademark use rules that apply to - the use of this logo. -

-
- -
-
-
- - - - -
- - diff --git a/PR_400/Foundation/Trademark/seL4-logo.zip b/PR_400/Foundation/Trademark/seL4-logo.zip deleted file mode 100644 index e3e62582..00000000 Binary files a/PR_400/Foundation/Trademark/seL4-logo.zip and /dev/null differ diff --git a/PR_400/Foundation/Trademark/seL4-logo.zip.license b/PR_400/Foundation/Trademark/seL4-logo.zip.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/Foundation/Trademark/seL4-logo.zip.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/Foundation/home.pml b/PR_400/Foundation/home.pml deleted file mode 100644 index 19b0ff50..00000000 --- a/PR_400/Foundation/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Foundation/index.html b/PR_400/Foundation/index.html deleted file mode 100644 index 249a12d8..00000000 --- a/PR_400/Foundation/index.html +++ /dev/null @@ -1,222 +0,0 @@ - - - - - - The seL4 Foundation | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 foundation logo - - -

- The seL4 Foundation -

-
-

- We have taken an exciting step to expand the seL4 - community, by setting up the seL4 Foundation, - similar to foundations for other open-source projects, such as - the Linux Foundation's Cloud Native Computing Foundation, - RISC-V and others. It forms an open, transparent and - neutral organisation tasked with growing the seL4 ecosystem. It - brings together developers of the seL4 kernel, developers - of seL4-based components and frameworks, and those - adopting seL4 in real-world systems. Its focus is on - coordinating, directing and standardising development of the - seL4 ecosystem in order to reduce barriers to adoption, raising - funds for accelerating development, and ensuring clarity of - verification claims. -

-

- JOIN NOW - HERE! -

- - - seL4 foundation launch -

- To learn more about the seL4 Foundation: -

- - -

- For details, please see: -

- -
- -
-
-
- - - - -
- - diff --git a/PR_400/Info/Docs/GD-NICTA-whitepaper.pdf b/PR_400/Info/Docs/GD-NICTA-whitepaper.pdf deleted file mode 100644 index 0154bfcb..00000000 Binary files a/PR_400/Info/Docs/GD-NICTA-whitepaper.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/index.html b/PR_400/Info/Docs/index.html deleted file mode 100644 index 341cac3b..00000000 --- a/PR_400/Info/Docs/index.html +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Info/Docs/seL4-brochure.pdf b/PR_400/Info/Docs/seL4-brochure.pdf deleted file mode 100644 index dafe04f7..00000000 Binary files a/PR_400/Info/Docs/seL4-brochure.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-0.0.1-rt-dev.pdf b/PR_400/Info/Docs/seL4-manual-0.0.1-rt-dev.pdf deleted file mode 100644 index 340103bc..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-0.0.1-rt-dev.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-1.0.0-rt-dev.pdf b/PR_400/Info/Docs/seL4-manual-1.0.0-rt-dev.pdf deleted file mode 100644 index 9bba1586..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-1.0.0-rt-dev.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-1.0.4.pdf b/PR_400/Info/Docs/seL4-manual-1.0.4.pdf deleted file mode 100644 index b73d75b4..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-1.0.4.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-10.0.0.pdf b/PR_400/Info/Docs/seL4-manual-10.0.0.pdf deleted file mode 100644 index 16549e4a..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-10.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-10.1.0.pdf b/PR_400/Info/Docs/seL4-manual-10.1.0.pdf deleted file mode 100644 index 23add856..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-10.1.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-10.1.1-mcs.pdf b/PR_400/Info/Docs/seL4-manual-10.1.1-mcs.pdf deleted file mode 100644 index 7c7f0ec7..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-10.1.1-mcs.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-10.1.1.pdf b/PR_400/Info/Docs/seL4-manual-10.1.1.pdf deleted file mode 100644 index bd9701f0..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-10.1.1.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-11.0.0.pdf b/PR_400/Info/Docs/seL4-manual-11.0.0.pdf deleted file mode 100644 index 91fd0137..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-11.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-12.0.0.pdf b/PR_400/Info/Docs/seL4-manual-12.0.0.pdf deleted file mode 100644 index a335e6b5..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-12.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-12.1.0.pdf b/PR_400/Info/Docs/seL4-manual-12.1.0.pdf deleted file mode 100644 index 4fb3f550..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-12.1.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-13.0.0.pdf b/PR_400/Info/Docs/seL4-manual-13.0.0.pdf deleted file mode 100644 index e25494b4..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-13.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-2.0.0.pdf b/PR_400/Info/Docs/seL4-manual-2.0.0.pdf deleted file mode 100644 index 305c860a..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-2.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-2.1.0.pdf b/PR_400/Info/Docs/seL4-manual-2.1.0.pdf deleted file mode 100644 index bc7ba007..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-2.1.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-3.0.0.pdf b/PR_400/Info/Docs/seL4-manual-3.0.0.pdf deleted file mode 100644 index 7ac10cd3..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-3.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-3.0.1.pdf b/PR_400/Info/Docs/seL4-manual-3.0.1.pdf deleted file mode 100644 index e2b9ca3e..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-3.0.1.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-3.1.0.pdf b/PR_400/Info/Docs/seL4-manual-3.1.0.pdf deleted file mode 100644 index 0582f639..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-3.1.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-3.2.0.pdf b/PR_400/Info/Docs/seL4-manual-3.2.0.pdf deleted file mode 100644 index 1feaa369..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-3.2.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-4.0.0.pdf b/PR_400/Info/Docs/seL4-manual-4.0.0.pdf deleted file mode 100644 index 865293e0..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-4.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-5.0.0.pdf b/PR_400/Info/Docs/seL4-manual-5.0.0.pdf deleted file mode 100644 index 28501cae..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-5.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-5.1.0.pdf b/PR_400/Info/Docs/seL4-manual-5.1.0.pdf deleted file mode 100644 index cd36d778..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-5.1.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-5.2.0-mcs.pdf b/PR_400/Info/Docs/seL4-manual-5.2.0-mcs.pdf deleted file mode 100644 index 9a05d93f..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-5.2.0-mcs.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-5.2.0.pdf b/PR_400/Info/Docs/seL4-manual-5.2.0.pdf deleted file mode 100644 index 0802429d..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-5.2.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-6.0.0.pdf b/PR_400/Info/Docs/seL4-manual-6.0.0.pdf deleted file mode 100644 index fdcdb8f5..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-6.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-7.0.0.pdf b/PR_400/Info/Docs/seL4-manual-7.0.0.pdf deleted file mode 100644 index 5b92d6a0..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-7.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-8.0.0.pdf b/PR_400/Info/Docs/seL4-manual-8.0.0.pdf deleted file mode 100644 index 0c059392..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-8.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-9.0.0-mcs.pdf b/PR_400/Info/Docs/seL4-manual-9.0.0-mcs.pdf deleted file mode 100644 index d2ca4b43..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-9.0.0-mcs.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-9.0.0.pdf b/PR_400/Info/Docs/seL4-manual-9.0.0.pdf deleted file mode 100644 index c8c1e8b2..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-9.0.0.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-9.0.1.pdf b/PR_400/Info/Docs/seL4-manual-9.0.1.pdf deleted file mode 100644 index a2cf616a..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-9.0.1.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-manual-latest.pdf b/PR_400/Info/Docs/seL4-manual-latest.pdf deleted file mode 100644 index e25494b4..00000000 Binary files a/PR_400/Info/Docs/seL4-manual-latest.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/seL4-spec.pdf b/PR_400/Info/Docs/seL4-spec.pdf deleted file mode 100644 index a5eee16b..00000000 Binary files a/PR_400/Info/Docs/seL4-spec.pdf and /dev/null differ diff --git a/PR_400/Info/Docs/u-boot-working-rpi3-32bit-v2017.11.bin b/PR_400/Info/Docs/u-boot-working-rpi3-32bit-v2017.11.bin deleted file mode 100644 index c5ebb3d0..00000000 Binary files a/PR_400/Info/Docs/u-boot-working-rpi3-32bit-v2017.11.bin and /dev/null differ diff --git a/PR_400/Info/FAQ/index.html b/PR_400/Info/FAQ/index.html deleted file mode 100644 index 246da0ce..00000000 --- a/PR_400/Info/FAQ/index.html +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Info/FAQ/proof.html b/PR_400/Info/FAQ/proof.html deleted file mode 100644 index b5717307..00000000 --- a/PR_400/Info/FAQ/proof.html +++ /dev/null @@ -1,453 +0,0 @@ - - - - - - What is Proved and What is Assumed | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 - -

- The Proof -

-

- This page defines in high-level language what the seL4 proofs - demonstrate, what we assume, and what the proof implies. It is - aimed at an audience with a technical background, but does not - assume any expertise in formal verification. -

-

- What we prove -

-

- Formal proofs can be tricky. They prove exactly what you have - stated, not necessarily what you mean or what you want. -

-

- Our proof statement in high-level natural language is the - following: -

-

- The binary code of the ARM and RISCV64 versions of the seL4 microkernel - correctly implement the behaviour described in its abstract - specification and nothing more. Furthermore, the specification - and the seL4 binary satisfy the classic security properties - called integrity and confidentiality. -

-

- Integrity means that data cannot be changed without permission, - and confidentiality means that data cannot be read without - permission. -

-

- Our proof even goes one step further and shows that data cannot - be inferred without permission – up to a certain - degree. So-called information side channels are - known to exist. The proof only covers those information inference - channels that are present in the formal model: the - confidentiality proof covers all in-kernel storage - channels, but excludes timing channels which must be - dealt with empirically. -

-

- Note that this proof statement is much stronger that previous - versions you might have seen. Previously, in 2009, we had only - proved functional correctness between the C code of the kernel - and its specification. Now we have additionally shown binary - correctness, that is, the compiler and linker need not be - trusted, and we have shown that the specification indeed implies - strong security properties as intended. -

-

- As with all proofs, there are still assumptions that must be met - (described below), and there may still be user expectations on - kernel behaviour that are not captured by the properties proved - so far. Nevertheless, this degree of strong evidence for security - and correct functionality has never been achieved before for an - OS kernel and is currently unrivalled. -

-

- What we assume -

-

- With a proof in formal logic, it is important to understand what - its basic assumptions are, because this is where fault can still - occur. Our proof about the seL4 microkernel goes down to the - level of the binary code. -

-
    -
  • - Assembly: the seL4 kernel, like all operating system - kernels, contains some assembly code, about 340 lines of ARM - assembly in our case, and a similar amount for the RISCV64 version. - For seL4, this concerns mainly entry to - and exit from the kernel, as well as direct hardware accesses. - For the proof, we assume this code is correct. -
  • -
  • - Hardware: we assume the hardware works correctly. In - practice, this means the hardware is assumed not to be tampered - with, and working according to specification. It also means, it - must be run within its operating conditions. -
  • -
  • - Hardware management: the proof makes only the most - minimal assumptions on the underlying hardware. It abstracts - from cache consistency, cache colouring and TLB (translation - lookaside buffer) management. The proof assumes these functions - are implemented correctly in the assembly layer mentioned above - and that the hardware works as advertised. The proof also - assumes that especially these three hardware management - functions do not have any effect on the behaviour of the - kernel. This is true if they are used correctly. -
  • -
  • - Boot code: the proof currently is about the operation of - the kernel after it has been loaded correctly into memory and - brought into a consistent, minimal initial state. This leaves - out about 1,200 lines of the code base that a kernel programmer - would usually consider to be part of the kernel. -
  • -
  • - Virtual memory: under the standard of 'normal' formal - verification projects, virtual memory does not need to - be considered an assumption of this proof. However, the degree - of assurance is lower than for other parts of our proof where - we reason from first principle. In more detail, virtual memory - is the hardware mechanism that the kernel uses to protect - itself from user programs and user programs from each other. - This part is fully verified. However, virtual memory introduces - a complication, because it can affect how the kernel itself - accesses memory. Our execution model assumes a certain standard - behaviour of memory while the kernel executes, and we justify - this assumption by proving the necessary conditions on kernel - behaviour. The thing is: you have to trust us that we got - all necessary conditions and that we got them right. - Our machine-checked proof doesn't force us to be complete at - this point. In short, in this part of the proof, unlike the - other parts, there is potential for human error. -
  • -
  • - DMA: we assume that the CPU and MMU are the only devices - that access memory directly. The proof can correctly ignore - memory-mapped registers of devices, but has to assume that DMA - devices are either not present or do not misbehave, for - instance by overwriting the kernel. In practise this means, - that while normal user-level drivers cannot break kernel - security, drivers for DMA enabled devices can and must be - formally verified for the proof to carry over. We have current - work underway to eliminate this assumption using the SystemMMU - on ARM. -
  • -
  • - Information side-channels: this assumption applies to - the confidentiality proof only and is not present for - functional correctness or integrity. The assumption is that the - binary-level model of the hardware captures all relevant - information channels. We know this not to be the case. This is - not a problem for the validity of the confidentiality proof, - but means that its conclusion (that secrets do not leak) holds - only for the channels visible in the model. This is a standard - situation in information flow proofs: they can never be - absolute. As mentioned above, in practice the proof covers all - in-kernel storage channels but does not cover timing channels -
  • -
-

- Note that we do not need to trust the compiler and - linker any more. Their output is formally verified for seL4 by an - automatic tool if the kernel is compiled with moderate - optimisation levels. The same proof for more aggressive - optimisations is under development. -

-

- What do these assumptions mean? -

-

- The reduced proof assumptions mean that we do not need to trust - the compiler or linker, but there may still be faults remaining - in specific low-level parts of the kernel (TLB, cache handling, - handwritten assembly, boot code). These parts are thoroughly - manually reviewed. -

-

- We have made these assumptions to fit into the carefully limited - scope and the limited resources of a major research project. - These specific assumptions are not a limitation of the general - formal verification approach. In theory, it is possible to - eliminate all of them: there are at least two prominent research - groups that have demonstrated successful formal verification of - assembly code and low-level hardware management functions and we - have ourselves proved an earlier version of the boot code correct - down to the level of a precise, executable specification. There - are still significant scientific challenges in unifying all of - these into a single framework, but it is clear at this point that - it can be done. -

-

- With all the purity and strength of mathematical proof it is easy - to get carried away. There is a fundamental theoretical limit of - formal verification: there will always be some bottom level of - assumptions about the physical world left and these assumptions - have to be validated by other means. Mathematical proof is proof - as long as it talks about formal concepts. It is when assumptions - connect to reality where things may still fail. Albert Einstein - is quoted as saying "As far as the laws of mathematics refer to - reality, they are not certain; and as far as they are certain, - they do not refer to reality." For instance, if the hardware is - faulty, or if a cosmic ray randomly changes memory, the - correctness predictions of our proof do not apply. Neither do any - traditional tests or verification methods help against cosmic - rays, but it is important to keep in mind that even with - mathematical proof, there are no absolute guarantees about the - physical world. -

-

- There are two other assumptions that we do not include in the - list above, because they are of a different kind: -

-
    -
  • We assume the axioms of higher-order logic are logically - consistent. -
  • -
  • We assume our prover checks this particular proof correctly. -
  • -
-

- The first is a fundamental question of formal logic. If this is - not true, mathematics in general has a much bigger problem than - one verified OS kernel. The second is more interesting, but - equally unlikely to be false. -

-

- From security properties down to C code, we use the proof - assistant Isabelle/HOL. - This prover belongs to the so-called LCF family of provers and is - engineered to minimise the code that needs to trusted for the - proof to be correct. In particular, it supports external proof - checking by a separate small checking tool. There is no absolute - guarantee that the proof is correct, but when you come right down - to it, humans are good at creating proofs, computers are very - good at checking them. It is an easy problem for computers. - If you are worried about the proof, be worried about the - assumptions in the first part. They are much more likely to cause - problems. -

-

- From C code to binary code, we employ a set of automated - widely-used verification tools. These are: SONOLAR, Z3, - Isabelle/HOL, and HOL4. The combination of these tools still - achieves a very high standard of assurance for this last - verification step and work is underway to cast even this step - entirely in Isabelle/HOL. -

-

- What the proof implies -

-

- We have already covered the properties that are proved directly: - functional correctness, integrity, and confidentiality. These are - high-level properties that every OS should provide, that very few - manage to provide, and that no OS has better evidence for than - seL4. -

-

- The formal proof of functional correctness implies the absence of - whole classes of common programming errors. Provided our - assumptions above are true, some of these excluded common errors - are: -

-
    -
  • - Buffer overflows: buffer overflows are a classic - security attack against operating systems, trying to make the - software crash or even to inject malicious code into the cycle. - We have proved that no such attack can be successful on seL4. -
  • -
  • - Null pointer dereferences: null pointer dereferences are - another common issue in the C programming language. In - applications they tend to lead to strange error messages and - lost data. In operating systems they will usually crash the - whole system. They do not occur in seL4. -
  • -
  • - Pointer errors in general: in C it is possible to - accidentally use a pointer to the wrong type of data. This is a - common programming error. It does not happen in the seL4 - kernel. -
  • -
  • - Memory leaks: memory leaks occur when memory is - requested, but never given back. The other direction is even - worse: memory could be given back, even though it is still in - use. Neither of these can happen in seL4. -
  • -
  • - Arithmetic overflows and exceptions: humans and - mathematics usually have a concept of numbers that can be - arbitrarily big. Machines do not, they need to fit them into - memory, usually into 32 or 64 bits worth of storage. Machines - also generate exceptions when you attempt to do things that are - undefined like dividing by zero. In the OS, such exceptions - would typically crash the machine. This does not occur in seL4. -
  • -
  • - Undefined behaviour: there are many static analysis and - verification tools that check for the absence of undefined - behaviour in C. Our proof explicitly checks that no such - undefined behaviour occurs. -
  • -
-

- The list goes on. There are other techniques that can also be - used to find some of these errors. Here, the absence of such bugs - is just a useful by-product of the proof. To be able to complete - our proof of functional correctness, we also prove a large number - of so-called invariants: properties that we know to always be - true when the kernel runs. To normal people these will not be - exciting, but to experts and kernel programmers they give an - immense amount of useful information. They give you the reasons - why and how data structures work, why it is OK to optimise and - leave out certain checks (because you know they will be always be - true), and why the code always executes in a defined and safe - manner. -

-

- What's next? -

-

- Even after binary and security proofs, we are still just at the - beginning of verifying entire systems. See our current research - projects for more things to come. Contact TS if you would - like to collaborate, for instance by connecting your formally - verified application to the seL4 proof, or by building an entire - verified system. -

- -
-
-
- - - - -
- - diff --git a/PR_400/Info/Hardware/sabreLite/01_android-imx6-uboot-enable_bootelf.patch b/PR_400/Info/Hardware/sabreLite/01_android-imx6-uboot-enable_bootelf.patch deleted file mode 100644 index 8189e77b..00000000 --- a/PR_400/Info/Hardware/sabreLite/01_android-imx6-uboot-enable_bootelf.patch +++ /dev/null @@ -1,31 +0,0 @@ -diff -r eb7db924c90c -r dda7cc7034f3 include/configs/mx6q_sabrelite_android.h ---- a/include/configs/mx6q_sabrelite_android.h Tue Apr 16 11:55:31 2013 +1000 -+++ b/include/configs/mx6q_sabrelite_android.h Tue Apr 16 11:55:36 2013 +1000 -@@ -109,6 +109,8 @@ - - #include - -+#define CONFIG_CMD_ELF -+ - #define CONFIG_CMD_PING - #define CONFIG_CMD_DHCP - #define CONFIG_CMD_MII -diff -r eb7db924c90c -r dda7cc7034f3 lib_arm/cache.c ---- a/lib_arm/cache.c Tue Apr 16 11:55:31 2013 +1000 -+++ b/lib_arm/cache.c Tue Apr 16 11:55:36 2013 +1000 -@@ -34,3 +34,15 @@ - #endif - return; - } -+ -+int dcache_status (void){ -+ /* Always off */ -+ return 0; -+} -+ -+void dcache_enable (void){ -+} -+ -+void dcache_disable(void){ -+} -+ diff --git a/PR_400/Info/Hardware/sabreLite/02_android-imx6-uboot-fastbootfix.patch b/PR_400/Info/Hardware/sabreLite/02_android-imx6-uboot-fastbootfix.patch deleted file mode 100644 index e3f242bf..00000000 --- a/PR_400/Info/Hardware/sabreLite/02_android-imx6-uboot-fastbootfix.patch +++ /dev/null @@ -1,130 +0,0 @@ -diff -r dda7cc7034f3 -r 8007ffcf8136 common/cmd_bootm.c ---- a/common/cmd_bootm.c Tue Apr 16 11:55:36 2013 +1000 -+++ b/common/cmd_bootm.c Tue Apr 16 11:55:36 2013 +1000 -@@ -1696,7 +1696,7 @@ - - fail: - #ifdef CONFIG_FASTBOOT -- return do_fastboot(NULL, 0, 0, NULL); -+ return -1 /* do_fastboot(NULL, 0, 0, NULL) */; - #else - return -1; - #endif -diff -r dda7cc7034f3 -r 8007ffcf8136 common/cmd_fastboot.c ---- a/common/cmd_fastboot.c Tue Apr 16 11:55:36 2013 +1000 -+++ b/common/cmd_fastboot.c Tue Apr 16 11:55:36 2013 +1000 -@@ -76,14 +76,25 @@ - #endif - extern env_t *env_ptr; - #endif -+ -+#ifdef CONFIG_CMD_BOOTI - extern int do_booti(cmd_tbl_t *cmdtp, int flag, int argc, char *argv[]); -+#endif -+ - /* Use do_setenv and do_saveenv to permenantly save data */ - int do_saveenv(cmd_tbl_t *cmdtp, int flag, int argc, char *argv[]); - int do_setenv(cmd_tbl_t *cmdtp, int flag, int argc, char *argv[]); -+ - /* Use do_bootm and do_go for fastboot's 'boot' command */ - int do_bootm(cmd_tbl_t *cmdtp, int flag, int argc, char *argv[]); - int do_go(cmd_tbl_t *cmdtp, int flag, int argc, char *argv[]); - -+/* Use do_bootelf for fastboot's 'boot' command */ -+#ifdef CONFIG_CMD_ELF -+#include -+int do_bootelf(cmd_tbl_t *cmdtp, int flag, int argc, char *argv[]); -+#endif -+ - /* Forward decl */ - static int tx_handler(void); - static int rx_handler(const unsigned char *buffer, unsigned int buffer_size); -@@ -1010,44 +1021,57 @@ - */ - - if (memcmp(cmdbuf, "boot", 4) == 0) { -+ if ((download_bytes) && (CFG_FASTBOOT_MKBOOTIMAGE_PAGE_SIZE < download_bytes)) { -+ struct fastboot_boot_img_hdr *fb_hdr; -+ fb_hdr = (struct fastboot_boot_img_hdr*)interface.transfer_buffer; - -- if ((download_bytes) && -- (CFG_FASTBOOT_MKBOOTIMAGE_PAGE_SIZE < -- download_bytes)) { -- char start[32]; -- char *booti_args[4] = {"booti", NULL, "boot", NULL}; -+ if (memcmp(fb_hdr->magic, FASTBOOT_BOOT_MAGIC, FASTBOOT_BOOT_MAGIC_SIZE)){ -+ printf("### Bad fastboot magic\n"); - -- /* -- * Use this later to determine if a command line was passed -- * for the kernel. -- */ -- /* struct fastboot_boot_img_hdr *fb_hdr = */ -- /* (struct fastboot_boot_img_hdr *) interface.transfer_buffer; */ -+ } else { -+ uintptr_t image_addr = (uintptr_t)fb_hdr + fb_hdr->page_size; -+ cmd_tbl_t cmdtp; - -- /* Skip the mkbootimage header */ -- /* image_header_t *hdr = */ -- /* (image_header_t *) */ -- /* &interface.transfer_buffer[CFG_FASTBOOT_MKBOOTIMAGE_PAGE_SIZE]; */ -+ memset(&cmdtp, 0, sizeof(cmdtp)); -+ cmdtp.name = "fastboot"; - -- booti_args[1] = start; -- sprintf(start, "0x%x", (unsigned int)interface.transfer_buffer); -+ /* Execution should jump to kernel so send the response -+ now and wait a bit. */ -+ sprintf(response, "OKAY"); -+ fastboot_tx_status(response, strlen(response)); - -- /* Execution should jump to kernel so send the response -- now and wait a bit. */ -- sprintf(response, "OKAY"); -- fastboot_tx_status(response, strlen(response)); -+ /* Reserve for further use, this can -+ * be more convient for developer. */ -+ /* if (strlen ((char *) &fb_hdr->cmdline[0])) */ -+ /* set_env("bootargs", (char *) &fb_hdr->cmdline[0]); */ - -- printf("Booting kernel...\n"); -+#ifdef CONFIG_CMD_ELF -+ /* Check for ELF format image */ -+ if(IS_ELF(*(Elf32_Ehdr*)image_addr)){ -+ char start[32]; -+ char *boot_args[3] = {"bootelf", start, NULL}; -+ sprintf(boot_args[1], "0x%x", image_addr); -+ do_bootelf(&cmdtp, 0, 2, boot_args); -+ } -+#endif -+ /* Check for uImage format image */ -+ if(image_check_magic((image_header_t*)image_addr)){ -+ char start[32]; -+ char *boot_args[3] = {"bootm", start, NULL}; -+ sprintf(boot_args[1], "0x%x", image_addr); -+ do_bootm(&cmdtp, 0, 2, boot_args); -+ } - -- -- /* Reserve for further use, this can -- * be more convient for developer. */ -- /* if (strlen ((char *) &fb_hdr->cmdline[0])) */ -- /* set_env("bootargs", (char *) &fb_hdr->cmdline[0]); */ -- -- /* boot the boot.img */ -- do_booti(NULL, 0, 3, booti_args); -- -+ /* Assume Android image. */ -+#ifdef CONFIG_CMD_BOOTI -+ if(1){ -+ char start[32]; -+ char *boot_args[3] = {"booti", start, "boot", NULL}; -+ sprintf(boot_args[1], "0x%x", (uintptr_t)fb_hdr); -+ do_booti(&cmdtp, 0, 3, boot_args); -+ } -+#endif -+ } - - } - sprintf(response, "FAILinvalid boot image"); diff --git a/PR_400/Info/Hardware/sabreLite/03_android-imx6-uboot-extra_fs_features.patch b/PR_400/Info/Hardware/sabreLite/03_android-imx6-uboot-extra_fs_features.patch deleted file mode 100644 index 32076239..00000000 --- a/PR_400/Info/Hardware/sabreLite/03_android-imx6-uboot-extra_fs_features.patch +++ /dev/null @@ -1,52 +0,0 @@ -diff -r 8007ffcf8136 -r cf814578f28b include/configs/mx6q_sabrelite_android.h ---- a/include/configs/mx6q_sabrelite_android.h Tue Apr 16 11:55:36 2013 +1000 -+++ b/include/configs/mx6q_sabrelite_android.h Tue Apr 16 11:55:36 2013 +1000 -@@ -23,7 +23,6 @@ - #define __CONFIG_H - - #include -- - /* High Level Configuration Options */ - #define CONFIG_ARMV7 /* This is armv7 Cortex-A9 CPU core */ - #define CONFIG_MXC -@@ -34,6 +33,7 @@ - #define CONFIG_MX6_CLK32 32768 - - #define CONFIG_SKIP_RELOCATE_UBOOT -+#define CONFIG_ZERO_BOOTDELAY_CHECK - - #define CONFIG_ARCH_CPU_INIT - #undef CONFIG_ARCH_MMU /* disable MMU first */ -@@ -67,6 +67,10 @@ - */ - #define CONFIG_MXC_UART - #define CONFIG_UART_BASE_ADDR UART2_BASE_ADDR -+#define CONFIG_CMD_BDI -+#define CONFIG_CMD_BSP -+#define CONFIG_CMD_I2C -+#define CONFIG_CMD_SPI - - /* allow to overwrite serial and ethaddr */ - #define CONFIG_ENV_OVERWRITE -@@ -110,6 +114,9 @@ - #include - - #define CONFIG_CMD_ELF -+#define CONFIG_CMD_BOOTD -+#define CONFIG_CMD_CONSOLE -+#define CONFIG_CMD_SETEXPR - - #define CONFIG_CMD_PING - #define CONFIG_CMD_DHCP -@@ -235,6 +242,11 @@ - */ - #ifdef CONFIG_CMD_MMC - #define CONFIG_MMC -+ #define CONFIG_FS_FAT -+ #define CONFIG_FS_EXT4 -+ #define CONFIG_CMD_FS_GENERIC -+ #define CONFIG_CMD_BOOTZ -+ #define CONFIG_SUPPORT_RAW_INITRD - #define CONFIG_GENERIC_MMC - #define CONFIG_IMX_MMC - #define CONFIG_SYS_FSL_USDHC_NUM 2 diff --git a/PR_400/Info/Hardware/sabreLite/04_android-imx6-uboot-update_env.patch b/PR_400/Info/Hardware/sabreLite/04_android-imx6-uboot-update_env.patch deleted file mode 100644 index 38f9ce77..00000000 --- a/PR_400/Info/Hardware/sabreLite/04_android-imx6-uboot-update_env.patch +++ /dev/null @@ -1,70 +0,0 @@ -diff -r ef97dc7f10ae include/configs/mx6q_sabrelite_android.h ---- a/include/configs/mx6q_sabrelite_android.h Thu Jun 27 16:22:44 2013 +1000 -+++ b/include/configs/mx6q_sabrelite_android.h Thu Jun 27 16:24:44 2013 +1000 -@@ -146,7 +146,7 @@ - - #define CONFIG_CMD_IMX_DOWNLOAD_MODE - --#define CONFIG_BOOTDELAY 3 -+#define CONFIG_BOOTDELAY 0 - - #define CONFIG_PRIME "FEC0" - -@@ -155,17 +155,41 @@ - - #define CONFIG_INITRD_TAG - --#define CONFIG_EXTRA_ENV_SETTINGS \ -- "netdev=eth0\0" \ -- "ethprime=FEC0\0" \ -- "bootcmd=booti mmc1\0" -+ -+#define CONFIG_ENV_AOS \ -+ "aos-netimage=bootimg.elf\0" \ -+ "bootaos=tftpboot 0x30000000 ${aos-netimage} && bootelf\0" \ -+ "bootcmd=run bootaos\0" \ -+ -+#define CONFIG_ENV_SEL4 \ -+ "sel4-image=sel4/sel4-image\0" \ -+ "sel4-netimage=sabre/sel4-image\0" \ -+ "bootsel4_net=dhcp 0x30000000 ${sel4-netimage} && bootelf\0" \ -+ "bootsel4_mmc=" \ -+ "for disk in 1 0 ; do mmc dev ${disk} ;" \ -+ "for part in 1 2 3 4; do " \ -+ "for fs in fat ext2 ; do " \ -+ "echo \" -- Trying ${fs} on SD ${disk}, partition ${part}\";"\ -+ "${fs}load mmc ${disk}:${part} 30000000 ${sel4-image} && " \ -+ "bootelf ;" \ -+ "done ;" \ -+ "done;" \ -+ "done;\0" -+ -+#define CONFIG_EXTRA_ENV_SETTINGS \ -+ "netdev=eth0\0" \ -+ "ethprime=" CONFIG_PRIME "\0" \ -+ "ethaddr=00:19:b8:00:f0:a3\0" \ -+ CONFIG_ENV_SEL4 \ -+ CONFIG_ENV_AOS -+ - #define CONFIG_ARP_TIMEOUT 200UL - - /* - * Miscellaneous configurable options - */ - #define CONFIG_SYS_LONGHELP /* undef to save memory */ --#define CONFIG_SYS_PROMPT "MX6Q SABRELITE U-Boot > " -+#define CONFIG_SYS_PROMPT "ERTOS MX6Q SABRELITE U-Boot > " - #define CONFIG_AUTO_COMPLETE - #define CONFIG_SYS_CBSIZE 256 /* Console I/O Buffer Size */ - /* Print Buffer Size */ -@@ -200,8 +224,8 @@ - #define CONFIG_CMD_MII - #define CONFIG_CMD_DHCP - #define CONFIG_CMD_PING --#define CONFIG_IPADDR 192.168.1.103 --#define CONFIG_SERVERIP 192.168.1.101 -+#define CONFIG_IPADDR 192.168.168.2 -+#define CONFIG_SERVERIP 192.168.168.1 - #define CONFIG_NETMASK 255.255.255.0 - - /* diff --git a/PR_400/Info/Hardware/sabreLite/u-boot.bin b/PR_400/Info/Hardware/sabreLite/u-boot.bin deleted file mode 100644 index 4376775b..00000000 Binary files a/PR_400/Info/Hardware/sabreLite/u-boot.bin and /dev/null differ diff --git a/PR_400/Info/home.pml b/PR_400/Info/home.pml deleted file mode 100644 index 50cf5c88..00000000 --- a/PR_400/Info/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Info/index.html b/PR_400/Info/index.html deleted file mode 100644 index e18f8286..00000000 --- a/PR_400/Info/index.html +++ /dev/null @@ -1,180 +0,0 @@ - - - - - - More info | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - seL4 - -

- More information about seL4 -

- -
- -
- -
- seL4 call graph -
-
- Research -
-
- Learn about the research about seL4 happening - in the Trustworthy Systems group -
-
- -
- -
- Roadmap -
-
- Roadmap -
-
- What is on roadmap for seL4 and the ecosystem? -
-
- -
- -
- FAQ -
-
- FAQ -
-
- All your questions answered! -
-
- -
- -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/Info/more-research.html b/PR_400/Info/more-research.html deleted file mode 100644 index 64711917..00000000 --- a/PR_400/Info/more-research.html +++ /dev/null @@ -1,300 +0,0 @@ - - - - - - Ongoing and future fundamental research about seL4 and trustworthy systems | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 - -

- Ongoing and future fundamental research on seL4 and trustworthy systems -

- -

- - While seL4 is mature enough to be deployed in the real world, - there’s plenty of fundamental research work left on seL4 itself, and - there is far more research left on how to achieve real-world - trustworthy computer systems. More on both below, describing the - Trustworthy Systems group's - research agenda (as of May 2021), - looking for further funding to tackle these challenges. This is - largely extracted from this blog. - - -

- -

- Work to do: seL4 -

- -

- The seL4 kernel is mature in many ways, good enough to be - deployed in real-world systems. It is already in daily use in the - real world, and is being designed into many more systems. But there - is still more research to be done. -

- -

- Right now, seL4 solves a number of fundamental security problems, - and it provides the best possible solution to these problems. In - particular, it provides the strongest possible spatial isolation, in - that it guarantees that memory cannot be accessed without explicit - authorisation. It also provides strictly controlled communication - between subsystems, in that two subsystems (provably) cannot - communicate through system calls or memory unless explicitly - authorised. And it does this with unbeaten performance. This is more - than any other real-world OS can give you. -

- -

- What seL4 cannot (yet) do, and no other OS can either, is to provide - temporal isolation guarantees. This comes in two guises, the - integrity and the confidentiality aspect. -

- -

- Here, integrity means the ability to guarantee timeliness of - real-time systems, especially mixed-criticality systems (MCS), where - critical, high-assurance real-time tasks operate concurrently to - untrusted code. seL4’s new MCS model provides temporal integrity to - a significant class of MCS, and its verification is - on-going. However, it does not yet fully solve the - problem. Specifically, we found that there are important use cases - for which the present MCS model is not sufficient. On-going research - is addressing this, leading to further improvements of the model. -

- -

- Furthermore, we have not yet developed the formal framework for - reasoning about timing guarantees on top of the MCS model. This is, - of course, what is needed for making high-assurance MCS a reality, - and is a significant research challenge, which is presently - unfunded. Again, while we’re ahead of any other system, the world’s - emerging cyberphysical systems need more. -

- -

- Much more work remains on the confidentiality side: Here the - problem is to guarantee that there is no information leakage through - covert timing channels; this kind of leakage is a serious real-world - problem, as demonstrated in the Spectre - attacks. Timing channels have long been put into the too-hard - basket by most people. Triggered by Spectre there is now a flurry of - activity, but most are band-aid solutions addressing symptoms. In - contrast, we are working on a principled, fundamental approach to a - complete prevention of timing channels. We call this approach time - protection, in analogy to the established memory protection. The - feedback from the research community has been strong: the work has - already won three best-paper awards, yet we are only at the - beginning of this line of work. -

- -

- Specifically we have designed some basic OS mechanisms for providing - time protection, and have shown that they can be effective on the - right hardware, but also that contemporary hardware is - deficient. Presently, with support by the Australian Research - Council and the US Air Force, we are working on proving that these - mechanisms are effective on suitable hardware. This work has - progressed well and needs further funding. -

- -

- We are also working with the RISC-V community on defining - appropriate hardware support to allow time protection to do its - job. But much more research is needed on the OS side, as so far we - have some basic mechanisms, that work in very restricted use - cases. It’s far from having an OS model that addresses the large - class of systems where timing channels are a security threat. This - work is presently unfunded. -

- -

- And finally, we have not yet solved the problem of verifying seL4 - for multicore platforms. While there exist kernels with a multicore - verification story, these kernels have performance that makes them - unsuitable for real-world use. Thanks to our past research we now - understand how to verify multicore seL4, but we need funding to do - it. -

- - - -

- Work to do: Scaling trustworthiness to full systems -

- -

- Beyond seL4, there’s the wider Trustworthy Systems agenda: creating - a societal shift towards mainstream adoption of software - verification. We have made some progress here, with verification - uptake increasing in academia and industry, but it’s far from - mainstream. -

- -

- To enable this shift, the team has more concrete research - goals. These include: -

- -
    -
  • - Lower-cost approaches for verifying the non-kernel parts of the - trusted computing base, such as device drivers, file and network - services, but also the actual applications. So far, verified - software is still more expensive to produce than the usual buggy - stuff (although life-cycle cost is probably already - competitive). Trustworthy Systems’ declared aim is to produce - verified software at a cost that’s at par with traditionally - engineered software; -
  • -
  • - Proofs of high-level security properties of a complete system (as - opposed to “just” the underlying microkernel); -
  • -
  • - Proofs of timeliness of a complete real-time system built on seL4; -
  • -
  • - Design of a general-purpose operating system that is as broadly - applicable as Linux, but where it is possible to prove security - enforcement. -
  • -
- -

- These are all research challenges that remain unsolved, are of high - importance for the security and safety of real-world systems and - which the Trustworthy Systems group is in a prime position to - address. We have the track record and credibility to deliver, and - need funding to do it. -

- -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/Learn/home.pml b/PR_400/Learn/home.pml deleted file mode 100644 index 982e78d1..00000000 --- a/PR_400/Learn/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Learn/index.html b/PR_400/Learn/index.html deleted file mode 100644 index 8e8fba1b..00000000 --- a/PR_400/Learn/index.html +++ /dev/null @@ -1,235 +0,0 @@ - - - - - - Learn | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - seL4 - -

Learn about seL4

- -

Docsite

- -

- We have a separate website for technical seL4 documentation, which - we call the Docsite. The - docsite is community maintained - its source is hosted on GitHub and - can be edited using standard GitHub procedures - as documented - on the docsite itself. -

- -

Tutorials

- -

- The best way to learn to use seL4 is to follow our tutorials. We - provide a series of hands-on tutorials that cover the basics of - seL4, the kernel and core library APIs, user-level frameworks, and - virtualisation. -

- -

- If you want to know how to use seL4, then this is where you should - start. See - the Tutorials - page on our docsite. -

- -

- If you prefer unstructured learning and want to dive in and explore - on your own then follow the links on the - docsite's Getting - Started page. -

- -

- After getting a solid seL4 background you can move on to building - seL4-based systems. Next steps include working on one of - our suggested - projects or helping to expand - the collection - of libraries and components available to build seL4-based - systems. -

- -

Documentation

- -

- We've written a lot about the seL4 kernel: from overview papers, - historical background, and project retrospectives, to detailed - documentation of the kernel API, user-level libraries and - components, and system frameworks. -

- -

- Besides the kernel implementation and the systems aspects of seL4, - we've also written about the seL4 proofs: from overview papers - explaining the models and the proofs, details of proof techniques - developed and used for the proof, insights gained through doing the - proofs, to detailed documentation of the proofs themselves. -

- -

- See - the Documentation - page on our docsite for information about all of these. -

- - -

Courses

- -

- seL4 is being used as the basis of several (University-level) - courses, including: -

-
    -
  • -

    - Advanced - Operating Systems at UNSW. This course provides an extensive - seL4-based assignment that teaches students how to build an - operating system on seL4. The course material (all lecture slides, the - project and related code) are publicly available. Videos of lectures covering seL4 are available from the - UNSW - CSeLearning COMP9242 YouTube channel. -

    -
  • - -
  • - Advanced Topics - in Software Verification at UNSW. While not directly about - seL4, this course teaches Isabelle/HOL and the program - verification techniques used to develop seL4's proof. Following - this, or a similar, course is necessary if you intend to - contribute to the seL4 proofs. -

  • - - -
- -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/Use/home.pml b/PR_400/Use/home.pml deleted file mode 100644 index b3b34c5a..00000000 --- a/PR_400/Use/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/Use/index.html b/PR_400/Use/index.html deleted file mode 100644 index b24e5446..00000000 --- a/PR_400/Use/index.html +++ /dev/null @@ -1,219 +0,0 @@ - - - - - - Retrofit | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - seL4 - -

- Retrofitting and transitioning to seL4 -


-

- This page discusses the issues a business will need to consider for a “transition to seL4”, whether creating a - new product or upgrading an existing product.

-

Ultimately, - the best approach is to contact us - to discuss your needs and aims, but - brainstorming through the considerations described below is a good - first step in any case. This will also give you an idea of the - role that seL4 can play in securing software systems across a range of - industry verticals. -

-

- More information about this process is available in - this article or in - these slides. -

-

- You might also have questions on the licence and its implications. - For this, read Gernot’s licensing blog and - contact us if you have - any questions! -

-

Now to the considerations.

-
    -
  1. The aim: Security through isolation. - seL4 system -

    The first step is to identify the security and - safety requirements of your system (what are the assets that need protecting), and the threat - model (what are the attacks or failures that threaten those assets).

    -

    seL4’s power and added value lie in the proved isolation that - it provides. Being an OS kernel, its duty is to control - access to resources and communication between entities. - By using seL4, you - get the highest assurance that components can be properly - isolated from each other, with communication only possible - through explicitly provided channels.

    -

    This first step, therefore, helps to identify what it is that - you would like to isolate in your system. Typically this comes down to protecting some small - but critical component(s) that perform sensitive operations from a large and untrustworthy, but still useful, code base.

    -

    An example is a critical control loop which takes inputs from a number of sensors, including cameras with complex drivers and image processing software.

    -

  2. -
  3. seL4-ready? -

    - The next step is to check which hardware platform (and exact - configuration) your product is or will be running on and whether - this platform is already supported by seL4. You will also need - to check whether seL4 is verified on this configuration and - need to know what your assurance and certification requirements - are and whether the proofs can support these.

    -

    If the answer to some of these questions is “no”, you can - check whether it’s on the roadmap - of seL4, and - contact us to - discuss extending seL4’s support.

    -

    Keep in mind that even if a particular configuration is not (yet) verified, it will still be highly robust, owing to sharing the design and much of its code with verified configurations.

    - -

    - Beside the kernel, your system is likely to require a number of other OS components: - remember that seL4 is just a microkernel, and will require a number of - OS services to run. You can check the list of available components - and if the ones you need are missing, - contact us, or better yet - contribute.

    -
  4. -
  5. Gradually getting there: Incremental cyber retrofit - -

    - Systems are rarely built from scratch, even a new product typically incorporates significant amounts of legacy software. And frequently the aim is to increase an existing product's resilience to cyber attacks.

    -

    The usual approach here is what we call an incremental cyber retrofit, which we describe in detail in - this article. In a nutshell, the idea is to gradually adapt the - existing architecture.

    -

    The first step is to put the complete legacy system into a virtual machine (VM) running - on seL4. This in itself adds no security (only a little bit of overhead), but it serves as a starting point for incremental modularisation.

    -

    The next step is to extract and isolate coarse-grain subsystems, moving from a system with a single VM to one with multiple communicating VMs.

    -

    In subsequent steps this is repeated and refined until individual trusted components are placed into their own, isolated, sandboxes running - natively on seL4.

    - - seL4 system -
  6. -
-

-After this you should have a much more robust system that can take advantage of seL4's proved properties to provide significantly better resilience to cyber attack.

- -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/contact/home.pml b/PR_400/contact/home.pml deleted file mode 100644 index 7641f091..00000000 --- a/PR_400/contact/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/contact/index.html b/PR_400/contact/index.html deleted file mode 100644 index 1e6aadd7..00000000 --- a/PR_400/contact/index.html +++ /dev/null @@ -1,213 +0,0 @@ - - - - - - Contact | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
- - - seL4 - -

Contact Information

- -

Foundation

- -
    -
  • foundation@sel4.systems -
- -

Information and Announcements

- - - -

- - - - -

Development

- -

-Discussion about using and developing seL4 (questions, suggestions, updates, etc.) -

- -

-We also host an open video -chat hangout every two weeks (dates/times shown in calendar above) to bring seL4 developers together. There is no strict -agenda, anybody can join for technical discussions about seL4, related -repositories and projects, or general questions and answers. Members from the -technical steering committee (TSC) will try to be there, but these are not -TSC meetings where formal decisions are made.
-A calendar -feed is available. -

- -

-RFC (request for comments) proposing new features for seL4 -

- - -

-Github -

- - -

Direct Communication

- -
    -
  • support@sel4.systems inquiries about professional support contracts
  • -
  • sel4@sel4.systems communication that cannot be done on the public channels
  • -
  • moderation@sel4.systems requests or queries about community moderation. See seL4 Code of Conduct
  • -
- -

Website Issues

- -
    -
  • webmaster@sel4.systems -
- -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/contact/mailman/index.html b/PR_400/contact/mailman/index.html deleted file mode 100644 index 21e1533a..00000000 --- a/PR_400/contact/mailman/index.html +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/css/bootstrap.min.css b/PR_400/css/bootstrap.min.css deleted file mode 100644 index 5b96335f..00000000 --- a/PR_400/css/bootstrap.min.css +++ /dev/null @@ -1,6 +0,0 @@ -/*! - * Bootstrap v3.4.1 (https://getbootstrap.com/) - * Copyright 2011-2019 Twitter, Inc. - * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE) - *//*! normalize.css v3.0.3 | MIT License | github.com/necolas/normalize.css */html{font-family:sans-serif;-ms-text-size-adjust:100%;-webkit-text-size-adjust:100%}body{margin:0}article,aside,details,figcaption,figure,footer,header,hgroup,main,menu,nav,section,summary{display:block}audio,canvas,progress,video{display:inline-block;vertical-align:baseline}audio:not([controls]){display:none;height:0}[hidden],template{display:none}a{background-color:transparent}a:active,a:hover{outline:0}abbr[title]{border-bottom:none;text-decoration:underline;-webkit-text-decoration:underline dotted;-moz-text-decoration:underline dotted;text-decoration:underline dotted}b,strong{font-weight:700}dfn{font-style:italic}h1{font-size:2em;margin:.67em 0}mark{background:#ff0;color:#000}small{font-size:80%}sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline}sup{top:-.5em}sub{bottom:-.25em}img{border:0}svg:not(:root){overflow:hidden}figure{margin:1em 40px}hr{-webkit-box-sizing:content-box;-moz-box-sizing:content-box;box-sizing:content-box;height:0}pre{overflow:auto}code,kbd,pre,samp{font-family:monospace,monospace;font-size:1em}button,input,optgroup,select,textarea{color:inherit;font:inherit;margin:0}button{overflow:visible}button,select{text-transform:none}button,html input[type=button],input[type=reset],input[type=submit]{-webkit-appearance:button;cursor:pointer}button[disabled],html input[disabled]{cursor:default}button::-moz-focus-inner,input::-moz-focus-inner{border:0;padding:0}input{line-height:normal}input[type=checkbox],input[type=radio]{-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box;padding:0}input[type=number]::-webkit-inner-spin-button,input[type=number]::-webkit-outer-spin-button{height:auto}input[type=search]{-webkit-appearance:textfield;-webkit-box-sizing:content-box;-moz-box-sizing:content-box;box-sizing:content-box}input[type=search]::-webkit-search-cancel-button,input[type=search]::-webkit-search-decoration{-webkit-appearance:none}fieldset{border:1px solid silver;margin:0 2px;padding:.35em .625em .75em}legend{border:0;padding:0}textarea{overflow:auto}optgroup{font-weight:700}table{border-collapse:collapse;border-spacing:0}td,th{padding:0}/*! Source: https://github.com/h5bp/html5-boilerplate/blob/master/src/css/main.css */@media print{*,:after,:before{color:#000!important;text-shadow:none!important;background:0 0!important;-webkit-box-shadow:none!important;box-shadow:none!important}a,a:visited{text-decoration:underline}a[href]:after{content:" (" attr(href) ")"}abbr[title]:after{content:" (" attr(title) ")"}a[href^="#"]:after,a[href^="javascript:"]:after{content:""}blockquote,pre{border:1px solid #999;page-break-inside:avoid}thead{display:table-header-group}img,tr{page-break-inside:avoid}img{max-width:100%!important}h2,h3,p{orphans:3;widows:3}h2,h3{page-break-after:avoid}.navbar{display:none}.btn>.caret,.dropup>.btn>.caret{border-top-color:#000!important}.label{border:1px solid #000}.table{border-collapse:collapse!important}.table td,.table th{background-color:#fff!important}.table-bordered td,.table-bordered th{border:1px solid #ddd!important}}@font-face{font-family:"Glyphicons Halflings";src:url(../fonts/glyphicons-halflings-regular.eot);src:url(../fonts/glyphicons-halflings-regular.eot?#iefix) format("embedded-opentype"),url(../fonts/glyphicons-halflings-regular.woff2) format("woff2"),url(../fonts/glyphicons-halflings-regular.woff) format("woff"),url(../fonts/glyphicons-halflings-regular.ttf) format("truetype"),url(../fonts/glyphicons-halflings-regular.svg#glyphicons_halflingsregular) format("svg")}.glyphicon{position:relative;top:1px;display:inline-block;font-family:"Glyphicons Halflings";font-style:normal;font-weight:400;line-height:1;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale}.glyphicon-asterisk:before{content:"\002a"}.glyphicon-plus:before{content:"\002b"}.glyphicon-eur:before,.glyphicon-euro:before{content:"\20ac"}.glyphicon-minus:before{content:"\2212"}.glyphicon-cloud:before{content:"\2601"}.glyphicon-envelope:before{content:"\2709"}.glyphicon-pencil:before{content:"\270f"}.glyphicon-glass:before{content:"\e001"}.glyphicon-music:before{content:"\e002"}.glyphicon-search:before{content:"\e003"}.glyphicon-heart:before{content:"\e005"}.glyphicon-star:before{content:"\e006"}.glyphicon-star-empty:before{content:"\e007"}.glyphicon-user:before{content:"\e008"}.glyphicon-film:before{content:"\e009"}.glyphicon-th-large:before{content:"\e010"}.glyphicon-th:before{content:"\e011"}.glyphicon-th-list:before{content:"\e012"}.glyphicon-ok:before{content:"\e013"}.glyphicon-remove:before{content:"\e014"}.glyphicon-zoom-in:before{content:"\e015"}.glyphicon-zoom-out:before{content:"\e016"}.glyphicon-off:before{content:"\e017"}.glyphicon-signal:before{content:"\e018"}.glyphicon-cog:before{content:"\e019"}.glyphicon-trash:before{content:"\e020"}.glyphicon-home:before{content:"\e021"}.glyphicon-file:before{content:"\e022"}.glyphicon-time:before{content:"\e023"}.glyphicon-road:before{content:"\e024"}.glyphicon-download-alt:before{content:"\e025"}.glyphicon-download:before{content:"\e026"}.glyphicon-upload:before{content:"\e027"}.glyphicon-inbox:before{content:"\e028"}.glyphicon-play-circle:before{content:"\e029"}.glyphicon-repeat:before{content:"\e030"}.glyphicon-refresh:before{content:"\e031"}.glyphicon-list-alt:before{content:"\e032"}.glyphicon-lock:before{content:"\e033"}.glyphicon-flag:before{content:"\e034"}.glyphicon-headphones:before{content:"\e035"}.glyphicon-volume-off:before{content:"\e036"}.glyphicon-volume-down:before{content:"\e037"}.glyphicon-volume-up:before{content:"\e038"}.glyphicon-qrcode:before{content:"\e039"}.glyphicon-barcode:before{content:"\e040"}.glyphicon-tag:before{content:"\e041"}.glyphicon-tags:before{content:"\e042"}.glyphicon-book:before{content:"\e043"}.glyphicon-bookmark:before{content:"\e044"}.glyphicon-print:before{content:"\e045"}.glyphicon-camera:before{content:"\e046"}.glyphicon-font:before{content:"\e047"}.glyphicon-bold:before{content:"\e048"}.glyphicon-italic:before{content:"\e049"}.glyphicon-text-height:before{content:"\e050"}.glyphicon-text-width:before{content:"\e051"}.glyphicon-align-left:before{content:"\e052"}.glyphicon-align-center:before{content:"\e053"}.glyphicon-align-right:before{content:"\e054"}.glyphicon-align-justify:before{content:"\e055"}.glyphicon-list:before{content:"\e056"}.glyphicon-indent-left:before{content:"\e057"}.glyphicon-indent-right:before{content:"\e058"}.glyphicon-facetime-video:before{content:"\e059"}.glyphicon-picture:before{content:"\e060"}.glyphicon-map-marker:before{content:"\e062"}.glyphicon-adjust:before{content:"\e063"}.glyphicon-tint:before{content:"\e064"}.glyphicon-edit:before{content:"\e065"}.glyphicon-share:before{content:"\e066"}.glyphicon-check:before{content:"\e067"}.glyphicon-move:before{content:"\e068"}.glyphicon-step-backward:before{content:"\e069"}.glyphicon-fast-backward:before{content:"\e070"}.glyphicon-backward:before{content:"\e071"}.glyphicon-play:before{content:"\e072"}.glyphicon-pause:before{content:"\e073"}.glyphicon-stop:before{content:"\e074"}.glyphicon-forward:before{content:"\e075"}.glyphicon-fast-forward:before{content:"\e076"}.glyphicon-step-forward:before{content:"\e077"}.glyphicon-eject:before{content:"\e078"}.glyphicon-chevron-left:before{content:"\e079"}.glyphicon-chevron-right:before{content:"\e080"}.glyphicon-plus-sign:before{content:"\e081"}.glyphicon-minus-sign:before{content:"\e082"}.glyphicon-remove-sign:before{content:"\e083"}.glyphicon-ok-sign:before{content:"\e084"}.glyphicon-question-sign:before{content:"\e085"}.glyphicon-info-sign:before{content:"\e086"}.glyphicon-screenshot:before{content:"\e087"}.glyphicon-remove-circle:before{content:"\e088"}.glyphicon-ok-circle:before{content:"\e089"}.glyphicon-ban-circle:before{content:"\e090"}.glyphicon-arrow-left:before{content:"\e091"}.glyphicon-arrow-right:before{content:"\e092"}.glyphicon-arrow-up:before{content:"\e093"}.glyphicon-arrow-down:before{content:"\e094"}.glyphicon-share-alt:before{content:"\e095"}.glyphicon-resize-full:before{content:"\e096"}.glyphicon-resize-small:before{content:"\e097"}.glyphicon-exclamation-sign:before{content:"\e101"}.glyphicon-gift:before{content:"\e102"}.glyphicon-leaf:before{content:"\e103"}.glyphicon-fire:before{content:"\e104"}.glyphicon-eye-open:before{content:"\e105"}.glyphicon-eye-close:before{content:"\e106"}.glyphicon-warning-sign:before{content:"\e107"}.glyphicon-plane:before{content:"\e108"}.glyphicon-calendar:before{content:"\e109"}.glyphicon-random:before{content:"\e110"}.glyphicon-comment:before{content:"\e111"}.glyphicon-magnet:before{content:"\e112"}.glyphicon-chevron-up:before{content:"\e113"}.glyphicon-chevron-down:before{content:"\e114"}.glyphicon-retweet:before{content:"\e115"}.glyphicon-shopping-cart:before{content:"\e116"}.glyphicon-folder-close:before{content:"\e117"}.glyphicon-folder-open:before{content:"\e118"}.glyphicon-resize-vertical:before{content:"\e119"}.glyphicon-resize-horizontal:before{content:"\e120"}.glyphicon-hdd:before{content:"\e121"}.glyphicon-bullhorn:before{content:"\e122"}.glyphicon-bell:before{content:"\e123"}.glyphicon-certificate:before{content:"\e124"}.glyphicon-thumbs-up:before{content:"\e125"}.glyphicon-thumbs-down:before{content:"\e126"}.glyphicon-hand-right:before{content:"\e127"}.glyphicon-hand-left:before{content:"\e128"}.glyphicon-hand-up:before{content:"\e129"}.glyphicon-hand-down:before{content:"\e130"}.glyphicon-circle-arrow-right:before{content:"\e131"}.glyphicon-circle-arrow-left:before{content:"\e132"}.glyphicon-circle-arrow-up:before{content:"\e133"}.glyphicon-circle-arrow-down:before{content:"\e134"}.glyphicon-globe:before{content:"\e135"}.glyphicon-wrench:before{content:"\e136"}.glyphicon-tasks:before{content:"\e137"}.glyphicon-filter:before{content:"\e138"}.glyphicon-briefcase:before{content:"\e139"}.glyphicon-fullscreen:before{content:"\e140"}.glyphicon-dashboard:before{content:"\e141"}.glyphicon-paperclip:before{content:"\e142"}.glyphicon-heart-empty:before{content:"\e143"}.glyphicon-link:before{content:"\e144"}.glyphicon-phone:before{content:"\e145"}.glyphicon-pushpin:before{content:"\e146"}.glyphicon-usd:before{content:"\e148"}.glyphicon-gbp:before{content:"\e149"}.glyphicon-sort:before{content:"\e150"}.glyphicon-sort-by-alphabet:before{content:"\e151"}.glyphicon-sort-by-alphabet-alt:before{content:"\e152"}.glyphicon-sort-by-order:before{content:"\e153"}.glyphicon-sort-by-order-alt:before{content:"\e154"}.glyphicon-sort-by-attributes:before{content:"\e155"}.glyphicon-sort-by-attributes-alt:before{content:"\e156"}.glyphicon-unchecked:before{content:"\e157"}.glyphicon-expand:before{content:"\e158"}.glyphicon-collapse-down:before{content:"\e159"}.glyphicon-collapse-up:before{content:"\e160"}.glyphicon-log-in:before{content:"\e161"}.glyphicon-flash:before{content:"\e162"}.glyphicon-log-out:before{content:"\e163"}.glyphicon-new-window:before{content:"\e164"}.glyphicon-record:before{content:"\e165"}.glyphicon-save:before{content:"\e166"}.glyphicon-open:before{content:"\e167"}.glyphicon-saved:before{content:"\e168"}.glyphicon-import:before{content:"\e169"}.glyphicon-export:before{content:"\e170"}.glyphicon-send:before{content:"\e171"}.glyphicon-floppy-disk:before{content:"\e172"}.glyphicon-floppy-saved:before{content:"\e173"}.glyphicon-floppy-remove:before{content:"\e174"}.glyphicon-floppy-save:before{content:"\e175"}.glyphicon-floppy-open:before{content:"\e176"}.glyphicon-credit-card:before{content:"\e177"}.glyphicon-transfer:before{content:"\e178"}.glyphicon-cutlery:before{content:"\e179"}.glyphicon-header:before{content:"\e180"}.glyphicon-compressed:before{content:"\e181"}.glyphicon-earphone:before{content:"\e182"}.glyphicon-phone-alt:before{content:"\e183"}.glyphicon-tower:before{content:"\e184"}.glyphicon-stats:before{content:"\e185"}.glyphicon-sd-video:before{content:"\e186"}.glyphicon-hd-video:before{content:"\e187"}.glyphicon-subtitles:before{content:"\e188"}.glyphicon-sound-stereo:before{content:"\e189"}.glyphicon-sound-dolby:before{content:"\e190"}.glyphicon-sound-5-1:before{content:"\e191"}.glyphicon-sound-6-1:before{content:"\e192"}.glyphicon-sound-7-1:before{content:"\e193"}.glyphicon-copyright-mark:before{content:"\e194"}.glyphicon-registration-mark:before{content:"\e195"}.glyphicon-cloud-download:before{content:"\e197"}.glyphicon-cloud-upload:before{content:"\e198"}.glyphicon-tree-conifer:before{content:"\e199"}.glyphicon-tree-deciduous:before{content:"\e200"}.glyphicon-cd:before{content:"\e201"}.glyphicon-save-file:before{content:"\e202"}.glyphicon-open-file:before{content:"\e203"}.glyphicon-level-up:before{content:"\e204"}.glyphicon-copy:before{content:"\e205"}.glyphicon-paste:before{content:"\e206"}.glyphicon-alert:before{content:"\e209"}.glyphicon-equalizer:before{content:"\e210"}.glyphicon-king:before{content:"\e211"}.glyphicon-queen:before{content:"\e212"}.glyphicon-pawn:before{content:"\e213"}.glyphicon-bishop:before{content:"\e214"}.glyphicon-knight:before{content:"\e215"}.glyphicon-baby-formula:before{content:"\e216"}.glyphicon-tent:before{content:"\26fa"}.glyphicon-blackboard:before{content:"\e218"}.glyphicon-bed:before{content:"\e219"}.glyphicon-apple:before{content:"\f8ff"}.glyphicon-erase:before{content:"\e221"}.glyphicon-hourglass:before{content:"\231b"}.glyphicon-lamp:before{content:"\e223"}.glyphicon-duplicate:before{content:"\e224"}.glyphicon-piggy-bank:before{content:"\e225"}.glyphicon-scissors:before{content:"\e226"}.glyphicon-bitcoin:before{content:"\e227"}.glyphicon-btc:before{content:"\e227"}.glyphicon-xbt:before{content:"\e227"}.glyphicon-yen:before{content:"\00a5"}.glyphicon-jpy:before{content:"\00a5"}.glyphicon-ruble:before{content:"\20bd"}.glyphicon-rub:before{content:"\20bd"}.glyphicon-scale:before{content:"\e230"}.glyphicon-ice-lolly:before{content:"\e231"}.glyphicon-ice-lolly-tasted:before{content:"\e232"}.glyphicon-education:before{content:"\e233"}.glyphicon-option-horizontal:before{content:"\e234"}.glyphicon-option-vertical:before{content:"\e235"}.glyphicon-menu-hamburger:before{content:"\e236"}.glyphicon-modal-window:before{content:"\e237"}.glyphicon-oil:before{content:"\e238"}.glyphicon-grain:before{content:"\e239"}.glyphicon-sunglasses:before{content:"\e240"}.glyphicon-text-size:before{content:"\e241"}.glyphicon-text-color:before{content:"\e242"}.glyphicon-text-background:before{content:"\e243"}.glyphicon-object-align-top:before{content:"\e244"}.glyphicon-object-align-bottom:before{content:"\e245"}.glyphicon-object-align-horizontal:before{content:"\e246"}.glyphicon-object-align-left:before{content:"\e247"}.glyphicon-object-align-vertical:before{content:"\e248"}.glyphicon-object-align-right:before{content:"\e249"}.glyphicon-triangle-right:before{content:"\e250"}.glyphicon-triangle-left:before{content:"\e251"}.glyphicon-triangle-bottom:before{content:"\e252"}.glyphicon-triangle-top:before{content:"\e253"}.glyphicon-console:before{content:"\e254"}.glyphicon-superscript:before{content:"\e255"}.glyphicon-subscript:before{content:"\e256"}.glyphicon-menu-left:before{content:"\e257"}.glyphicon-menu-right:before{content:"\e258"}.glyphicon-menu-down:before{content:"\e259"}.glyphicon-menu-up:before{content:"\e260"}*{-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box}:after,:before{-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box}html{font-size:10px;-webkit-tap-highlight-color:rgba(0,0,0,0)}body{font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;font-size:14px;line-height:1.42857143;color:#333;background-color:#fff}button,input,select,textarea{font-family:inherit;font-size:inherit;line-height:inherit}a{color:#337ab7;text-decoration:none}a:focus,a:hover{color:#23527c;text-decoration:underline}a:focus{outline:5px auto -webkit-focus-ring-color;outline-offset:-2px}figure{margin:0}img{vertical-align:middle}.carousel-inner>.item>a>img,.carousel-inner>.item>img,.img-responsive,.thumbnail a>img,.thumbnail>img{display:block;max-width:100%;height:auto}.img-rounded{border-radius:6px}.img-thumbnail{padding:4px;line-height:1.42857143;background-color:#fff;border:1px solid #ddd;border-radius:4px;-webkit-transition:all .2s ease-in-out;-o-transition:all .2s ease-in-out;transition:all .2s ease-in-out;display:inline-block;max-width:100%;height:auto}.img-circle{border-radius:50%}hr{margin-top:20px;margin-bottom:20px;border:0;border-top:1px solid #eee}.sr-only{position:absolute;width:1px;height:1px;padding:0;margin:-1px;overflow:hidden;clip:rect(0,0,0,0);border:0}.sr-only-focusable:active,.sr-only-focusable:focus{position:static;width:auto;height:auto;margin:0;overflow:visible;clip:auto}[role=button]{cursor:pointer}.h1,.h2,.h3,.h4,.h5,.h6,h1,h2,h3,h4,h5,h6{font-family:inherit;font-weight:500;line-height:1.1;color:inherit}.h1 .small,.h1 small,.h2 .small,.h2 small,.h3 .small,.h3 small,.h4 .small,.h4 small,.h5 .small,.h5 small,.h6 .small,.h6 small,h1 .small,h1 small,h2 .small,h2 small,h3 .small,h3 small,h4 .small,h4 small,h5 .small,h5 small,h6 .small,h6 small{font-weight:400;line-height:1;color:#777}.h1,.h2,.h3,h1,h2,h3{margin-top:20px;margin-bottom:10px}.h1 .small,.h1 small,.h2 .small,.h2 small,.h3 .small,.h3 small,h1 .small,h1 small,h2 .small,h2 small,h3 .small,h3 small{font-size:65%}.h4,.h5,.h6,h4,h5,h6{margin-top:10px;margin-bottom:10px}.h4 .small,.h4 small,.h5 .small,.h5 small,.h6 .small,.h6 small,h4 .small,h4 small,h5 .small,h5 small,h6 .small,h6 small{font-size:75%}.h1,h1{font-size:36px}.h2,h2{font-size:30px}.h3,h3{font-size:24px}.h4,h4{font-size:18px}.h5,h5{font-size:14px}.h6,h6{font-size:12px}p{margin:0 0 10px}.lead{margin-bottom:20px;font-size:16px;font-weight:300;line-height:1.4}@media (min-width:768px){.lead{font-size:21px}}.small,small{font-size:85%}.mark,mark{padding:.2em;background-color:#fcf8e3}.text-left{text-align:left}.text-right{text-align:right}.text-center{text-align:center}.text-justify{text-align:justify}.text-nowrap{white-space:nowrap}.text-lowercase{text-transform:lowercase}.text-uppercase{text-transform:uppercase}.text-capitalize{text-transform:capitalize}.text-muted{color:#777}.text-primary{color:#337ab7}a.text-primary:focus,a.text-primary:hover{color:#286090}.text-success{color:#3c763d}a.text-success:focus,a.text-success:hover{color:#2b542c}.text-info{color:#31708f}a.text-info:focus,a.text-info:hover{color:#245269}.text-warning{color:#8a6d3b}a.text-warning:focus,a.text-warning:hover{color:#66512c}.text-danger{color:#a94442}a.text-danger:focus,a.text-danger:hover{color:#843534}.bg-primary{color:#fff;background-color:#337ab7}a.bg-primary:focus,a.bg-primary:hover{background-color:#286090}.bg-success{background-color:#dff0d8}a.bg-success:focus,a.bg-success:hover{background-color:#c1e2b3}.bg-info{background-color:#d9edf7}a.bg-info:focus,a.bg-info:hover{background-color:#afd9ee}.bg-warning{background-color:#fcf8e3}a.bg-warning:focus,a.bg-warning:hover{background-color:#f7ecb5}.bg-danger{background-color:#f2dede}a.bg-danger:focus,a.bg-danger:hover{background-color:#e4b9b9}.page-header{padding-bottom:9px;margin:40px 0 20px;border-bottom:1px solid #eee}ol,ul{margin-top:0;margin-bottom:10px}ol ol,ol ul,ul ol,ul ul{margin-bottom:0}.list-unstyled{padding-left:0;list-style:none}.list-inline{padding-left:0;list-style:none;margin-left:-5px}.list-inline>li{display:inline-block;padding-right:5px;padding-left:5px}dl{margin-top:0;margin-bottom:20px}dd,dt{line-height:1.42857143}dt{font-weight:700}dd{margin-left:0}@media (min-width:768px){.dl-horizontal dt{float:left;width:160px;clear:left;text-align:right;overflow:hidden;text-overflow:ellipsis;white-space:nowrap}.dl-horizontal dd{margin-left:180px}}abbr[data-original-title],abbr[title]{cursor:help}.initialism{font-size:90%;text-transform:uppercase}blockquote{padding:10px 20px;margin:0 0 20px;font-size:17.5px;border-left:5px solid #eee}blockquote ol:last-child,blockquote p:last-child,blockquote ul:last-child{margin-bottom:0}blockquote .small,blockquote footer,blockquote small{display:block;font-size:80%;line-height:1.42857143;color:#777}blockquote .small:before,blockquote footer:before,blockquote small:before{content:"\2014 \00A0"}.blockquote-reverse,blockquote.pull-right{padding-right:15px;padding-left:0;text-align:right;border-right:5px solid #eee;border-left:0}.blockquote-reverse .small:before,.blockquote-reverse footer:before,.blockquote-reverse small:before,blockquote.pull-right .small:before,blockquote.pull-right footer:before,blockquote.pull-right small:before{content:""}.blockquote-reverse .small:after,.blockquote-reverse footer:after,.blockquote-reverse small:after,blockquote.pull-right .small:after,blockquote.pull-right footer:after,blockquote.pull-right small:after{content:"\00A0 \2014"}address{margin-bottom:20px;font-style:normal;line-height:1.42857143}code,kbd,pre,samp{font-family:Menlo,Monaco,Consolas,"Courier New",monospace}code{padding:2px 4px;font-size:90%;color:#c7254e;background-color:#f9f2f4;border-radius:4px}kbd{padding:2px 4px;font-size:90%;color:#fff;background-color:#333;border-radius:3px;-webkit-box-shadow:inset 0 -1px 0 rgba(0,0,0,.25);box-shadow:inset 0 -1px 0 rgba(0,0,0,.25)}kbd kbd{padding:0;font-size:100%;font-weight:700;-webkit-box-shadow:none;box-shadow:none}pre{display:block;padding:9.5px;margin:0 0 10px;font-size:13px;line-height:1.42857143;color:#333;word-break:break-all;word-wrap:break-word;background-color:#f5f5f5;border:1px solid #ccc;border-radius:4px}pre code{padding:0;font-size:inherit;color:inherit;white-space:pre-wrap;background-color:transparent;border-radius:0}.pre-scrollable{max-height:340px;overflow-y:scroll}.container{padding-right:15px;padding-left:15px;margin-right:auto;margin-left:auto}@media (min-width:768px){.container{width:750px}}@media (min-width:992px){.container{width:970px}}@media (min-width:1200px){.container{width:1170px}}.container-fluid{padding-right:15px;padding-left:15px;margin-right:auto;margin-left:auto}.row{margin-right:-15px;margin-left:-15px}.row-no-gutters{margin-right:0;margin-left:0}.row-no-gutters [class*=col-]{padding-right:0;padding-left:0}.col-lg-1,.col-lg-10,.col-lg-11,.col-lg-12,.col-lg-2,.col-lg-3,.col-lg-4,.col-lg-5,.col-lg-6,.col-lg-7,.col-lg-8,.col-lg-9,.col-md-1,.col-md-10,.col-md-11,.col-md-12,.col-md-2,.col-md-3,.col-md-4,.col-md-5,.col-md-6,.col-md-7,.col-md-8,.col-md-9,.col-sm-1,.col-sm-10,.col-sm-11,.col-sm-12,.col-sm-2,.col-sm-3,.col-sm-4,.col-sm-5,.col-sm-6,.col-sm-7,.col-sm-8,.col-sm-9,.col-xs-1,.col-xs-10,.col-xs-11,.col-xs-12,.col-xs-2,.col-xs-3,.col-xs-4,.col-xs-5,.col-xs-6,.col-xs-7,.col-xs-8,.col-xs-9{position:relative;min-height:1px;padding-right:15px;padding-left:15px}.col-xs-1,.col-xs-10,.col-xs-11,.col-xs-12,.col-xs-2,.col-xs-3,.col-xs-4,.col-xs-5,.col-xs-6,.col-xs-7,.col-xs-8,.col-xs-9{float:left}.col-xs-12{width:100%}.col-xs-11{width:91.66666667%}.col-xs-10{width:83.33333333%}.col-xs-9{width:75%}.col-xs-8{width:66.66666667%}.col-xs-7{width:58.33333333%}.col-xs-6{width:50%}.col-xs-5{width:41.66666667%}.col-xs-4{width:33.33333333%}.col-xs-3{width:25%}.col-xs-2{width:16.66666667%}.col-xs-1{width:8.33333333%}.col-xs-pull-12{right:100%}.col-xs-pull-11{right:91.66666667%}.col-xs-pull-10{right:83.33333333%}.col-xs-pull-9{right:75%}.col-xs-pull-8{right:66.66666667%}.col-xs-pull-7{right:58.33333333%}.col-xs-pull-6{right:50%}.col-xs-pull-5{right:41.66666667%}.col-xs-pull-4{right:33.33333333%}.col-xs-pull-3{right:25%}.col-xs-pull-2{right:16.66666667%}.col-xs-pull-1{right:8.33333333%}.col-xs-pull-0{right:auto}.col-xs-push-12{left:100%}.col-xs-push-11{left:91.66666667%}.col-xs-push-10{left:83.33333333%}.col-xs-push-9{left:75%}.col-xs-push-8{left:66.66666667%}.col-xs-push-7{left:58.33333333%}.col-xs-push-6{left:50%}.col-xs-push-5{left:41.66666667%}.col-xs-push-4{left:33.33333333%}.col-xs-push-3{left:25%}.col-xs-push-2{left:16.66666667%}.col-xs-push-1{left:8.33333333%}.col-xs-push-0{left:auto}.col-xs-offset-12{margin-left:100%}.col-xs-offset-11{margin-left:91.66666667%}.col-xs-offset-10{margin-left:83.33333333%}.col-xs-offset-9{margin-left:75%}.col-xs-offset-8{margin-left:66.66666667%}.col-xs-offset-7{margin-left:58.33333333%}.col-xs-offset-6{margin-left:50%}.col-xs-offset-5{margin-left:41.66666667%}.col-xs-offset-4{margin-left:33.33333333%}.col-xs-offset-3{margin-left:25%}.col-xs-offset-2{margin-left:16.66666667%}.col-xs-offset-1{margin-left:8.33333333%}.col-xs-offset-0{margin-left:0}@media (min-width:768px){.col-sm-1,.col-sm-10,.col-sm-11,.col-sm-12,.col-sm-2,.col-sm-3,.col-sm-4,.col-sm-5,.col-sm-6,.col-sm-7,.col-sm-8,.col-sm-9{float:left}.col-sm-12{width:100%}.col-sm-11{width:91.66666667%}.col-sm-10{width:83.33333333%}.col-sm-9{width:75%}.col-sm-8{width:66.66666667%}.col-sm-7{width:58.33333333%}.col-sm-6{width:50%}.col-sm-5{width:41.66666667%}.col-sm-4{width:33.33333333%}.col-sm-3{width:25%}.col-sm-2{width:16.66666667%}.col-sm-1{width:8.33333333%}.col-sm-pull-12{right:100%}.col-sm-pull-11{right:91.66666667%}.col-sm-pull-10{right:83.33333333%}.col-sm-pull-9{right:75%}.col-sm-pull-8{right:66.66666667%}.col-sm-pull-7{right:58.33333333%}.col-sm-pull-6{right:50%}.col-sm-pull-5{right:41.66666667%}.col-sm-pull-4{right:33.33333333%}.col-sm-pull-3{right:25%}.col-sm-pull-2{right:16.66666667%}.col-sm-pull-1{right:8.33333333%}.col-sm-pull-0{right:auto}.col-sm-push-12{left:100%}.col-sm-push-11{left:91.66666667%}.col-sm-push-10{left:83.33333333%}.col-sm-push-9{left:75%}.col-sm-push-8{left:66.66666667%}.col-sm-push-7{left:58.33333333%}.col-sm-push-6{left:50%}.col-sm-push-5{left:41.66666667%}.col-sm-push-4{left:33.33333333%}.col-sm-push-3{left:25%}.col-sm-push-2{left:16.66666667%}.col-sm-push-1{left:8.33333333%}.col-sm-push-0{left:auto}.col-sm-offset-12{margin-left:100%}.col-sm-offset-11{margin-left:91.66666667%}.col-sm-offset-10{margin-left:83.33333333%}.col-sm-offset-9{margin-left:75%}.col-sm-offset-8{margin-left:66.66666667%}.col-sm-offset-7{margin-left:58.33333333%}.col-sm-offset-6{margin-left:50%}.col-sm-offset-5{margin-left:41.66666667%}.col-sm-offset-4{margin-left:33.33333333%}.col-sm-offset-3{margin-left:25%}.col-sm-offset-2{margin-left:16.66666667%}.col-sm-offset-1{margin-left:8.33333333%}.col-sm-offset-0{margin-left:0}}@media (min-width:992px){.col-md-1,.col-md-10,.col-md-11,.col-md-12,.col-md-2,.col-md-3,.col-md-4,.col-md-5,.col-md-6,.col-md-7,.col-md-8,.col-md-9{float:left}.col-md-12{width:100%}.col-md-11{width:91.66666667%}.col-md-10{width:83.33333333%}.col-md-9{width:75%}.col-md-8{width:66.66666667%}.col-md-7{width:58.33333333%}.col-md-6{width:50%}.col-md-5{width:41.66666667%}.col-md-4{width:33.33333333%}.col-md-3{width:25%}.col-md-2{width:16.66666667%}.col-md-1{width:8.33333333%}.col-md-pull-12{right:100%}.col-md-pull-11{right:91.66666667%}.col-md-pull-10{right:83.33333333%}.col-md-pull-9{right:75%}.col-md-pull-8{right:66.66666667%}.col-md-pull-7{right:58.33333333%}.col-md-pull-6{right:50%}.col-md-pull-5{right:41.66666667%}.col-md-pull-4{right:33.33333333%}.col-md-pull-3{right:25%}.col-md-pull-2{right:16.66666667%}.col-md-pull-1{right:8.33333333%}.col-md-pull-0{right:auto}.col-md-push-12{left:100%}.col-md-push-11{left:91.66666667%}.col-md-push-10{left:83.33333333%}.col-md-push-9{left:75%}.col-md-push-8{left:66.66666667%}.col-md-push-7{left:58.33333333%}.col-md-push-6{left:50%}.col-md-push-5{left:41.66666667%}.col-md-push-4{left:33.33333333%}.col-md-push-3{left:25%}.col-md-push-2{left:16.66666667%}.col-md-push-1{left:8.33333333%}.col-md-push-0{left:auto}.col-md-offset-12{margin-left:100%}.col-md-offset-11{margin-left:91.66666667%}.col-md-offset-10{margin-left:83.33333333%}.col-md-offset-9{margin-left:75%}.col-md-offset-8{margin-left:66.66666667%}.col-md-offset-7{margin-left:58.33333333%}.col-md-offset-6{margin-left:50%}.col-md-offset-5{margin-left:41.66666667%}.col-md-offset-4{margin-left:33.33333333%}.col-md-offset-3{margin-left:25%}.col-md-offset-2{margin-left:16.66666667%}.col-md-offset-1{margin-left:8.33333333%}.col-md-offset-0{margin-left:0}}@media (min-width:1200px){.col-lg-1,.col-lg-10,.col-lg-11,.col-lg-12,.col-lg-2,.col-lg-3,.col-lg-4,.col-lg-5,.col-lg-6,.col-lg-7,.col-lg-8,.col-lg-9{float:left}.col-lg-12{width:100%}.col-lg-11{width:91.66666667%}.col-lg-10{width:83.33333333%}.col-lg-9{width:75%}.col-lg-8{width:66.66666667%}.col-lg-7{width:58.33333333%}.col-lg-6{width:50%}.col-lg-5{width:41.66666667%}.col-lg-4{width:33.33333333%}.col-lg-3{width:25%}.col-lg-2{width:16.66666667%}.col-lg-1{width:8.33333333%}.col-lg-pull-12{right:100%}.col-lg-pull-11{right:91.66666667%}.col-lg-pull-10{right:83.33333333%}.col-lg-pull-9{right:75%}.col-lg-pull-8{right:66.66666667%}.col-lg-pull-7{right:58.33333333%}.col-lg-pull-6{right:50%}.col-lg-pull-5{right:41.66666667%}.col-lg-pull-4{right:33.33333333%}.col-lg-pull-3{right:25%}.col-lg-pull-2{right:16.66666667%}.col-lg-pull-1{right:8.33333333%}.col-lg-pull-0{right:auto}.col-lg-push-12{left:100%}.col-lg-push-11{left:91.66666667%}.col-lg-push-10{left:83.33333333%}.col-lg-push-9{left:75%}.col-lg-push-8{left:66.66666667%}.col-lg-push-7{left:58.33333333%}.col-lg-push-6{left:50%}.col-lg-push-5{left:41.66666667%}.col-lg-push-4{left:33.33333333%}.col-lg-push-3{left:25%}.col-lg-push-2{left:16.66666667%}.col-lg-push-1{left:8.33333333%}.col-lg-push-0{left:auto}.col-lg-offset-12{margin-left:100%}.col-lg-offset-11{margin-left:91.66666667%}.col-lg-offset-10{margin-left:83.33333333%}.col-lg-offset-9{margin-left:75%}.col-lg-offset-8{margin-left:66.66666667%}.col-lg-offset-7{margin-left:58.33333333%}.col-lg-offset-6{margin-left:50%}.col-lg-offset-5{margin-left:41.66666667%}.col-lg-offset-4{margin-left:33.33333333%}.col-lg-offset-3{margin-left:25%}.col-lg-offset-2{margin-left:16.66666667%}.col-lg-offset-1{margin-left:8.33333333%}.col-lg-offset-0{margin-left:0}}table{background-color:transparent}table col[class*=col-]{position:static;display:table-column;float:none}table td[class*=col-],table th[class*=col-]{position:static;display:table-cell;float:none}caption{padding-top:8px;padding-bottom:8px;color:#777;text-align:left}th{text-align:left}.table{width:100%;max-width:100%;margin-bottom:20px}.table>tbody>tr>td,.table>tbody>tr>th,.table>tfoot>tr>td,.table>tfoot>tr>th,.table>thead>tr>td,.table>thead>tr>th{padding:8px;line-height:1.42857143;vertical-align:top;border-top:1px solid #ddd}.table>thead>tr>th{vertical-align:bottom;border-bottom:2px solid #ddd}.table>caption+thead>tr:first-child>td,.table>caption+thead>tr:first-child>th,.table>colgroup+thead>tr:first-child>td,.table>colgroup+thead>tr:first-child>th,.table>thead:first-child>tr:first-child>td,.table>thead:first-child>tr:first-child>th{border-top:0}.table>tbody+tbody{border-top:2px solid #ddd}.table .table{background-color:#fff}.table-condensed>tbody>tr>td,.table-condensed>tbody>tr>th,.table-condensed>tfoot>tr>td,.table-condensed>tfoot>tr>th,.table-condensed>thead>tr>td,.table-condensed>thead>tr>th{padding:5px}.table-bordered{border:1px solid #ddd}.table-bordered>tbody>tr>td,.table-bordered>tbody>tr>th,.table-bordered>tfoot>tr>td,.table-bordered>tfoot>tr>th,.table-bordered>thead>tr>td,.table-bordered>thead>tr>th{border:1px solid #ddd}.table-bordered>thead>tr>td,.table-bordered>thead>tr>th{border-bottom-width:2px}.table-striped>tbody>tr:nth-of-type(odd){background-color:#f9f9f9}.table-hover>tbody>tr:hover{background-color:#f5f5f5}.table>tbody>tr.active>td,.table>tbody>tr.active>th,.table>tbody>tr>td.active,.table>tbody>tr>th.active,.table>tfoot>tr.active>td,.table>tfoot>tr.active>th,.table>tfoot>tr>td.active,.table>tfoot>tr>th.active,.table>thead>tr.active>td,.table>thead>tr.active>th,.table>thead>tr>td.active,.table>thead>tr>th.active{background-color:#f5f5f5}.table-hover>tbody>tr.active:hover>td,.table-hover>tbody>tr.active:hover>th,.table-hover>tbody>tr:hover>.active,.table-hover>tbody>tr>td.active:hover,.table-hover>tbody>tr>th.active:hover{background-color:#e8e8e8}.table>tbody>tr.success>td,.table>tbody>tr.success>th,.table>tbody>tr>td.success,.table>tbody>tr>th.success,.table>tfoot>tr.success>td,.table>tfoot>tr.success>th,.table>tfoot>tr>td.success,.table>tfoot>tr>th.success,.table>thead>tr.success>td,.table>thead>tr.success>th,.table>thead>tr>td.success,.table>thead>tr>th.success{background-color:#dff0d8}.table-hover>tbody>tr.success:hover>td,.table-hover>tbody>tr.success:hover>th,.table-hover>tbody>tr:hover>.success,.table-hover>tbody>tr>td.success:hover,.table-hover>tbody>tr>th.success:hover{background-color:#d0e9c6}.table>tbody>tr.info>td,.table>tbody>tr.info>th,.table>tbody>tr>td.info,.table>tbody>tr>th.info,.table>tfoot>tr.info>td,.table>tfoot>tr.info>th,.table>tfoot>tr>td.info,.table>tfoot>tr>th.info,.table>thead>tr.info>td,.table>thead>tr.info>th,.table>thead>tr>td.info,.table>thead>tr>th.info{background-color:#d9edf7}.table-hover>tbody>tr.info:hover>td,.table-hover>tbody>tr.info:hover>th,.table-hover>tbody>tr:hover>.info,.table-hover>tbody>tr>td.info:hover,.table-hover>tbody>tr>th.info:hover{background-color:#c4e3f3}.table>tbody>tr.warning>td,.table>tbody>tr.warning>th,.table>tbody>tr>td.warning,.table>tbody>tr>th.warning,.table>tfoot>tr.warning>td,.table>tfoot>tr.warning>th,.table>tfoot>tr>td.warning,.table>tfoot>tr>th.warning,.table>thead>tr.warning>td,.table>thead>tr.warning>th,.table>thead>tr>td.warning,.table>thead>tr>th.warning{background-color:#fcf8e3}.table-hover>tbody>tr.warning:hover>td,.table-hover>tbody>tr.warning:hover>th,.table-hover>tbody>tr:hover>.warning,.table-hover>tbody>tr>td.warning:hover,.table-hover>tbody>tr>th.warning:hover{background-color:#faf2cc}.table>tbody>tr.danger>td,.table>tbody>tr.danger>th,.table>tbody>tr>td.danger,.table>tbody>tr>th.danger,.table>tfoot>tr.danger>td,.table>tfoot>tr.danger>th,.table>tfoot>tr>td.danger,.table>tfoot>tr>th.danger,.table>thead>tr.danger>td,.table>thead>tr.danger>th,.table>thead>tr>td.danger,.table>thead>tr>th.danger{background-color:#f2dede}.table-hover>tbody>tr.danger:hover>td,.table-hover>tbody>tr.danger:hover>th,.table-hover>tbody>tr:hover>.danger,.table-hover>tbody>tr>td.danger:hover,.table-hover>tbody>tr>th.danger:hover{background-color:#ebcccc}.table-responsive{min-height:.01%;overflow-x:auto}@media screen and (max-width:767px){.table-responsive{width:100%;margin-bottom:15px;overflow-y:hidden;-ms-overflow-style:-ms-autohiding-scrollbar;border:1px solid #ddd}.table-responsive>.table{margin-bottom:0}.table-responsive>.table>tbody>tr>td,.table-responsive>.table>tbody>tr>th,.table-responsive>.table>tfoot>tr>td,.table-responsive>.table>tfoot>tr>th,.table-responsive>.table>thead>tr>td,.table-responsive>.table>thead>tr>th{white-space:nowrap}.table-responsive>.table-bordered{border:0}.table-responsive>.table-bordered>tbody>tr>td:first-child,.table-responsive>.table-bordered>tbody>tr>th:first-child,.table-responsive>.table-bordered>tfoot>tr>td:first-child,.table-responsive>.table-bordered>tfoot>tr>th:first-child,.table-responsive>.table-bordered>thead>tr>td:first-child,.table-responsive>.table-bordered>thead>tr>th:first-child{border-left:0}.table-responsive>.table-bordered>tbody>tr>td:last-child,.table-responsive>.table-bordered>tbody>tr>th:last-child,.table-responsive>.table-bordered>tfoot>tr>td:last-child,.table-responsive>.table-bordered>tfoot>tr>th:last-child,.table-responsive>.table-bordered>thead>tr>td:last-child,.table-responsive>.table-bordered>thead>tr>th:last-child{border-right:0}.table-responsive>.table-bordered>tbody>tr:last-child>td,.table-responsive>.table-bordered>tbody>tr:last-child>th,.table-responsive>.table-bordered>tfoot>tr:last-child>td,.table-responsive>.table-bordered>tfoot>tr:last-child>th{border-bottom:0}}fieldset{min-width:0;padding:0;margin:0;border:0}legend{display:block;width:100%;padding:0;margin-bottom:20px;font-size:21px;line-height:inherit;color:#333;border:0;border-bottom:1px solid #e5e5e5}label{display:inline-block;max-width:100%;margin-bottom:5px;font-weight:700}input[type=search]{-webkit-box-sizing:border-box;-moz-box-sizing:border-box;box-sizing:border-box;-webkit-appearance:none;-moz-appearance:none;appearance:none}input[type=checkbox],input[type=radio]{margin:4px 0 0;margin-top:1px\9;line-height:normal}fieldset[disabled] input[type=checkbox],fieldset[disabled] input[type=radio],input[type=checkbox].disabled,input[type=checkbox][disabled],input[type=radio].disabled,input[type=radio][disabled]{cursor:not-allowed}input[type=file]{display:block}input[type=range]{display:block;width:100%}select[multiple],select[size]{height:auto}input[type=checkbox]:focus,input[type=file]:focus,input[type=radio]:focus{outline:5px auto -webkit-focus-ring-color;outline-offset:-2px}output{display:block;padding-top:7px;font-size:14px;line-height:1.42857143;color:#555}.form-control{display:block;width:100%;height:34px;padding:6px 12px;font-size:14px;line-height:1.42857143;color:#555;background-color:#fff;background-image:none;border:1px solid #ccc;border-radius:4px;-webkit-box-shadow:inset 0 1px 1px rgba(0,0,0,.075);box-shadow:inset 0 1px 1px rgba(0,0,0,.075);-webkit-transition:border-color ease-in-out .15s,box-shadow ease-in-out .15s;-o-transition:border-color ease-in-out .15s,box-shadow ease-in-out .15s;-webkit-transition:border-color ease-in-out .15s,-webkit-box-shadow ease-in-out .15s;transition:border-color ease-in-out .15s,-webkit-box-shadow ease-in-out .15s;transition:border-color ease-in-out .15s,box-shadow ease-in-out .15s;transition:border-color ease-in-out .15s,box-shadow ease-in-out .15s,-webkit-box-shadow ease-in-out .15s}.form-control:focus{border-color:#66afe9;outline:0;-webkit-box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 8px rgba(102,175,233,.6);box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 8px rgba(102,175,233,.6)}.form-control::-moz-placeholder{color:#999;opacity:1}.form-control:-ms-input-placeholder{color:#999}.form-control::-webkit-input-placeholder{color:#999}.form-control::-ms-expand{background-color:transparent;border:0}.form-control[disabled],.form-control[readonly],fieldset[disabled] .form-control{background-color:#eee;opacity:1}.form-control[disabled],fieldset[disabled] .form-control{cursor:not-allowed}textarea.form-control{height:auto}@media screen and (-webkit-min-device-pixel-ratio:0){input[type=date].form-control,input[type=datetime-local].form-control,input[type=month].form-control,input[type=time].form-control{line-height:34px}.input-group-sm input[type=date],.input-group-sm input[type=datetime-local],.input-group-sm input[type=month],.input-group-sm input[type=time],input[type=date].input-sm,input[type=datetime-local].input-sm,input[type=month].input-sm,input[type=time].input-sm{line-height:30px}.input-group-lg input[type=date],.input-group-lg input[type=datetime-local],.input-group-lg input[type=month],.input-group-lg input[type=time],input[type=date].input-lg,input[type=datetime-local].input-lg,input[type=month].input-lg,input[type=time].input-lg{line-height:46px}}.form-group{margin-bottom:15px}.checkbox,.radio{position:relative;display:block;margin-top:10px;margin-bottom:10px}.checkbox.disabled label,.radio.disabled label,fieldset[disabled] .checkbox label,fieldset[disabled] .radio label{cursor:not-allowed}.checkbox label,.radio label{min-height:20px;padding-left:20px;margin-bottom:0;font-weight:400;cursor:pointer}.checkbox input[type=checkbox],.checkbox-inline input[type=checkbox],.radio input[type=radio],.radio-inline input[type=radio]{position:absolute;margin-top:4px\9;margin-left:-20px}.checkbox+.checkbox,.radio+.radio{margin-top:-5px}.checkbox-inline,.radio-inline{position:relative;display:inline-block;padding-left:20px;margin-bottom:0;font-weight:400;vertical-align:middle;cursor:pointer}.checkbox-inline.disabled,.radio-inline.disabled,fieldset[disabled] .checkbox-inline,fieldset[disabled] .radio-inline{cursor:not-allowed}.checkbox-inline+.checkbox-inline,.radio-inline+.radio-inline{margin-top:0;margin-left:10px}.form-control-static{min-height:34px;padding-top:7px;padding-bottom:7px;margin-bottom:0}.form-control-static.input-lg,.form-control-static.input-sm{padding-right:0;padding-left:0}.input-sm{height:30px;padding:5px 10px;font-size:12px;line-height:1.5;border-radius:3px}select.input-sm{height:30px;line-height:30px}select[multiple].input-sm,textarea.input-sm{height:auto}.form-group-sm .form-control{height:30px;padding:5px 10px;font-size:12px;line-height:1.5;border-radius:3px}.form-group-sm select.form-control{height:30px;line-height:30px}.form-group-sm select[multiple].form-control,.form-group-sm textarea.form-control{height:auto}.form-group-sm .form-control-static{height:30px;min-height:32px;padding:6px 10px;font-size:12px;line-height:1.5}.input-lg{height:46px;padding:10px 16px;font-size:18px;line-height:1.3333333;border-radius:6px}select.input-lg{height:46px;line-height:46px}select[multiple].input-lg,textarea.input-lg{height:auto}.form-group-lg .form-control{height:46px;padding:10px 16px;font-size:18px;line-height:1.3333333;border-radius:6px}.form-group-lg select.form-control{height:46px;line-height:46px}.form-group-lg select[multiple].form-control,.form-group-lg textarea.form-control{height:auto}.form-group-lg .form-control-static{height:46px;min-height:38px;padding:11px 16px;font-size:18px;line-height:1.3333333}.has-feedback{position:relative}.has-feedback .form-control{padding-right:42.5px}.form-control-feedback{position:absolute;top:0;right:0;z-index:2;display:block;width:34px;height:34px;line-height:34px;text-align:center;pointer-events:none}.form-group-lg .form-control+.form-control-feedback,.input-group-lg+.form-control-feedback,.input-lg+.form-control-feedback{width:46px;height:46px;line-height:46px}.form-group-sm .form-control+.form-control-feedback,.input-group-sm+.form-control-feedback,.input-sm+.form-control-feedback{width:30px;height:30px;line-height:30px}.has-success .checkbox,.has-success .checkbox-inline,.has-success .control-label,.has-success .help-block,.has-success .radio,.has-success .radio-inline,.has-success.checkbox label,.has-success.checkbox-inline label,.has-success.radio label,.has-success.radio-inline label{color:#3c763d}.has-success .form-control{border-color:#3c763d;-webkit-box-shadow:inset 0 1px 1px rgba(0,0,0,.075);box-shadow:inset 0 1px 1px rgba(0,0,0,.075)}.has-success .form-control:focus{border-color:#2b542c;-webkit-box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #67b168;box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #67b168}.has-success .input-group-addon{color:#3c763d;background-color:#dff0d8;border-color:#3c763d}.has-success .form-control-feedback{color:#3c763d}.has-warning .checkbox,.has-warning .checkbox-inline,.has-warning .control-label,.has-warning .help-block,.has-warning .radio,.has-warning .radio-inline,.has-warning.checkbox label,.has-warning.checkbox-inline label,.has-warning.radio label,.has-warning.radio-inline label{color:#8a6d3b}.has-warning .form-control{border-color:#8a6d3b;-webkit-box-shadow:inset 0 1px 1px rgba(0,0,0,.075);box-shadow:inset 0 1px 1px rgba(0,0,0,.075)}.has-warning .form-control:focus{border-color:#66512c;-webkit-box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #c0a16b;box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #c0a16b}.has-warning .input-group-addon{color:#8a6d3b;background-color:#fcf8e3;border-color:#8a6d3b}.has-warning .form-control-feedback{color:#8a6d3b}.has-error .checkbox,.has-error .checkbox-inline,.has-error .control-label,.has-error .help-block,.has-error .radio,.has-error .radio-inline,.has-error.checkbox label,.has-error.checkbox-inline label,.has-error.radio label,.has-error.radio-inline label{color:#a94442}.has-error .form-control{border-color:#a94442;-webkit-box-shadow:inset 0 1px 1px rgba(0,0,0,.075);box-shadow:inset 0 1px 1px rgba(0,0,0,.075)}.has-error .form-control:focus{border-color:#843534;-webkit-box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #ce8483;box-shadow:inset 0 1px 1px rgba(0,0,0,.075),0 0 6px #ce8483}.has-error .input-group-addon{color:#a94442;background-color:#f2dede;border-color:#a94442}.has-error .form-control-feedback{color:#a94442}.has-feedback label~.form-control-feedback{top:25px}.has-feedback label.sr-only~.form-control-feedback{top:0}.help-block{display:block;margin-top:5px;margin-bottom:10px;color:#737373}@media (min-width:768px){.form-inline .form-group{display:inline-block;margin-bottom:0;vertical-align:middle}.form-inline .form-control{display:inline-block;width:auto;vertical-align:middle}.form-inline .form-control-static{display:inline-block}.form-inline .input-group{display:inline-table;vertical-align:middle}.form-inline .input-group .form-control,.form-inline .input-group .input-group-addon,.form-inline .input-group .input-group-btn{width:auto}.form-inline .input-group>.form-control{width:100%}.form-inline .control-label{margin-bottom:0;vertical-align:middle}.form-inline .checkbox,.form-inline .radio{display:inline-block;margin-top:0;margin-bottom:0;vertical-align:middle}.form-inline .checkbox label,.form-inline .radio label{padding-left:0}.form-inline .checkbox input[type=checkbox],.form-inline .radio input[type=radio]{position:relative;margin-left:0}.form-inline .has-feedback .form-control-feedback{top:0}}.form-horizontal .checkbox,.form-horizontal .checkbox-inline,.form-horizontal .radio,.form-horizontal .radio-inline{padding-top:7px;margin-top:0;margin-bottom:0}.form-horizontal .checkbox,.form-horizontal .radio{min-height:27px}.form-horizontal .form-group{margin-right:-15px;margin-left:-15px}@media (min-width:768px){.form-horizontal .control-label{padding-top:7px;margin-bottom:0;text-align:right}}.form-horizontal .has-feedback .form-control-feedback{right:15px}@media (min-width:768px){.form-horizontal .form-group-lg .control-label{padding-top:11px;font-size:18px}}@media (min-width:768px){.form-horizontal .form-group-sm .control-label{padding-top:6px;font-size:12px}}.btn{display:inline-block;margin-bottom:0;font-weight:400;text-align:center;white-space:nowrap;vertical-align:middle;-ms-touch-action:manipulation;touch-action:manipulation;cursor:pointer;background-image:none;border:1px solid transparent;padding:6px 12px;font-size:14px;line-height:1.42857143;border-radius:4px;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none}.btn.active.focus,.btn.active:focus,.btn.focus,.btn:active.focus,.btn:active:focus,.btn:focus{outline:5px auto -webkit-focus-ring-color;outline-offset:-2px}.btn.focus,.btn:focus,.btn:hover{color:#333;text-decoration:none}.btn.active,.btn:active{background-image:none;outline:0;-webkit-box-shadow:inset 0 3px 5px rgba(0,0,0,.125);box-shadow:inset 0 3px 5px rgba(0,0,0,.125)}.btn.disabled,.btn[disabled],fieldset[disabled] .btn{cursor:not-allowed;filter:alpha(opacity=65);opacity:.65;-webkit-box-shadow:none;box-shadow:none}a.btn.disabled,fieldset[disabled] a.btn{pointer-events:none}.btn-default{color:#333;background-color:#fff;border-color:#ccc}.btn-default.focus,.btn-default:focus{color:#333;background-color:#e6e6e6;border-color:#8c8c8c}.btn-default:hover{color:#333;background-color:#e6e6e6;border-color:#adadad}.btn-default.active,.btn-default:active,.open>.dropdown-toggle.btn-default{color:#333;background-color:#e6e6e6;background-image:none;border-color:#adadad}.btn-default.active.focus,.btn-default.active:focus,.btn-default.active:hover,.btn-default:active.focus,.btn-default:active:focus,.btn-default:active:hover,.open>.dropdown-toggle.btn-default.focus,.open>.dropdown-toggle.btn-default:focus,.open>.dropdown-toggle.btn-default:hover{color:#333;background-color:#d4d4d4;border-color:#8c8c8c}.btn-default.disabled.focus,.btn-default.disabled:focus,.btn-default.disabled:hover,.btn-default[disabled].focus,.btn-default[disabled]:focus,.btn-default[disabled]:hover,fieldset[disabled] .btn-default.focus,fieldset[disabled] .btn-default:focus,fieldset[disabled] .btn-default:hover{background-color:#fff;border-color:#ccc}.btn-default .badge{color:#fff;background-color:#333}.btn-primary{color:#fff;background-color:#337ab7;border-color:#2e6da4}.btn-primary.focus,.btn-primary:focus{color:#fff;background-color:#286090;border-color:#122b40}.btn-primary:hover{color:#fff;background-color:#286090;border-color:#204d74}.btn-primary.active,.btn-primary:active,.open>.dropdown-toggle.btn-primary{color:#fff;background-color:#286090;background-image:none;border-color:#204d74}.btn-primary.active.focus,.btn-primary.active:focus,.btn-primary.active:hover,.btn-primary:active.focus,.btn-primary:active:focus,.btn-primary:active:hover,.open>.dropdown-toggle.btn-primary.focus,.open>.dropdown-toggle.btn-primary:focus,.open>.dropdown-toggle.btn-primary:hover{color:#fff;background-color:#204d74;border-color:#122b40}.btn-primary.disabled.focus,.btn-primary.disabled:focus,.btn-primary.disabled:hover,.btn-primary[disabled].focus,.btn-primary[disabled]:focus,.btn-primary[disabled]:hover,fieldset[disabled] .btn-primary.focus,fieldset[disabled] .btn-primary:focus,fieldset[disabled] .btn-primary:hover{background-color:#337ab7;border-color:#2e6da4}.btn-primary .badge{color:#337ab7;background-color:#fff}.btn-success{color:#fff;background-color:#5cb85c;border-color:#4cae4c}.btn-success.focus,.btn-success:focus{color:#fff;background-color:#449d44;border-color:#255625}.btn-success:hover{color:#fff;background-color:#449d44;border-color:#398439}.btn-success.active,.btn-success:active,.open>.dropdown-toggle.btn-success{color:#fff;background-color:#449d44;background-image:none;border-color:#398439}.btn-success.active.focus,.btn-success.active:focus,.btn-success.active:hover,.btn-success:active.focus,.btn-success:active:focus,.btn-success:active:hover,.open>.dropdown-toggle.btn-success.focus,.open>.dropdown-toggle.btn-success:focus,.open>.dropdown-toggle.btn-success:hover{color:#fff;background-color:#398439;border-color:#255625}.btn-success.disabled.focus,.btn-success.disabled:focus,.btn-success.disabled:hover,.btn-success[disabled].focus,.btn-success[disabled]:focus,.btn-success[disabled]:hover,fieldset[disabled] .btn-success.focus,fieldset[disabled] .btn-success:focus,fieldset[disabled] .btn-success:hover{background-color:#5cb85c;border-color:#4cae4c}.btn-success .badge{color:#5cb85c;background-color:#fff}.btn-info{color:#fff;background-color:#5bc0de;border-color:#46b8da}.btn-info.focus,.btn-info:focus{color:#fff;background-color:#31b0d5;border-color:#1b6d85}.btn-info:hover{color:#fff;background-color:#31b0d5;border-color:#269abc}.btn-info.active,.btn-info:active,.open>.dropdown-toggle.btn-info{color:#fff;background-color:#31b0d5;background-image:none;border-color:#269abc}.btn-info.active.focus,.btn-info.active:focus,.btn-info.active:hover,.btn-info:active.focus,.btn-info:active:focus,.btn-info:active:hover,.open>.dropdown-toggle.btn-info.focus,.open>.dropdown-toggle.btn-info:focus,.open>.dropdown-toggle.btn-info:hover{color:#fff;background-color:#269abc;border-color:#1b6d85}.btn-info.disabled.focus,.btn-info.disabled:focus,.btn-info.disabled:hover,.btn-info[disabled].focus,.btn-info[disabled]:focus,.btn-info[disabled]:hover,fieldset[disabled] .btn-info.focus,fieldset[disabled] .btn-info:focus,fieldset[disabled] .btn-info:hover{background-color:#5bc0de;border-color:#46b8da}.btn-info .badge{color:#5bc0de;background-color:#fff}.btn-warning{color:#fff;background-color:#f0ad4e;border-color:#eea236}.btn-warning.focus,.btn-warning:focus{color:#fff;background-color:#ec971f;border-color:#985f0d}.btn-warning:hover{color:#fff;background-color:#ec971f;border-color:#d58512}.btn-warning.active,.btn-warning:active,.open>.dropdown-toggle.btn-warning{color:#fff;background-color:#ec971f;background-image:none;border-color:#d58512}.btn-warning.active.focus,.btn-warning.active:focus,.btn-warning.active:hover,.btn-warning:active.focus,.btn-warning:active:focus,.btn-warning:active:hover,.open>.dropdown-toggle.btn-warning.focus,.open>.dropdown-toggle.btn-warning:focus,.open>.dropdown-toggle.btn-warning:hover{color:#fff;background-color:#d58512;border-color:#985f0d}.btn-warning.disabled.focus,.btn-warning.disabled:focus,.btn-warning.disabled:hover,.btn-warning[disabled].focus,.btn-warning[disabled]:focus,.btn-warning[disabled]:hover,fieldset[disabled] .btn-warning.focus,fieldset[disabled] .btn-warning:focus,fieldset[disabled] .btn-warning:hover{background-color:#f0ad4e;border-color:#eea236}.btn-warning .badge{color:#f0ad4e;background-color:#fff}.btn-danger{color:#fff;background-color:#d9534f;border-color:#d43f3a}.btn-danger.focus,.btn-danger:focus{color:#fff;background-color:#c9302c;border-color:#761c19}.btn-danger:hover{color:#fff;background-color:#c9302c;border-color:#ac2925}.btn-danger.active,.btn-danger:active,.open>.dropdown-toggle.btn-danger{color:#fff;background-color:#c9302c;background-image:none;border-color:#ac2925}.btn-danger.active.focus,.btn-danger.active:focus,.btn-danger.active:hover,.btn-danger:active.focus,.btn-danger:active:focus,.btn-danger:active:hover,.open>.dropdown-toggle.btn-danger.focus,.open>.dropdown-toggle.btn-danger:focus,.open>.dropdown-toggle.btn-danger:hover{color:#fff;background-color:#ac2925;border-color:#761c19}.btn-danger.disabled.focus,.btn-danger.disabled:focus,.btn-danger.disabled:hover,.btn-danger[disabled].focus,.btn-danger[disabled]:focus,.btn-danger[disabled]:hover,fieldset[disabled] .btn-danger.focus,fieldset[disabled] .btn-danger:focus,fieldset[disabled] .btn-danger:hover{background-color:#d9534f;border-color:#d43f3a}.btn-danger .badge{color:#d9534f;background-color:#fff}.btn-link{font-weight:400;color:#337ab7;border-radius:0}.btn-link,.btn-link.active,.btn-link:active,.btn-link[disabled],fieldset[disabled] .btn-link{background-color:transparent;-webkit-box-shadow:none;box-shadow:none}.btn-link,.btn-link:active,.btn-link:focus,.btn-link:hover{border-color:transparent}.btn-link:focus,.btn-link:hover{color:#23527c;text-decoration:underline;background-color:transparent}.btn-link[disabled]:focus,.btn-link[disabled]:hover,fieldset[disabled] .btn-link:focus,fieldset[disabled] .btn-link:hover{color:#777;text-decoration:none}.btn-group-lg>.btn,.btn-lg{padding:10px 16px;font-size:18px;line-height:1.3333333;border-radius:6px}.btn-group-sm>.btn,.btn-sm{padding:5px 10px;font-size:12px;line-height:1.5;border-radius:3px}.btn-group-xs>.btn,.btn-xs{padding:1px 5px;font-size:12px;line-height:1.5;border-radius:3px}.btn-block{display:block;width:100%}.btn-block+.btn-block{margin-top:5px}input[type=button].btn-block,input[type=reset].btn-block,input[type=submit].btn-block{width:100%}.fade{opacity:0;-webkit-transition:opacity .15s linear;-o-transition:opacity .15s linear;transition:opacity .15s linear}.fade.in{opacity:1}.collapse{display:none}.collapse.in{display:block}tr.collapse.in{display:table-row}tbody.collapse.in{display:table-row-group}.collapsing{position:relative;height:0;overflow:hidden;-webkit-transition-property:height,visibility;-o-transition-property:height,visibility;transition-property:height,visibility;-webkit-transition-duration:.35s;-o-transition-duration:.35s;transition-duration:.35s;-webkit-transition-timing-function:ease;-o-transition-timing-function:ease;transition-timing-function:ease}.caret{display:inline-block;width:0;height:0;margin-left:2px;vertical-align:middle;border-top:4px dashed;border-top:4px solid\9;border-right:4px solid transparent;border-left:4px solid transparent}.dropdown,.dropup{position:relative}.dropdown-toggle:focus{outline:0}.dropdown-menu{position:absolute;top:100%;left:0;z-index:1000;display:none;float:left;min-width:160px;padding:5px 0;margin:2px 0 0;font-size:14px;text-align:left;list-style:none;background-color:#fff;background-clip:padding-box;border:1px solid #ccc;border:1px solid rgba(0,0,0,.15);border-radius:4px;-webkit-box-shadow:0 6px 12px rgba(0,0,0,.175);box-shadow:0 6px 12px rgba(0,0,0,.175)}.dropdown-menu.pull-right{right:0;left:auto}.dropdown-menu .divider{height:1px;margin:9px 0;overflow:hidden;background-color:#e5e5e5}.dropdown-menu>li>a{display:block;padding:3px 20px;clear:both;font-weight:400;line-height:1.42857143;color:#333;white-space:nowrap}.dropdown-menu>li>a:focus,.dropdown-menu>li>a:hover{color:#262626;text-decoration:none;background-color:#f5f5f5}.dropdown-menu>.active>a,.dropdown-menu>.active>a:focus,.dropdown-menu>.active>a:hover{color:#fff;text-decoration:none;background-color:#337ab7;outline:0}.dropdown-menu>.disabled>a,.dropdown-menu>.disabled>a:focus,.dropdown-menu>.disabled>a:hover{color:#777}.dropdown-menu>.disabled>a:focus,.dropdown-menu>.disabled>a:hover{text-decoration:none;cursor:not-allowed;background-color:transparent;background-image:none;filter:progid:DXImageTransform.Microsoft.gradient(enabled=false)}.open>.dropdown-menu{display:block}.open>a{outline:0}.dropdown-menu-right{right:0;left:auto}.dropdown-menu-left{right:auto;left:0}.dropdown-header{display:block;padding:3px 20px;font-size:12px;line-height:1.42857143;color:#777;white-space:nowrap}.dropdown-backdrop{position:fixed;top:0;right:0;bottom:0;left:0;z-index:990}.pull-right>.dropdown-menu{right:0;left:auto}.dropup .caret,.navbar-fixed-bottom .dropdown .caret{content:"";border-top:0;border-bottom:4px dashed;border-bottom:4px solid\9}.dropup .dropdown-menu,.navbar-fixed-bottom .dropdown .dropdown-menu{top:auto;bottom:100%;margin-bottom:2px}@media (min-width:768px){.navbar-right .dropdown-menu{right:0;left:auto}.navbar-right .dropdown-menu-left{right:auto;left:0}}.btn-group,.btn-group-vertical{position:relative;display:inline-block;vertical-align:middle}.btn-group-vertical>.btn,.btn-group>.btn{position:relative;float:left}.btn-group-vertical>.btn.active,.btn-group-vertical>.btn:active,.btn-group-vertical>.btn:focus,.btn-group-vertical>.btn:hover,.btn-group>.btn.active,.btn-group>.btn:active,.btn-group>.btn:focus,.btn-group>.btn:hover{z-index:2}.btn-group .btn+.btn,.btn-group .btn+.btn-group,.btn-group .btn-group+.btn,.btn-group .btn-group+.btn-group{margin-left:-1px}.btn-toolbar{margin-left:-5px}.btn-toolbar .btn,.btn-toolbar .btn-group,.btn-toolbar .input-group{float:left}.btn-toolbar>.btn,.btn-toolbar>.btn-group,.btn-toolbar>.input-group{margin-left:5px}.btn-group>.btn:not(:first-child):not(:last-child):not(.dropdown-toggle){border-radius:0}.btn-group>.btn:first-child{margin-left:0}.btn-group>.btn:first-child:not(:last-child):not(.dropdown-toggle){border-top-right-radius:0;border-bottom-right-radius:0}.btn-group>.btn:last-child:not(:first-child),.btn-group>.dropdown-toggle:not(:first-child){border-top-left-radius:0;border-bottom-left-radius:0}.btn-group>.btn-group{float:left}.btn-group>.btn-group:not(:first-child):not(:last-child)>.btn{border-radius:0}.btn-group>.btn-group:first-child:not(:last-child)>.btn:last-child,.btn-group>.btn-group:first-child:not(:last-child)>.dropdown-toggle{border-top-right-radius:0;border-bottom-right-radius:0}.btn-group>.btn-group:last-child:not(:first-child)>.btn:first-child{border-top-left-radius:0;border-bottom-left-radius:0}.btn-group .dropdown-toggle:active,.btn-group.open .dropdown-toggle{outline:0}.btn-group>.btn+.dropdown-toggle{padding-right:8px;padding-left:8px}.btn-group>.btn-lg+.dropdown-toggle{padding-right:12px;padding-left:12px}.btn-group.open .dropdown-toggle{-webkit-box-shadow:inset 0 3px 5px rgba(0,0,0,.125);box-shadow:inset 0 3px 5px rgba(0,0,0,.125)}.btn-group.open .dropdown-toggle.btn-link{-webkit-box-shadow:none;box-shadow:none}.btn .caret{margin-left:0}.btn-lg .caret{border-width:5px 5px 0;border-bottom-width:0}.dropup .btn-lg .caret{border-width:0 5px 5px}.btn-group-vertical>.btn,.btn-group-vertical>.btn-group,.btn-group-vertical>.btn-group>.btn{display:block;float:none;width:100%;max-width:100%}.btn-group-vertical>.btn-group>.btn{float:none}.btn-group-vertical>.btn+.btn,.btn-group-vertical>.btn+.btn-group,.btn-group-vertical>.btn-group+.btn,.btn-group-vertical>.btn-group+.btn-group{margin-top:-1px;margin-left:0}.btn-group-vertical>.btn:not(:first-child):not(:last-child){border-radius:0}.btn-group-vertical>.btn:first-child:not(:last-child){border-top-left-radius:4px;border-top-right-radius:4px;border-bottom-right-radius:0;border-bottom-left-radius:0}.btn-group-vertical>.btn:last-child:not(:first-child){border-top-left-radius:0;border-top-right-radius:0;border-bottom-right-radius:4px;border-bottom-left-radius:4px}.btn-group-vertical>.btn-group:not(:first-child):not(:last-child)>.btn{border-radius:0}.btn-group-vertical>.btn-group:first-child:not(:last-child)>.btn:last-child,.btn-group-vertical>.btn-group:first-child:not(:last-child)>.dropdown-toggle{border-bottom-right-radius:0;border-bottom-left-radius:0}.btn-group-vertical>.btn-group:last-child:not(:first-child)>.btn:first-child{border-top-left-radius:0;border-top-right-radius:0}.btn-group-justified{display:table;width:100%;table-layout:fixed;border-collapse:separate}.btn-group-justified>.btn,.btn-group-justified>.btn-group{display:table-cell;float:none;width:1%}.btn-group-justified>.btn-group .btn{width:100%}.btn-group-justified>.btn-group .dropdown-menu{left:auto}[data-toggle=buttons]>.btn input[type=checkbox],[data-toggle=buttons]>.btn input[type=radio],[data-toggle=buttons]>.btn-group>.btn input[type=checkbox],[data-toggle=buttons]>.btn-group>.btn input[type=radio]{position:absolute;clip:rect(0,0,0,0);pointer-events:none}.input-group{position:relative;display:table;border-collapse:separate}.input-group[class*=col-]{float:none;padding-right:0;padding-left:0}.input-group .form-control{position:relative;z-index:2;float:left;width:100%;margin-bottom:0}.input-group .form-control:focus{z-index:3}.input-group-lg>.form-control,.input-group-lg>.input-group-addon,.input-group-lg>.input-group-btn>.btn{height:46px;padding:10px 16px;font-size:18px;line-height:1.3333333;border-radius:6px}select.input-group-lg>.form-control,select.input-group-lg>.input-group-addon,select.input-group-lg>.input-group-btn>.btn{height:46px;line-height:46px}select[multiple].input-group-lg>.form-control,select[multiple].input-group-lg>.input-group-addon,select[multiple].input-group-lg>.input-group-btn>.btn,textarea.input-group-lg>.form-control,textarea.input-group-lg>.input-group-addon,textarea.input-group-lg>.input-group-btn>.btn{height:auto}.input-group-sm>.form-control,.input-group-sm>.input-group-addon,.input-group-sm>.input-group-btn>.btn{height:30px;padding:5px 10px;font-size:12px;line-height:1.5;border-radius:3px}select.input-group-sm>.form-control,select.input-group-sm>.input-group-addon,select.input-group-sm>.input-group-btn>.btn{height:30px;line-height:30px}select[multiple].input-group-sm>.form-control,select[multiple].input-group-sm>.input-group-addon,select[multiple].input-group-sm>.input-group-btn>.btn,textarea.input-group-sm>.form-control,textarea.input-group-sm>.input-group-addon,textarea.input-group-sm>.input-group-btn>.btn{height:auto}.input-group .form-control,.input-group-addon,.input-group-btn{display:table-cell}.input-group .form-control:not(:first-child):not(:last-child),.input-group-addon:not(:first-child):not(:last-child),.input-group-btn:not(:first-child):not(:last-child){border-radius:0}.input-group-addon,.input-group-btn{width:1%;white-space:nowrap;vertical-align:middle}.input-group-addon{padding:6px 12px;font-size:14px;font-weight:400;line-height:1;color:#555;text-align:center;background-color:#eee;border:1px solid #ccc;border-radius:4px}.input-group-addon.input-sm{padding:5px 10px;font-size:12px;border-radius:3px}.input-group-addon.input-lg{padding:10px 16px;font-size:18px;border-radius:6px}.input-group-addon input[type=checkbox],.input-group-addon input[type=radio]{margin-top:0}.input-group .form-control:first-child,.input-group-addon:first-child,.input-group-btn:first-child>.btn,.input-group-btn:first-child>.btn-group>.btn,.input-group-btn:first-child>.dropdown-toggle,.input-group-btn:last-child>.btn-group:not(:last-child)>.btn,.input-group-btn:last-child>.btn:not(:last-child):not(.dropdown-toggle){border-top-right-radius:0;border-bottom-right-radius:0}.input-group-addon:first-child{border-right:0}.input-group .form-control:last-child,.input-group-addon:last-child,.input-group-btn:first-child>.btn-group:not(:first-child)>.btn,.input-group-btn:first-child>.btn:not(:first-child),.input-group-btn:last-child>.btn,.input-group-btn:last-child>.btn-group>.btn,.input-group-btn:last-child>.dropdown-toggle{border-top-left-radius:0;border-bottom-left-radius:0}.input-group-addon:last-child{border-left:0}.input-group-btn{position:relative;font-size:0;white-space:nowrap}.input-group-btn>.btn{position:relative}.input-group-btn>.btn+.btn{margin-left:-1px}.input-group-btn>.btn:active,.input-group-btn>.btn:focus,.input-group-btn>.btn:hover{z-index:2}.input-group-btn:first-child>.btn,.input-group-btn:first-child>.btn-group{margin-right:-1px}.input-group-btn:last-child>.btn,.input-group-btn:last-child>.btn-group{z-index:2;margin-left:-1px}.nav{padding-left:0;margin-bottom:0;list-style:none}.nav>li{position:relative;display:block}.nav>li>a{position:relative;display:block;padding:10px 15px}.nav>li>a:focus,.nav>li>a:hover{text-decoration:none;background-color:#eee}.nav>li.disabled>a{color:#777}.nav>li.disabled>a:focus,.nav>li.disabled>a:hover{color:#777;text-decoration:none;cursor:not-allowed;background-color:transparent}.nav .open>a,.nav .open>a:focus,.nav .open>a:hover{background-color:#eee;border-color:#337ab7}.nav .nav-divider{height:1px;margin:9px 0;overflow:hidden;background-color:#e5e5e5}.nav>li>a>img{max-width:none}.nav-tabs{border-bottom:1px solid #ddd}.nav-tabs>li{float:left;margin-bottom:-1px}.nav-tabs>li>a{margin-right:2px;line-height:1.42857143;border:1px solid transparent;border-radius:4px 4px 0 0}.nav-tabs>li>a:hover{border-color:#eee #eee #ddd}.nav-tabs>li.active>a,.nav-tabs>li.active>a:focus,.nav-tabs>li.active>a:hover{color:#555;cursor:default;background-color:#fff;border:1px solid #ddd;border-bottom-color:transparent}.nav-tabs.nav-justified{width:100%;border-bottom:0}.nav-tabs.nav-justified>li{float:none}.nav-tabs.nav-justified>li>a{margin-bottom:5px;text-align:center}.nav-tabs.nav-justified>.dropdown .dropdown-menu{top:auto;left:auto}@media (min-width:768px){.nav-tabs.nav-justified>li{display:table-cell;width:1%}.nav-tabs.nav-justified>li>a{margin-bottom:0}}.nav-tabs.nav-justified>li>a{margin-right:0;border-radius:4px}.nav-tabs.nav-justified>.active>a,.nav-tabs.nav-justified>.active>a:focus,.nav-tabs.nav-justified>.active>a:hover{border:1px solid #ddd}@media (min-width:768px){.nav-tabs.nav-justified>li>a{border-bottom:1px solid #ddd;border-radius:4px 4px 0 0}.nav-tabs.nav-justified>.active>a,.nav-tabs.nav-justified>.active>a:focus,.nav-tabs.nav-justified>.active>a:hover{border-bottom-color:#fff}}.nav-pills>li{float:left}.nav-pills>li>a{border-radius:4px}.nav-pills>li+li{margin-left:2px}.nav-pills>li.active>a,.nav-pills>li.active>a:focus,.nav-pills>li.active>a:hover{color:#fff;background-color:#337ab7}.nav-stacked>li{float:none}.nav-stacked>li+li{margin-top:2px;margin-left:0}.nav-justified{width:100%}.nav-justified>li{float:none}.nav-justified>li>a{margin-bottom:5px;text-align:center}.nav-justified>.dropdown .dropdown-menu{top:auto;left:auto}@media (min-width:768px){.nav-justified>li{display:table-cell;width:1%}.nav-justified>li>a{margin-bottom:0}}.nav-tabs-justified{border-bottom:0}.nav-tabs-justified>li>a{margin-right:0;border-radius:4px}.nav-tabs-justified>.active>a,.nav-tabs-justified>.active>a:focus,.nav-tabs-justified>.active>a:hover{border:1px solid #ddd}@media (min-width:768px){.nav-tabs-justified>li>a{border-bottom:1px solid #ddd;border-radius:4px 4px 0 0}.nav-tabs-justified>.active>a,.nav-tabs-justified>.active>a:focus,.nav-tabs-justified>.active>a:hover{border-bottom-color:#fff}}.tab-content>.tab-pane{display:none}.tab-content>.active{display:block}.nav-tabs .dropdown-menu{margin-top:-1px;border-top-left-radius:0;border-top-right-radius:0}.navbar{position:relative;min-height:50px;margin-bottom:20px;border:1px solid transparent}@media (min-width:768px){.navbar{border-radius:4px}}@media (min-width:768px){.navbar-header{float:left}}.navbar-collapse{padding-right:15px;padding-left:15px;overflow-x:visible;border-top:1px solid transparent;-webkit-box-shadow:inset 0 1px 0 rgba(255,255,255,.1);box-shadow:inset 0 1px 0 rgba(255,255,255,.1);-webkit-overflow-scrolling:touch}.navbar-collapse.in{overflow-y:auto}@media (min-width:768px){.navbar-collapse{width:auto;border-top:0;-webkit-box-shadow:none;box-shadow:none}.navbar-collapse.collapse{display:block!important;height:auto!important;padding-bottom:0;overflow:visible!important}.navbar-collapse.in{overflow-y:visible}.navbar-fixed-bottom .navbar-collapse,.navbar-fixed-top .navbar-collapse,.navbar-static-top .navbar-collapse{padding-right:0;padding-left:0}}.navbar-fixed-bottom,.navbar-fixed-top{position:fixed;right:0;left:0;z-index:1030}.navbar-fixed-bottom .navbar-collapse,.navbar-fixed-top .navbar-collapse{max-height:340px}@media (max-device-width:480px) and (orientation:landscape){.navbar-fixed-bottom .navbar-collapse,.navbar-fixed-top .navbar-collapse{max-height:200px}}@media (min-width:768px){.navbar-fixed-bottom,.navbar-fixed-top{border-radius:0}}.navbar-fixed-top{top:0;border-width:0 0 1px}.navbar-fixed-bottom{bottom:0;margin-bottom:0;border-width:1px 0 0}.container-fluid>.navbar-collapse,.container-fluid>.navbar-header,.container>.navbar-collapse,.container>.navbar-header{margin-right:-15px;margin-left:-15px}@media (min-width:768px){.container-fluid>.navbar-collapse,.container-fluid>.navbar-header,.container>.navbar-collapse,.container>.navbar-header{margin-right:0;margin-left:0}}.navbar-static-top{z-index:1000;border-width:0 0 1px}@media (min-width:768px){.navbar-static-top{border-radius:0}}.navbar-brand{float:left;height:50px;padding:15px 15px;font-size:18px;line-height:20px}.navbar-brand:focus,.navbar-brand:hover{text-decoration:none}.navbar-brand>img{display:block}@media (min-width:768px){.navbar>.container .navbar-brand,.navbar>.container-fluid .navbar-brand{margin-left:-15px}}.navbar-toggle{position:relative;float:right;padding:9px 10px;margin-right:15px;margin-top:8px;margin-bottom:8px;background-color:transparent;background-image:none;border:1px solid transparent;border-radius:4px}.navbar-toggle:focus{outline:0}.navbar-toggle .icon-bar{display:block;width:22px;height:2px;border-radius:1px}.navbar-toggle .icon-bar+.icon-bar{margin-top:4px}@media (min-width:768px){.navbar-toggle{display:none}}.navbar-nav{margin:7.5px -15px}.navbar-nav>li>a{padding-top:10px;padding-bottom:10px;line-height:20px}@media (max-width:767px){.navbar-nav .open .dropdown-menu{position:static;float:none;width:auto;margin-top:0;background-color:transparent;border:0;-webkit-box-shadow:none;box-shadow:none}.navbar-nav .open .dropdown-menu .dropdown-header,.navbar-nav .open .dropdown-menu>li>a{padding:5px 15px 5px 25px}.navbar-nav .open .dropdown-menu>li>a{line-height:20px}.navbar-nav .open .dropdown-menu>li>a:focus,.navbar-nav .open .dropdown-menu>li>a:hover{background-image:none}}@media (min-width:768px){.navbar-nav{float:left;margin:0}.navbar-nav>li{float:left}.navbar-nav>li>a{padding-top:15px;padding-bottom:15px}}.navbar-form{padding:10px 15px;margin-right:-15px;margin-left:-15px;border-top:1px solid transparent;border-bottom:1px solid transparent;-webkit-box-shadow:inset 0 1px 0 rgba(255,255,255,.1),0 1px 0 rgba(255,255,255,.1);box-shadow:inset 0 1px 0 rgba(255,255,255,.1),0 1px 0 rgba(255,255,255,.1);margin-top:8px;margin-bottom:8px}@media (min-width:768px){.navbar-form .form-group{display:inline-block;margin-bottom:0;vertical-align:middle}.navbar-form .form-control{display:inline-block;width:auto;vertical-align:middle}.navbar-form .form-control-static{display:inline-block}.navbar-form .input-group{display:inline-table;vertical-align:middle}.navbar-form .input-group .form-control,.navbar-form .input-group .input-group-addon,.navbar-form .input-group .input-group-btn{width:auto}.navbar-form .input-group>.form-control{width:100%}.navbar-form .control-label{margin-bottom:0;vertical-align:middle}.navbar-form .checkbox,.navbar-form .radio{display:inline-block;margin-top:0;margin-bottom:0;vertical-align:middle}.navbar-form .checkbox label,.navbar-form .radio label{padding-left:0}.navbar-form .checkbox input[type=checkbox],.navbar-form .radio input[type=radio]{position:relative;margin-left:0}.navbar-form .has-feedback .form-control-feedback{top:0}}@media (max-width:767px){.navbar-form .form-group{margin-bottom:5px}.navbar-form .form-group:last-child{margin-bottom:0}}@media (min-width:768px){.navbar-form{width:auto;padding-top:0;padding-bottom:0;margin-right:0;margin-left:0;border:0;-webkit-box-shadow:none;box-shadow:none}}.navbar-nav>li>.dropdown-menu{margin-top:0;border-top-left-radius:0;border-top-right-radius:0}.navbar-fixed-bottom .navbar-nav>li>.dropdown-menu{margin-bottom:0;border-top-left-radius:4px;border-top-right-radius:4px;border-bottom-right-radius:0;border-bottom-left-radius:0}.navbar-btn{margin-top:8px;margin-bottom:8px}.navbar-btn.btn-sm{margin-top:10px;margin-bottom:10px}.navbar-btn.btn-xs{margin-top:14px;margin-bottom:14px}.navbar-text{margin-top:15px;margin-bottom:15px}@media (min-width:768px){.navbar-text{float:left;margin-right:15px;margin-left:15px}}@media (min-width:768px){.navbar-left{float:left!important}.navbar-right{float:right!important;margin-right:-15px}.navbar-right~.navbar-right{margin-right:0}}.navbar-default{background-color:#f8f8f8;border-color:#e7e7e7}.navbar-default .navbar-brand{color:#777}.navbar-default .navbar-brand:focus,.navbar-default .navbar-brand:hover{color:#5e5e5e;background-color:transparent}.navbar-default .navbar-text{color:#777}.navbar-default .navbar-nav>li>a{color:#777}.navbar-default .navbar-nav>li>a:focus,.navbar-default .navbar-nav>li>a:hover{color:#333;background-color:transparent}.navbar-default .navbar-nav>.active>a,.navbar-default .navbar-nav>.active>a:focus,.navbar-default .navbar-nav>.active>a:hover{color:#555;background-color:#e7e7e7}.navbar-default .navbar-nav>.disabled>a,.navbar-default .navbar-nav>.disabled>a:focus,.navbar-default .navbar-nav>.disabled>a:hover{color:#ccc;background-color:transparent}.navbar-default .navbar-nav>.open>a,.navbar-default .navbar-nav>.open>a:focus,.navbar-default .navbar-nav>.open>a:hover{color:#555;background-color:#e7e7e7}@media (max-width:767px){.navbar-default .navbar-nav .open .dropdown-menu>li>a{color:#777}.navbar-default .navbar-nav .open .dropdown-menu>li>a:focus,.navbar-default .navbar-nav .open .dropdown-menu>li>a:hover{color:#333;background-color:transparent}.navbar-default .navbar-nav .open .dropdown-menu>.active>a,.navbar-default .navbar-nav .open .dropdown-menu>.active>a:focus,.navbar-default .navbar-nav .open .dropdown-menu>.active>a:hover{color:#555;background-color:#e7e7e7}.navbar-default .navbar-nav .open .dropdown-menu>.disabled>a,.navbar-default .navbar-nav .open .dropdown-menu>.disabled>a:focus,.navbar-default .navbar-nav .open .dropdown-menu>.disabled>a:hover{color:#ccc;background-color:transparent}}.navbar-default .navbar-toggle{border-color:#ddd}.navbar-default .navbar-toggle:focus,.navbar-default .navbar-toggle:hover{background-color:#ddd}.navbar-default .navbar-toggle .icon-bar{background-color:#888}.navbar-default .navbar-collapse,.navbar-default .navbar-form{border-color:#e7e7e7}.navbar-default .navbar-link{color:#777}.navbar-default .navbar-link:hover{color:#333}.navbar-default .btn-link{color:#777}.navbar-default .btn-link:focus,.navbar-default .btn-link:hover{color:#333}.navbar-default .btn-link[disabled]:focus,.navbar-default .btn-link[disabled]:hover,fieldset[disabled] .navbar-default .btn-link:focus,fieldset[disabled] .navbar-default .btn-link:hover{color:#ccc}.navbar-inverse{background-color:#222;border-color:#080808}.navbar-inverse .navbar-brand{color:#9d9d9d}.navbar-inverse .navbar-brand:focus,.navbar-inverse .navbar-brand:hover{color:#fff;background-color:transparent}.navbar-inverse .navbar-text{color:#9d9d9d}.navbar-inverse .navbar-nav>li>a{color:#9d9d9d}.navbar-inverse .navbar-nav>li>a:focus,.navbar-inverse .navbar-nav>li>a:hover{color:#fff;background-color:transparent}.navbar-inverse .navbar-nav>.active>a,.navbar-inverse .navbar-nav>.active>a:focus,.navbar-inverse .navbar-nav>.active>a:hover{color:#fff;background-color:#080808}.navbar-inverse .navbar-nav>.disabled>a,.navbar-inverse .navbar-nav>.disabled>a:focus,.navbar-inverse .navbar-nav>.disabled>a:hover{color:#444;background-color:transparent}.navbar-inverse .navbar-nav>.open>a,.navbar-inverse .navbar-nav>.open>a:focus,.navbar-inverse .navbar-nav>.open>a:hover{color:#fff;background-color:#080808}@media (max-width:767px){.navbar-inverse .navbar-nav .open .dropdown-menu>.dropdown-header{border-color:#080808}.navbar-inverse .navbar-nav .open .dropdown-menu .divider{background-color:#080808}.navbar-inverse .navbar-nav .open .dropdown-menu>li>a{color:#9d9d9d}.navbar-inverse .navbar-nav .open .dropdown-menu>li>a:focus,.navbar-inverse .navbar-nav .open .dropdown-menu>li>a:hover{color:#fff;background-color:transparent}.navbar-inverse .navbar-nav .open .dropdown-menu>.active>a,.navbar-inverse .navbar-nav .open .dropdown-menu>.active>a:focus,.navbar-inverse .navbar-nav .open .dropdown-menu>.active>a:hover{color:#fff;background-color:#080808}.navbar-inverse .navbar-nav .open .dropdown-menu>.disabled>a,.navbar-inverse .navbar-nav .open .dropdown-menu>.disabled>a:focus,.navbar-inverse .navbar-nav .open .dropdown-menu>.disabled>a:hover{color:#444;background-color:transparent}}.navbar-inverse .navbar-toggle{border-color:#333}.navbar-inverse .navbar-toggle:focus,.navbar-inverse .navbar-toggle:hover{background-color:#333}.navbar-inverse .navbar-toggle .icon-bar{background-color:#fff}.navbar-inverse .navbar-collapse,.navbar-inverse .navbar-form{border-color:#101010}.navbar-inverse .navbar-link{color:#9d9d9d}.navbar-inverse .navbar-link:hover{color:#fff}.navbar-inverse .btn-link{color:#9d9d9d}.navbar-inverse .btn-link:focus,.navbar-inverse .btn-link:hover{color:#fff}.navbar-inverse .btn-link[disabled]:focus,.navbar-inverse .btn-link[disabled]:hover,fieldset[disabled] .navbar-inverse .btn-link:focus,fieldset[disabled] .navbar-inverse .btn-link:hover{color:#444}.breadcrumb{padding:8px 15px;margin-bottom:20px;list-style:none;background-color:#f5f5f5;border-radius:4px}.breadcrumb>li{display:inline-block}.breadcrumb>li+li:before{padding:0 5px;color:#ccc;content:"/\00a0"}.breadcrumb>.active{color:#777}.pagination{display:inline-block;padding-left:0;margin:20px 0;border-radius:4px}.pagination>li{display:inline}.pagination>li>a,.pagination>li>span{position:relative;float:left;padding:6px 12px;margin-left:-1px;line-height:1.42857143;color:#337ab7;text-decoration:none;background-color:#fff;border:1px solid #ddd}.pagination>li>a:focus,.pagination>li>a:hover,.pagination>li>span:focus,.pagination>li>span:hover{z-index:2;color:#23527c;background-color:#eee;border-color:#ddd}.pagination>li:first-child>a,.pagination>li:first-child>span{margin-left:0;border-top-left-radius:4px;border-bottom-left-radius:4px}.pagination>li:last-child>a,.pagination>li:last-child>span{border-top-right-radius:4px;border-bottom-right-radius:4px}.pagination>.active>a,.pagination>.active>a:focus,.pagination>.active>a:hover,.pagination>.active>span,.pagination>.active>span:focus,.pagination>.active>span:hover{z-index:3;color:#fff;cursor:default;background-color:#337ab7;border-color:#337ab7}.pagination>.disabled>a,.pagination>.disabled>a:focus,.pagination>.disabled>a:hover,.pagination>.disabled>span,.pagination>.disabled>span:focus,.pagination>.disabled>span:hover{color:#777;cursor:not-allowed;background-color:#fff;border-color:#ddd}.pagination-lg>li>a,.pagination-lg>li>span{padding:10px 16px;font-size:18px;line-height:1.3333333}.pagination-lg>li:first-child>a,.pagination-lg>li:first-child>span{border-top-left-radius:6px;border-bottom-left-radius:6px}.pagination-lg>li:last-child>a,.pagination-lg>li:last-child>span{border-top-right-radius:6px;border-bottom-right-radius:6px}.pagination-sm>li>a,.pagination-sm>li>span{padding:5px 10px;font-size:12px;line-height:1.5}.pagination-sm>li:first-child>a,.pagination-sm>li:first-child>span{border-top-left-radius:3px;border-bottom-left-radius:3px}.pagination-sm>li:last-child>a,.pagination-sm>li:last-child>span{border-top-right-radius:3px;border-bottom-right-radius:3px}.pager{padding-left:0;margin:20px 0;text-align:center;list-style:none}.pager li{display:inline}.pager li>a,.pager li>span{display:inline-block;padding:5px 14px;background-color:#fff;border:1px solid #ddd;border-radius:15px}.pager li>a:focus,.pager li>a:hover{text-decoration:none;background-color:#eee}.pager .next>a,.pager .next>span{float:right}.pager .previous>a,.pager .previous>span{float:left}.pager .disabled>a,.pager .disabled>a:focus,.pager .disabled>a:hover,.pager .disabled>span{color:#777;cursor:not-allowed;background-color:#fff}.label{display:inline;padding:.2em .6em .3em;font-size:75%;font-weight:700;line-height:1;color:#fff;text-align:center;white-space:nowrap;vertical-align:baseline;border-radius:.25em}a.label:focus,a.label:hover{color:#fff;text-decoration:none;cursor:pointer}.label:empty{display:none}.btn .label{position:relative;top:-1px}.label-default{background-color:#777}.label-default[href]:focus,.label-default[href]:hover{background-color:#5e5e5e}.label-primary{background-color:#337ab7}.label-primary[href]:focus,.label-primary[href]:hover{background-color:#286090}.label-success{background-color:#5cb85c}.label-success[href]:focus,.label-success[href]:hover{background-color:#449d44}.label-info{background-color:#5bc0de}.label-info[href]:focus,.label-info[href]:hover{background-color:#31b0d5}.label-warning{background-color:#f0ad4e}.label-warning[href]:focus,.label-warning[href]:hover{background-color:#ec971f}.label-danger{background-color:#d9534f}.label-danger[href]:focus,.label-danger[href]:hover{background-color:#c9302c}.badge{display:inline-block;min-width:10px;padding:3px 7px;font-size:12px;font-weight:700;line-height:1;color:#fff;text-align:center;white-space:nowrap;vertical-align:middle;background-color:#777;border-radius:10px}.badge:empty{display:none}.btn .badge{position:relative;top:-1px}.btn-group-xs>.btn .badge,.btn-xs .badge{top:0;padding:1px 5px}a.badge:focus,a.badge:hover{color:#fff;text-decoration:none;cursor:pointer}.list-group-item.active>.badge,.nav-pills>.active>a>.badge{color:#337ab7;background-color:#fff}.list-group-item>.badge{float:right}.list-group-item>.badge+.badge{margin-right:5px}.nav-pills>li>a>.badge{margin-left:3px}.jumbotron{padding-top:30px;padding-bottom:30px;margin-bottom:30px;color:inherit;background-color:#eee}.jumbotron .h1,.jumbotron h1{color:inherit}.jumbotron p{margin-bottom:15px;font-size:21px;font-weight:200}.jumbotron>hr{border-top-color:#d5d5d5}.container .jumbotron,.container-fluid .jumbotron{padding-right:15px;padding-left:15px;border-radius:6px}.jumbotron .container{max-width:100%}@media screen and (min-width:768px){.jumbotron{padding-top:48px;padding-bottom:48px}.container .jumbotron,.container-fluid .jumbotron{padding-right:60px;padding-left:60px}.jumbotron .h1,.jumbotron h1{font-size:63px}}.thumbnail{display:block;padding:4px;margin-bottom:20px;line-height:1.42857143;background-color:#fff;border:1px solid #ddd;border-radius:4px;-webkit-transition:border .2s ease-in-out;-o-transition:border .2s ease-in-out;transition:border .2s ease-in-out}.thumbnail a>img,.thumbnail>img{margin-right:auto;margin-left:auto}a.thumbnail.active,a.thumbnail:focus,a.thumbnail:hover{border-color:#337ab7}.thumbnail .caption{padding:9px;color:#333}.alert{padding:15px;margin-bottom:20px;border:1px solid transparent;border-radius:4px}.alert h4{margin-top:0;color:inherit}.alert .alert-link{font-weight:700}.alert>p,.alert>ul{margin-bottom:0}.alert>p+p{margin-top:5px}.alert-dismissable,.alert-dismissible{padding-right:35px}.alert-dismissable .close,.alert-dismissible .close{position:relative;top:-2px;right:-21px;color:inherit}.alert-success{color:#3c763d;background-color:#dff0d8;border-color:#d6e9c6}.alert-success hr{border-top-color:#c9e2b3}.alert-success .alert-link{color:#2b542c}.alert-info{color:#31708f;background-color:#d9edf7;border-color:#bce8f1}.alert-info hr{border-top-color:#a6e1ec}.alert-info .alert-link{color:#245269}.alert-warning{color:#8a6d3b;background-color:#fcf8e3;border-color:#faebcc}.alert-warning hr{border-top-color:#f7e1b5}.alert-warning .alert-link{color:#66512c}.alert-danger{color:#a94442;background-color:#f2dede;border-color:#ebccd1}.alert-danger hr{border-top-color:#e4b9c0}.alert-danger .alert-link{color:#843534}@-webkit-keyframes progress-bar-stripes{from{background-position:40px 0}to{background-position:0 0}}@-o-keyframes progress-bar-stripes{from{background-position:40px 0}to{background-position:0 0}}@keyframes progress-bar-stripes{from{background-position:40px 0}to{background-position:0 0}}.progress{height:20px;margin-bottom:20px;overflow:hidden;background-color:#f5f5f5;border-radius:4px;-webkit-box-shadow:inset 0 1px 2px rgba(0,0,0,.1);box-shadow:inset 0 1px 2px rgba(0,0,0,.1)}.progress-bar{float:left;width:0%;height:100%;font-size:12px;line-height:20px;color:#fff;text-align:center;background-color:#337ab7;-webkit-box-shadow:inset 0 -1px 0 rgba(0,0,0,.15);box-shadow:inset 0 -1px 0 rgba(0,0,0,.15);-webkit-transition:width .6s ease;-o-transition:width .6s ease;transition:width .6s ease}.progress-bar-striped,.progress-striped .progress-bar{background-image:-webkit-linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent);background-image:-o-linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent);background-image:linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent);-webkit-background-size:40px 40px;background-size:40px 40px}.progress-bar.active,.progress.active .progress-bar{-webkit-animation:progress-bar-stripes 2s linear infinite;-o-animation:progress-bar-stripes 2s linear infinite;animation:progress-bar-stripes 2s linear infinite}.progress-bar-success{background-color:#5cb85c}.progress-striped .progress-bar-success{background-image:-webkit-linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent);background-image:-o-linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent);background-image:linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent)}.progress-bar-info{background-color:#5bc0de}.progress-striped .progress-bar-info{background-image:-webkit-linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent);background-image:-o-linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent);background-image:linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent)}.progress-bar-warning{background-color:#f0ad4e}.progress-striped .progress-bar-warning{background-image:-webkit-linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent);background-image:-o-linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent);background-image:linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent)}.progress-bar-danger{background-color:#d9534f}.progress-striped .progress-bar-danger{background-image:-webkit-linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent);background-image:-o-linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent);background-image:linear-gradient(45deg,rgba(255,255,255,.15) 25%,transparent 25%,transparent 50%,rgba(255,255,255,.15) 50%,rgba(255,255,255,.15) 75%,transparent 75%,transparent)}.media{margin-top:15px}.media:first-child{margin-top:0}.media,.media-body{overflow:hidden;zoom:1}.media-body{width:10000px}.media-object{display:block}.media-object.img-thumbnail{max-width:none}.media-right,.media>.pull-right{padding-left:10px}.media-left,.media>.pull-left{padding-right:10px}.media-body,.media-left,.media-right{display:table-cell;vertical-align:top}.media-middle{vertical-align:middle}.media-bottom{vertical-align:bottom}.media-heading{margin-top:0;margin-bottom:5px}.media-list{padding-left:0;list-style:none}.list-group{padding-left:0;margin-bottom:20px}.list-group-item{position:relative;display:block;padding:10px 15px;margin-bottom:-1px;background-color:#fff;border:1px solid #ddd}.list-group-item:first-child{border-top-left-radius:4px;border-top-right-radius:4px}.list-group-item:last-child{margin-bottom:0;border-bottom-right-radius:4px;border-bottom-left-radius:4px}.list-group-item.disabled,.list-group-item.disabled:focus,.list-group-item.disabled:hover{color:#777;cursor:not-allowed;background-color:#eee}.list-group-item.disabled .list-group-item-heading,.list-group-item.disabled:focus .list-group-item-heading,.list-group-item.disabled:hover .list-group-item-heading{color:inherit}.list-group-item.disabled .list-group-item-text,.list-group-item.disabled:focus .list-group-item-text,.list-group-item.disabled:hover .list-group-item-text{color:#777}.list-group-item.active,.list-group-item.active:focus,.list-group-item.active:hover{z-index:2;color:#fff;background-color:#337ab7;border-color:#337ab7}.list-group-item.active .list-group-item-heading,.list-group-item.active .list-group-item-heading>.small,.list-group-item.active .list-group-item-heading>small,.list-group-item.active:focus .list-group-item-heading,.list-group-item.active:focus .list-group-item-heading>.small,.list-group-item.active:focus .list-group-item-heading>small,.list-group-item.active:hover .list-group-item-heading,.list-group-item.active:hover .list-group-item-heading>.small,.list-group-item.active:hover .list-group-item-heading>small{color:inherit}.list-group-item.active .list-group-item-text,.list-group-item.active:focus .list-group-item-text,.list-group-item.active:hover .list-group-item-text{color:#c7ddef}a.list-group-item,button.list-group-item{color:#555}a.list-group-item .list-group-item-heading,button.list-group-item .list-group-item-heading{color:#333}a.list-group-item:focus,a.list-group-item:hover,button.list-group-item:focus,button.list-group-item:hover{color:#555;text-decoration:none;background-color:#f5f5f5}button.list-group-item{width:100%;text-align:left}.list-group-item-success{color:#3c763d;background-color:#dff0d8}a.list-group-item-success,button.list-group-item-success{color:#3c763d}a.list-group-item-success .list-group-item-heading,button.list-group-item-success .list-group-item-heading{color:inherit}a.list-group-item-success:focus,a.list-group-item-success:hover,button.list-group-item-success:focus,button.list-group-item-success:hover{color:#3c763d;background-color:#d0e9c6}a.list-group-item-success.active,a.list-group-item-success.active:focus,a.list-group-item-success.active:hover,button.list-group-item-success.active,button.list-group-item-success.active:focus,button.list-group-item-success.active:hover{color:#fff;background-color:#3c763d;border-color:#3c763d}.list-group-item-info{color:#31708f;background-color:#d9edf7}a.list-group-item-info,button.list-group-item-info{color:#31708f}a.list-group-item-info .list-group-item-heading,button.list-group-item-info .list-group-item-heading{color:inherit}a.list-group-item-info:focus,a.list-group-item-info:hover,button.list-group-item-info:focus,button.list-group-item-info:hover{color:#31708f;background-color:#c4e3f3}a.list-group-item-info.active,a.list-group-item-info.active:focus,a.list-group-item-info.active:hover,button.list-group-item-info.active,button.list-group-item-info.active:focus,button.list-group-item-info.active:hover{color:#fff;background-color:#31708f;border-color:#31708f}.list-group-item-warning{color:#8a6d3b;background-color:#fcf8e3}a.list-group-item-warning,button.list-group-item-warning{color:#8a6d3b}a.list-group-item-warning .list-group-item-heading,button.list-group-item-warning .list-group-item-heading{color:inherit}a.list-group-item-warning:focus,a.list-group-item-warning:hover,button.list-group-item-warning:focus,button.list-group-item-warning:hover{color:#8a6d3b;background-color:#faf2cc}a.list-group-item-warning.active,a.list-group-item-warning.active:focus,a.list-group-item-warning.active:hover,button.list-group-item-warning.active,button.list-group-item-warning.active:focus,button.list-group-item-warning.active:hover{color:#fff;background-color:#8a6d3b;border-color:#8a6d3b}.list-group-item-danger{color:#a94442;background-color:#f2dede}a.list-group-item-danger,button.list-group-item-danger{color:#a94442}a.list-group-item-danger .list-group-item-heading,button.list-group-item-danger .list-group-item-heading{color:inherit}a.list-group-item-danger:focus,a.list-group-item-danger:hover,button.list-group-item-danger:focus,button.list-group-item-danger:hover{color:#a94442;background-color:#ebcccc}a.list-group-item-danger.active,a.list-group-item-danger.active:focus,a.list-group-item-danger.active:hover,button.list-group-item-danger.active,button.list-group-item-danger.active:focus,button.list-group-item-danger.active:hover{color:#fff;background-color:#a94442;border-color:#a94442}.list-group-item-heading{margin-top:0;margin-bottom:5px}.list-group-item-text{margin-bottom:0;line-height:1.3}.panel{margin-bottom:20px;background-color:#fff;border:1px solid transparent;border-radius:4px;-webkit-box-shadow:0 1px 1px rgba(0,0,0,.05);box-shadow:0 1px 1px rgba(0,0,0,.05)}.panel-body{padding:15px}.panel-heading{padding:10px 15px;border-bottom:1px solid transparent;border-top-left-radius:3px;border-top-right-radius:3px}.panel-heading>.dropdown .dropdown-toggle{color:inherit}.panel-title{margin-top:0;margin-bottom:0;font-size:16px;color:inherit}.panel-title>.small,.panel-title>.small>a,.panel-title>a,.panel-title>small,.panel-title>small>a{color:inherit}.panel-footer{padding:10px 15px;background-color:#f5f5f5;border-top:1px solid #ddd;border-bottom-right-radius:3px;border-bottom-left-radius:3px}.panel>.list-group,.panel>.panel-collapse>.list-group{margin-bottom:0}.panel>.list-group .list-group-item,.panel>.panel-collapse>.list-group .list-group-item{border-width:1px 0;border-radius:0}.panel>.list-group:first-child .list-group-item:first-child,.panel>.panel-collapse>.list-group:first-child .list-group-item:first-child{border-top:0;border-top-left-radius:3px;border-top-right-radius:3px}.panel>.list-group:last-child .list-group-item:last-child,.panel>.panel-collapse>.list-group:last-child .list-group-item:last-child{border-bottom:0;border-bottom-right-radius:3px;border-bottom-left-radius:3px}.panel>.panel-heading+.panel-collapse>.list-group .list-group-item:first-child{border-top-left-radius:0;border-top-right-radius:0}.panel-heading+.list-group .list-group-item:first-child{border-top-width:0}.list-group+.panel-footer{border-top-width:0}.panel>.panel-collapse>.table,.panel>.table,.panel>.table-responsive>.table{margin-bottom:0}.panel>.panel-collapse>.table caption,.panel>.table caption,.panel>.table-responsive>.table caption{padding-right:15px;padding-left:15px}.panel>.table-responsive:first-child>.table:first-child,.panel>.table:first-child{border-top-left-radius:3px;border-top-right-radius:3px}.panel>.table-responsive:first-child>.table:first-child>tbody:first-child>tr:first-child,.panel>.table-responsive:first-child>.table:first-child>thead:first-child>tr:first-child,.panel>.table:first-child>tbody:first-child>tr:first-child,.panel>.table:first-child>thead:first-child>tr:first-child{border-top-left-radius:3px;border-top-right-radius:3px}.panel>.table-responsive:first-child>.table:first-child>tbody:first-child>tr:first-child td:first-child,.panel>.table-responsive:first-child>.table:first-child>tbody:first-child>tr:first-child th:first-child,.panel>.table-responsive:first-child>.table:first-child>thead:first-child>tr:first-child td:first-child,.panel>.table-responsive:first-child>.table:first-child>thead:first-child>tr:first-child th:first-child,.panel>.table:first-child>tbody:first-child>tr:first-child td:first-child,.panel>.table:first-child>tbody:first-child>tr:first-child th:first-child,.panel>.table:first-child>thead:first-child>tr:first-child td:first-child,.panel>.table:first-child>thead:first-child>tr:first-child th:first-child{border-top-left-radius:3px}.panel>.table-responsive:first-child>.table:first-child>tbody:first-child>tr:first-child td:last-child,.panel>.table-responsive:first-child>.table:first-child>tbody:first-child>tr:first-child th:last-child,.panel>.table-responsive:first-child>.table:first-child>thead:first-child>tr:first-child td:last-child,.panel>.table-responsive:first-child>.table:first-child>thead:first-child>tr:first-child th:last-child,.panel>.table:first-child>tbody:first-child>tr:first-child td:last-child,.panel>.table:first-child>tbody:first-child>tr:first-child th:last-child,.panel>.table:first-child>thead:first-child>tr:first-child td:last-child,.panel>.table:first-child>thead:first-child>tr:first-child th:last-child{border-top-right-radius:3px}.panel>.table-responsive:last-child>.table:last-child,.panel>.table:last-child{border-bottom-right-radius:3px;border-bottom-left-radius:3px}.panel>.table-responsive:last-child>.table:last-child>tbody:last-child>tr:last-child,.panel>.table-responsive:last-child>.table:last-child>tfoot:last-child>tr:last-child,.panel>.table:last-child>tbody:last-child>tr:last-child,.panel>.table:last-child>tfoot:last-child>tr:last-child{border-bottom-right-radius:3px;border-bottom-left-radius:3px}.panel>.table-responsive:last-child>.table:last-child>tbody:last-child>tr:last-child td:first-child,.panel>.table-responsive:last-child>.table:last-child>tbody:last-child>tr:last-child th:first-child,.panel>.table-responsive:last-child>.table:last-child>tfoot:last-child>tr:last-child td:first-child,.panel>.table-responsive:last-child>.table:last-child>tfoot:last-child>tr:last-child th:first-child,.panel>.table:last-child>tbody:last-child>tr:last-child td:first-child,.panel>.table:last-child>tbody:last-child>tr:last-child th:first-child,.panel>.table:last-child>tfoot:last-child>tr:last-child td:first-child,.panel>.table:last-child>tfoot:last-child>tr:last-child th:first-child{border-bottom-left-radius:3px}.panel>.table-responsive:last-child>.table:last-child>tbody:last-child>tr:last-child td:last-child,.panel>.table-responsive:last-child>.table:last-child>tbody:last-child>tr:last-child th:last-child,.panel>.table-responsive:last-child>.table:last-child>tfoot:last-child>tr:last-child td:last-child,.panel>.table-responsive:last-child>.table:last-child>tfoot:last-child>tr:last-child th:last-child,.panel>.table:last-child>tbody:last-child>tr:last-child td:last-child,.panel>.table:last-child>tbody:last-child>tr:last-child th:last-child,.panel>.table:last-child>tfoot:last-child>tr:last-child td:last-child,.panel>.table:last-child>tfoot:last-child>tr:last-child th:last-child{border-bottom-right-radius:3px}.panel>.panel-body+.table,.panel>.panel-body+.table-responsive,.panel>.table+.panel-body,.panel>.table-responsive+.panel-body{border-top:1px solid #ddd}.panel>.table>tbody:first-child>tr:first-child td,.panel>.table>tbody:first-child>tr:first-child th{border-top:0}.panel>.table-bordered,.panel>.table-responsive>.table-bordered{border:0}.panel>.table-bordered>tbody>tr>td:first-child,.panel>.table-bordered>tbody>tr>th:first-child,.panel>.table-bordered>tfoot>tr>td:first-child,.panel>.table-bordered>tfoot>tr>th:first-child,.panel>.table-bordered>thead>tr>td:first-child,.panel>.table-bordered>thead>tr>th:first-child,.panel>.table-responsive>.table-bordered>tbody>tr>td:first-child,.panel>.table-responsive>.table-bordered>tbody>tr>th:first-child,.panel>.table-responsive>.table-bordered>tfoot>tr>td:first-child,.panel>.table-responsive>.table-bordered>tfoot>tr>th:first-child,.panel>.table-responsive>.table-bordered>thead>tr>td:first-child,.panel>.table-responsive>.table-bordered>thead>tr>th:first-child{border-left:0}.panel>.table-bordered>tbody>tr>td:last-child,.panel>.table-bordered>tbody>tr>th:last-child,.panel>.table-bordered>tfoot>tr>td:last-child,.panel>.table-bordered>tfoot>tr>th:last-child,.panel>.table-bordered>thead>tr>td:last-child,.panel>.table-bordered>thead>tr>th:last-child,.panel>.table-responsive>.table-bordered>tbody>tr>td:last-child,.panel>.table-responsive>.table-bordered>tbody>tr>th:last-child,.panel>.table-responsive>.table-bordered>tfoot>tr>td:last-child,.panel>.table-responsive>.table-bordered>tfoot>tr>th:last-child,.panel>.table-responsive>.table-bordered>thead>tr>td:last-child,.panel>.table-responsive>.table-bordered>thead>tr>th:last-child{border-right:0}.panel>.table-bordered>tbody>tr:first-child>td,.panel>.table-bordered>tbody>tr:first-child>th,.panel>.table-bordered>thead>tr:first-child>td,.panel>.table-bordered>thead>tr:first-child>th,.panel>.table-responsive>.table-bordered>tbody>tr:first-child>td,.panel>.table-responsive>.table-bordered>tbody>tr:first-child>th,.panel>.table-responsive>.table-bordered>thead>tr:first-child>td,.panel>.table-responsive>.table-bordered>thead>tr:first-child>th{border-bottom:0}.panel>.table-bordered>tbody>tr:last-child>td,.panel>.table-bordered>tbody>tr:last-child>th,.panel>.table-bordered>tfoot>tr:last-child>td,.panel>.table-bordered>tfoot>tr:last-child>th,.panel>.table-responsive>.table-bordered>tbody>tr:last-child>td,.panel>.table-responsive>.table-bordered>tbody>tr:last-child>th,.panel>.table-responsive>.table-bordered>tfoot>tr:last-child>td,.panel>.table-responsive>.table-bordered>tfoot>tr:last-child>th{border-bottom:0}.panel>.table-responsive{margin-bottom:0;border:0}.panel-group{margin-bottom:20px}.panel-group .panel{margin-bottom:0;border-radius:4px}.panel-group .panel+.panel{margin-top:5px}.panel-group .panel-heading{border-bottom:0}.panel-group .panel-heading+.panel-collapse>.list-group,.panel-group .panel-heading+.panel-collapse>.panel-body{border-top:1px solid #ddd}.panel-group .panel-footer{border-top:0}.panel-group .panel-footer+.panel-collapse .panel-body{border-bottom:1px solid #ddd}.panel-default{border-color:#ddd}.panel-default>.panel-heading{color:#333;background-color:#f5f5f5;border-color:#ddd}.panel-default>.panel-heading+.panel-collapse>.panel-body{border-top-color:#ddd}.panel-default>.panel-heading .badge{color:#f5f5f5;background-color:#333}.panel-default>.panel-footer+.panel-collapse>.panel-body{border-bottom-color:#ddd}.panel-primary{border-color:#337ab7}.panel-primary>.panel-heading{color:#fff;background-color:#337ab7;border-color:#337ab7}.panel-primary>.panel-heading+.panel-collapse>.panel-body{border-top-color:#337ab7}.panel-primary>.panel-heading .badge{color:#337ab7;background-color:#fff}.panel-primary>.panel-footer+.panel-collapse>.panel-body{border-bottom-color:#337ab7}.panel-success{border-color:#d6e9c6}.panel-success>.panel-heading{color:#3c763d;background-color:#dff0d8;border-color:#d6e9c6}.panel-success>.panel-heading+.panel-collapse>.panel-body{border-top-color:#d6e9c6}.panel-success>.panel-heading .badge{color:#dff0d8;background-color:#3c763d}.panel-success>.panel-footer+.panel-collapse>.panel-body{border-bottom-color:#d6e9c6}.panel-info{border-color:#bce8f1}.panel-info>.panel-heading{color:#31708f;background-color:#d9edf7;border-color:#bce8f1}.panel-info>.panel-heading+.panel-collapse>.panel-body{border-top-color:#bce8f1}.panel-info>.panel-heading .badge{color:#d9edf7;background-color:#31708f}.panel-info>.panel-footer+.panel-collapse>.panel-body{border-bottom-color:#bce8f1}.panel-warning{border-color:#faebcc}.panel-warning>.panel-heading{color:#8a6d3b;background-color:#fcf8e3;border-color:#faebcc}.panel-warning>.panel-heading+.panel-collapse>.panel-body{border-top-color:#faebcc}.panel-warning>.panel-heading .badge{color:#fcf8e3;background-color:#8a6d3b}.panel-warning>.panel-footer+.panel-collapse>.panel-body{border-bottom-color:#faebcc}.panel-danger{border-color:#ebccd1}.panel-danger>.panel-heading{color:#a94442;background-color:#f2dede;border-color:#ebccd1}.panel-danger>.panel-heading+.panel-collapse>.panel-body{border-top-color:#ebccd1}.panel-danger>.panel-heading .badge{color:#f2dede;background-color:#a94442}.panel-danger>.panel-footer+.panel-collapse>.panel-body{border-bottom-color:#ebccd1}.embed-responsive{position:relative;display:block;height:0;padding:0;overflow:hidden}.embed-responsive .embed-responsive-item,.embed-responsive embed,.embed-responsive iframe,.embed-responsive object,.embed-responsive video{position:absolute;top:0;bottom:0;left:0;width:100%;height:100%;border:0}.embed-responsive-16by9{padding-bottom:56.25%}.embed-responsive-4by3{padding-bottom:75%}.well{min-height:20px;padding:19px;margin-bottom:20px;background-color:#f5f5f5;border:1px solid #e3e3e3;border-radius:4px;-webkit-box-shadow:inset 0 1px 1px rgba(0,0,0,.05);box-shadow:inset 0 1px 1px rgba(0,0,0,.05)}.well blockquote{border-color:#ddd;border-color:rgba(0,0,0,.15)}.well-lg{padding:24px;border-radius:6px}.well-sm{padding:9px;border-radius:3px}.close{float:right;font-size:21px;font-weight:700;line-height:1;color:#000;text-shadow:0 1px 0 #fff;filter:alpha(opacity=20);opacity:.2}.close:focus,.close:hover{color:#000;text-decoration:none;cursor:pointer;filter:alpha(opacity=50);opacity:.5}button.close{padding:0;cursor:pointer;background:0 0;border:0;-webkit-appearance:none;-moz-appearance:none;appearance:none}.modal-open{overflow:hidden}.modal{position:fixed;top:0;right:0;bottom:0;left:0;z-index:1050;display:none;overflow:hidden;-webkit-overflow-scrolling:touch;outline:0}.modal.fade .modal-dialog{-webkit-transform:translate(0,-25%);-ms-transform:translate(0,-25%);-o-transform:translate(0,-25%);transform:translate(0,-25%);-webkit-transition:-webkit-transform .3s ease-out;-o-transition:-o-transform .3s ease-out;transition:-webkit-transform .3s ease-out;transition:transform .3s ease-out;transition:transform .3s ease-out,-webkit-transform .3s ease-out,-o-transform .3s ease-out}.modal.in .modal-dialog{-webkit-transform:translate(0,0);-ms-transform:translate(0,0);-o-transform:translate(0,0);transform:translate(0,0)}.modal-open .modal{overflow-x:hidden;overflow-y:auto}.modal-dialog{position:relative;width:auto;margin:10px}.modal-content{position:relative;background-color:#fff;background-clip:padding-box;border:1px solid #999;border:1px solid rgba(0,0,0,.2);border-radius:6px;-webkit-box-shadow:0 3px 9px rgba(0,0,0,.5);box-shadow:0 3px 9px rgba(0,0,0,.5);outline:0}.modal-backdrop{position:fixed;top:0;right:0;bottom:0;left:0;z-index:1040;background-color:#000}.modal-backdrop.fade{filter:alpha(opacity=0);opacity:0}.modal-backdrop.in{filter:alpha(opacity=50);opacity:.5}.modal-header{padding:15px;border-bottom:1px solid #e5e5e5}.modal-header .close{margin-top:-2px}.modal-title{margin:0;line-height:1.42857143}.modal-body{position:relative;padding:15px}.modal-footer{padding:15px;text-align:right;border-top:1px solid #e5e5e5}.modal-footer .btn+.btn{margin-bottom:0;margin-left:5px}.modal-footer .btn-group .btn+.btn{margin-left:-1px}.modal-footer .btn-block+.btn-block{margin-left:0}.modal-scrollbar-measure{position:absolute;top:-9999px;width:50px;height:50px;overflow:scroll}@media (min-width:768px){.modal-dialog{width:600px;margin:30px auto}.modal-content{-webkit-box-shadow:0 5px 15px rgba(0,0,0,.5);box-shadow:0 5px 15px rgba(0,0,0,.5)}.modal-sm{width:300px}}@media (min-width:992px){.modal-lg{width:900px}}.tooltip{position:absolute;z-index:1070;display:block;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;font-style:normal;font-weight:400;line-height:1.42857143;line-break:auto;text-align:left;text-align:start;text-decoration:none;text-shadow:none;text-transform:none;letter-spacing:normal;word-break:normal;word-spacing:normal;word-wrap:normal;white-space:normal;font-size:12px;filter:alpha(opacity=0);opacity:0}.tooltip.in{filter:alpha(opacity=90);opacity:.9}.tooltip.top{padding:5px 0;margin-top:-3px}.tooltip.right{padding:0 5px;margin-left:3px}.tooltip.bottom{padding:5px 0;margin-top:3px}.tooltip.left{padding:0 5px;margin-left:-3px}.tooltip.top .tooltip-arrow{bottom:0;left:50%;margin-left:-5px;border-width:5px 5px 0;border-top-color:#000}.tooltip.top-left .tooltip-arrow{right:5px;bottom:0;margin-bottom:-5px;border-width:5px 5px 0;border-top-color:#000}.tooltip.top-right .tooltip-arrow{bottom:0;left:5px;margin-bottom:-5px;border-width:5px 5px 0;border-top-color:#000}.tooltip.right .tooltip-arrow{top:50%;left:0;margin-top:-5px;border-width:5px 5px 5px 0;border-right-color:#000}.tooltip.left .tooltip-arrow{top:50%;right:0;margin-top:-5px;border-width:5px 0 5px 5px;border-left-color:#000}.tooltip.bottom .tooltip-arrow{top:0;left:50%;margin-left:-5px;border-width:0 5px 5px;border-bottom-color:#000}.tooltip.bottom-left .tooltip-arrow{top:0;right:5px;margin-top:-5px;border-width:0 5px 5px;border-bottom-color:#000}.tooltip.bottom-right .tooltip-arrow{top:0;left:5px;margin-top:-5px;border-width:0 5px 5px;border-bottom-color:#000}.tooltip-inner{max-width:200px;padding:3px 8px;color:#fff;text-align:center;background-color:#000;border-radius:4px}.tooltip-arrow{position:absolute;width:0;height:0;border-color:transparent;border-style:solid}.popover{position:absolute;top:0;left:0;z-index:1060;display:none;max-width:276px;padding:1px;font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;font-style:normal;font-weight:400;line-height:1.42857143;line-break:auto;text-align:left;text-align:start;text-decoration:none;text-shadow:none;text-transform:none;letter-spacing:normal;word-break:normal;word-spacing:normal;word-wrap:normal;white-space:normal;font-size:14px;background-color:#fff;background-clip:padding-box;border:1px solid #ccc;border:1px solid rgba(0,0,0,.2);border-radius:6px;-webkit-box-shadow:0 5px 10px rgba(0,0,0,.2);box-shadow:0 5px 10px rgba(0,0,0,.2)}.popover.top{margin-top:-10px}.popover.right{margin-left:10px}.popover.bottom{margin-top:10px}.popover.left{margin-left:-10px}.popover>.arrow{border-width:11px}.popover>.arrow,.popover>.arrow:after{position:absolute;display:block;width:0;height:0;border-color:transparent;border-style:solid}.popover>.arrow:after{content:"";border-width:10px}.popover.top>.arrow{bottom:-11px;left:50%;margin-left:-11px;border-top-color:#999;border-top-color:rgba(0,0,0,.25);border-bottom-width:0}.popover.top>.arrow:after{bottom:1px;margin-left:-10px;content:" ";border-top-color:#fff;border-bottom-width:0}.popover.right>.arrow{top:50%;left:-11px;margin-top:-11px;border-right-color:#999;border-right-color:rgba(0,0,0,.25);border-left-width:0}.popover.right>.arrow:after{bottom:-10px;left:1px;content:" ";border-right-color:#fff;border-left-width:0}.popover.bottom>.arrow{top:-11px;left:50%;margin-left:-11px;border-top-width:0;border-bottom-color:#999;border-bottom-color:rgba(0,0,0,.25)}.popover.bottom>.arrow:after{top:1px;margin-left:-10px;content:" ";border-top-width:0;border-bottom-color:#fff}.popover.left>.arrow{top:50%;right:-11px;margin-top:-11px;border-right-width:0;border-left-color:#999;border-left-color:rgba(0,0,0,.25)}.popover.left>.arrow:after{right:1px;bottom:-10px;content:" ";border-right-width:0;border-left-color:#fff}.popover-title{padding:8px 14px;margin:0;font-size:14px;background-color:#f7f7f7;border-bottom:1px solid #ebebeb;border-radius:5px 5px 0 0}.popover-content{padding:9px 14px}.carousel{position:relative}.carousel-inner{position:relative;width:100%;overflow:hidden}.carousel-inner>.item{position:relative;display:none;-webkit-transition:.6s ease-in-out left;-o-transition:.6s ease-in-out left;transition:.6s ease-in-out left}.carousel-inner>.item>a>img,.carousel-inner>.item>img{line-height:1}@media all and (transform-3d),(-webkit-transform-3d){.carousel-inner>.item{-webkit-transition:-webkit-transform .6s ease-in-out;-o-transition:-o-transform .6s ease-in-out;transition:-webkit-transform .6s ease-in-out;transition:transform .6s ease-in-out;transition:transform .6s ease-in-out,-webkit-transform .6s ease-in-out,-o-transform .6s ease-in-out;-webkit-backface-visibility:hidden;backface-visibility:hidden;-webkit-perspective:1000px;perspective:1000px}.carousel-inner>.item.active.right,.carousel-inner>.item.next{-webkit-transform:translate3d(100%,0,0);transform:translate3d(100%,0,0);left:0}.carousel-inner>.item.active.left,.carousel-inner>.item.prev{-webkit-transform:translate3d(-100%,0,0);transform:translate3d(-100%,0,0);left:0}.carousel-inner>.item.active,.carousel-inner>.item.next.left,.carousel-inner>.item.prev.right{-webkit-transform:translate3d(0,0,0);transform:translate3d(0,0,0);left:0}}.carousel-inner>.active,.carousel-inner>.next,.carousel-inner>.prev{display:block}.carousel-inner>.active{left:0}.carousel-inner>.next,.carousel-inner>.prev{position:absolute;top:0;width:100%}.carousel-inner>.next{left:100%}.carousel-inner>.prev{left:-100%}.carousel-inner>.next.left,.carousel-inner>.prev.right{left:0}.carousel-inner>.active.left{left:-100%}.carousel-inner>.active.right{left:100%}.carousel-control{position:absolute;top:0;bottom:0;left:0;width:15%;font-size:20px;color:#fff;text-align:center;text-shadow:0 1px 2px rgba(0,0,0,.6);background-color:rgba(0,0,0,0);filter:alpha(opacity=50);opacity:.5}.carousel-control.left{background-image:-webkit-linear-gradient(left,rgba(0,0,0,.5) 0,rgba(0,0,0,.0001) 100%);background-image:-o-linear-gradient(left,rgba(0,0,0,.5) 0,rgba(0,0,0,.0001) 100%);background-image:-webkit-gradient(linear,left top,right top,from(rgba(0,0,0,.5)),to(rgba(0,0,0,.0001)));background-image:linear-gradient(to right,rgba(0,0,0,.5) 0,rgba(0,0,0,.0001) 100%);filter:progid:DXImageTransform.Microsoft.gradient(startColorstr='#80000000', endColorstr='#00000000', GradientType=1);background-repeat:repeat-x}.carousel-control.right{right:0;left:auto;background-image:-webkit-linear-gradient(left,rgba(0,0,0,.0001) 0,rgba(0,0,0,.5) 100%);background-image:-o-linear-gradient(left,rgba(0,0,0,.0001) 0,rgba(0,0,0,.5) 100%);background-image:-webkit-gradient(linear,left top,right top,from(rgba(0,0,0,.0001)),to(rgba(0,0,0,.5)));background-image:linear-gradient(to right,rgba(0,0,0,.0001) 0,rgba(0,0,0,.5) 100%);filter:progid:DXImageTransform.Microsoft.gradient(startColorstr='#00000000', endColorstr='#80000000', GradientType=1);background-repeat:repeat-x}.carousel-control:focus,.carousel-control:hover{color:#fff;text-decoration:none;outline:0;filter:alpha(opacity=90);opacity:.9}.carousel-control .glyphicon-chevron-left,.carousel-control .glyphicon-chevron-right,.carousel-control .icon-next,.carousel-control .icon-prev{position:absolute;top:50%;z-index:5;display:inline-block;margin-top:-10px}.carousel-control .glyphicon-chevron-left,.carousel-control .icon-prev{left:50%;margin-left:-10px}.carousel-control .glyphicon-chevron-right,.carousel-control .icon-next{right:50%;margin-right:-10px}.carousel-control .icon-next,.carousel-control .icon-prev{width:20px;height:20px;font-family:serif;line-height:1}.carousel-control .icon-prev:before{content:"\2039"}.carousel-control .icon-next:before{content:"\203a"}.carousel-indicators{position:absolute;bottom:10px;left:50%;z-index:15;width:60%;padding-left:0;margin-left:-30%;text-align:center;list-style:none}.carousel-indicators li{display:inline-block;width:10px;height:10px;margin:1px;text-indent:-999px;cursor:pointer;background-color:#000\9;background-color:rgba(0,0,0,0);border:1px solid #fff;border-radius:10px}.carousel-indicators .active{width:12px;height:12px;margin:0;background-color:#fff}.carousel-caption{position:absolute;right:15%;bottom:20px;left:15%;z-index:10;padding-top:20px;padding-bottom:20px;color:#fff;text-align:center;text-shadow:0 1px 2px rgba(0,0,0,.6)}.carousel-caption .btn{text-shadow:none}@media screen and (min-width:768px){.carousel-control .glyphicon-chevron-left,.carousel-control .glyphicon-chevron-right,.carousel-control .icon-next,.carousel-control .icon-prev{width:30px;height:30px;margin-top:-10px;font-size:30px}.carousel-control .glyphicon-chevron-left,.carousel-control .icon-prev{margin-left:-10px}.carousel-control .glyphicon-chevron-right,.carousel-control .icon-next{margin-right:-10px}.carousel-caption{right:20%;left:20%;padding-bottom:30px}.carousel-indicators{bottom:20px}}.btn-group-vertical>.btn-group:after,.btn-group-vertical>.btn-group:before,.btn-toolbar:after,.btn-toolbar:before,.clearfix:after,.clearfix:before,.container-fluid:after,.container-fluid:before,.container:after,.container:before,.dl-horizontal dd:after,.dl-horizontal dd:before,.form-horizontal .form-group:after,.form-horizontal .form-group:before,.modal-footer:after,.modal-footer:before,.modal-header:after,.modal-header:before,.nav:after,.nav:before,.navbar-collapse:after,.navbar-collapse:before,.navbar-header:after,.navbar-header:before,.navbar:after,.navbar:before,.pager:after,.pager:before,.panel-body:after,.panel-body:before,.row:after,.row:before{display:table;content:" "}.btn-group-vertical>.btn-group:after,.btn-toolbar:after,.clearfix:after,.container-fluid:after,.container:after,.dl-horizontal dd:after,.form-horizontal .form-group:after,.modal-footer:after,.modal-header:after,.nav:after,.navbar-collapse:after,.navbar-header:after,.navbar:after,.pager:after,.panel-body:after,.row:after{clear:both}.center-block{display:block;margin-right:auto;margin-left:auto}.pull-right{float:right!important}.pull-left{float:left!important}.hide{display:none!important}.show{display:block!important}.invisible{visibility:hidden}.text-hide{font:0/0 a;color:transparent;text-shadow:none;background-color:transparent;border:0}.hidden{display:none!important}.affix{position:fixed}@-ms-viewport{width:device-width}.visible-lg,.visible-md,.visible-sm,.visible-xs{display:none!important}.visible-lg-block,.visible-lg-inline,.visible-lg-inline-block,.visible-md-block,.visible-md-inline,.visible-md-inline-block,.visible-sm-block,.visible-sm-inline,.visible-sm-inline-block,.visible-xs-block,.visible-xs-inline,.visible-xs-inline-block{display:none!important}@media (max-width:767px){.visible-xs{display:block!important}table.visible-xs{display:table!important}tr.visible-xs{display:table-row!important}td.visible-xs,th.visible-xs{display:table-cell!important}}@media (max-width:767px){.visible-xs-block{display:block!important}}@media (max-width:767px){.visible-xs-inline{display:inline!important}}@media (max-width:767px){.visible-xs-inline-block{display:inline-block!important}}@media (min-width:768px) and (max-width:991px){.visible-sm{display:block!important}table.visible-sm{display:table!important}tr.visible-sm{display:table-row!important}td.visible-sm,th.visible-sm{display:table-cell!important}}@media (min-width:768px) and (max-width:991px){.visible-sm-block{display:block!important}}@media (min-width:768px) and (max-width:991px){.visible-sm-inline{display:inline!important}}@media (min-width:768px) and (max-width:991px){.visible-sm-inline-block{display:inline-block!important}}@media (min-width:992px) and (max-width:1199px){.visible-md{display:block!important}table.visible-md{display:table!important}tr.visible-md{display:table-row!important}td.visible-md,th.visible-md{display:table-cell!important}}@media (min-width:992px) and (max-width:1199px){.visible-md-block{display:block!important}}@media (min-width:992px) and (max-width:1199px){.visible-md-inline{display:inline!important}}@media (min-width:992px) and (max-width:1199px){.visible-md-inline-block{display:inline-block!important}}@media (min-width:1200px){.visible-lg{display:block!important}table.visible-lg{display:table!important}tr.visible-lg{display:table-row!important}td.visible-lg,th.visible-lg{display:table-cell!important}}@media (min-width:1200px){.visible-lg-block{display:block!important}}@media (min-width:1200px){.visible-lg-inline{display:inline!important}}@media (min-width:1200px){.visible-lg-inline-block{display:inline-block!important}}@media (max-width:767px){.hidden-xs{display:none!important}}@media (min-width:768px) and (max-width:991px){.hidden-sm{display:none!important}}@media (min-width:992px) and (max-width:1199px){.hidden-md{display:none!important}}@media (min-width:1200px){.hidden-lg{display:none!important}}.visible-print{display:none!important}@media print{.visible-print{display:block!important}table.visible-print{display:table!important}tr.visible-print{display:table-row!important}td.visible-print,th.visible-print{display:table-cell!important}}.visible-print-block{display:none!important}@media print{.visible-print-block{display:block!important}}.visible-print-inline{display:none!important}@media print{.visible-print-inline{display:inline!important}}.visible-print-inline-block{display:none!important}@media print{.visible-print-inline-block{display:inline-block!important}}@media print{.hidden-print{display:none!important}} -/*# sourceMappingURL=bootstrap.min.css.map */ \ No newline at end of file diff --git a/PR_400/css/sel4.css b/PR_400/css/sel4.css deleted file mode 100644 index c818f46e..00000000 --- a/PR_400/css/sel4.css +++ /dev/null @@ -1,844 +0,0 @@ -/* - * Copyright 2020 seL4 Project a Series of LF Projects, LLC. - * SPDX-License-Identifier: GPL-2.0-only - */ - - @import url('https://fonts.googleapis.com/css2?family=Roboto&display=swap'); - - body { - font-family: 'Roboto', Helvetica, sans-serif; - } - - a { - color: #56749F; - } - - a:hover { - color: #263852 /* neutralDark */ - } - - .dropdown-menu>.active>a, .dropdown-menu>.active>a:focus, .dropdown-menu>.active>a:hover, - .nav-pills>li.active>a, .nav-pills>li.active>a:focus, .nav-pills>li.active>a:hover { - background-color: #385378; /* neutral */ - } - - .nav .open>a, .nav .open>a:focus, .nav .open>a:hover, .nav-pills li a:hover { - background-color: #D6DBE4; /* neutralLighter */ - } - - #page-container { - position: relative; - min-height: 100vh; - } - - #content-wrap { - padding-bottom: 120px; /* Footer height */ - } - - footer { - padding-top: 15px; - padding-bottom: 15px; - /*text-align: center;*/ - background-color: #D6DBE4; /* neutralLighter */ - position: absolute; - bottom: 0; - width: 100%; - height: 120px; - } - - @media screen and (max-width:906px) { - #content-wrap{ - padding-bottom: 180px; - } - footer { - height: 180px; - } - } - - .jumbotron { - /*color: #000; - background-image: url('/images/sel4-banner.jpg'); - background-position: 80% 0%;*/ - } - - @media print { - #site-navigation { display: none; } - #site-header a[href]:after { - content: none; - } - } - - table.alttable tr:nth-child(even) { - background-color: #D6DBE4; /* neutralLighter */ - } - - .nav-pills { - padding-top: 0px; - margin-bottom: 20px !important; - } - - .breadcrumb { - margin-bottom: 0px; - background-color: #EBEEF5; /* neutralLighter */ - } - - .breadcrumb>li+li:before { - color: #385378; /* neutral */ - } - - h1 { - margin-bottom: 0.5em; - } - - code { - color: #AC5D55; /* accent */ - background-color: #EBEEF5; /* neutralLightest */ - } - - .hp_grid_container { - } - - .homepage_grid { - display: grid; - display: inline-grid; - grid-template-columns: auto; - /*grid-column-gap: 10px; - grid-row-gap: 10px;*/ - margin: 20px; - padding: 10px; - } - - @media screen and (min-width: 60em) { - .homepage_grid { - grid-template-columns: repeat(3, 1fr); - } - } - - @media (max-width: 60em) { - .hidden-mobile.homepage_item { - display: none; - } - } - - .homepage_item { - display: grid; - grid-template-columns: 1fr; - /*grid-template-rows: 1fr 0.25fr 0.9fr;*/ - grid-template-rows: 100px 10px 60px; - grid-template-areas: "hp_pic" "hp_title" "hp_text"; - grid-row-gap: 10px; - align-content: center; - justify-self: center; - padding: 20px; - border-radius: 10px; - - /* For making the whole div clickable */ - cursor: pointer; - position: relative; - } - - .homepage_item:hover { - background-color: #D6DBE4; /* neutralLighter */ - } - - /* For making the whole div clickable */ - a.divLink { - position: absolute; - width: 100%; - height: 100%; - top: 0; - left: 0; - text-decoration: none; - /* Makes sure the link doesn't get underlined */ - z-index: 10; - /* raises anchor tag above everything else in div */ - background-color: white; - /*workaround to make clickable in IE */ - opacity: 0; - /*workaround to make clickable in IE */ - filter: alpha(opacity=0); - /*workaround to make clickable in IE */ - } - - .hp_pic { - align-self: center; - justify-self: center; - grid-area: hp_pic; - } - - .hp_title { - grid-area: hp_title; - justify-self: center; - align-self: center; - font-size:1.6em; - font-weight: bold; - } - - .hp_text { - grid-area: hp_text; - justify-self: center; - margin: 10px; - text-align: center; - } - - .summit_item{ - grid-template-rows: 350px; - } - - .people_grid { - display: grid; - display: inline-grid; - grid-template-columns: auto; - /*grid-column-gap: 10px; - grid-row-gap: 10px;*/ - } - - @media screen and (max-width: 400px) { - .people_grid { - grid-template-columns: repeat(1, 200px); - } - } - - @media screen and (min-width: 400px) and (max-width:600px) { - .people_grid { - grid-template-columns: repeat(2, 200px); - } - } - - @media screen and (min-width: 600px) and (max-width: 800px) { - .people_grid { - grid-template-columns: repeat(3, 200px); - } - } - - @media screen and (min-width: 800px){ - .people_grid { - grid-template-columns: repeat(4, 200px); - } - } - - .person { - display: grid; - grid-template-columns: 1fr; - /*grid-template-rows: 1fr 0.25fr 0.9fr;*/ - grid-template-rows: 100px 10px; - grid-template-areas: "person_pic" "person_title" "person_affiliation"; - grid-row-gap: 20px; - align-content: center; - justify-self: center; - padding: 20px; - border-radius: 10px; - - /* For making the whole div clickable */ - cursor: pointer; - position: relative; - } - .person:hover { - background-color: #8897AE; /* neutralLight */ - } - - - .person_pic { - align-self: center; - justify-self: center; - grid-area: person_pic; - } - - .person_title { - grid-area: person_title; - justify-self: center; - align-self: center; - text-align: center; - font-size:1.1em; - } - - .person_title_col { - color: #8897AE; /* neutralLight */ - } - - .person_affiliation{ - align-self: center; - justify-self: center; - grid-area: person_affiliation; - } - - .person_no_link { - display: grid; - grid-template-columns: 1fr; - /*grid-template-rows: 1fr 0.25fr 0.9fr;*/ - grid-template-rows: 100px 10px; - grid-template-areas: "person_pic" "person_title" "person_affiliation"; - grid-row-gap: 20px; - align-content: center; - justify-self: center; - padding: 20px; - border-radius: 10px; - - position: relative; - } - - - /* note the plural */ - .members { - display: grid; - grid-template-columns: auto; - grid-column-gap: 50px; - align-items: center; - justify-content: center; /* adjusted */ - width: 100%; - } - - @media screen and (max-width: 500px) { - .members { - grid-template-columns: repeat(1, 220px); - } - } - - @media screen and (min-width: 500px) and (max-width:800px) { - .members { - grid-template-columns: repeat(2, 220px); - } - } - - @media screen and (min-width: 800px){ - .members { - grid-template-columns: repeat(3, 220px); - } - } - - /*single member*/ - members-1 { - display: grid; - grid-template-columns: auto; - grid-column-gap: 50px; - align-items: center; - justify-content: center; /* adjusted */ - width: 100%; - } - - - .member { - display: grid; - grid-template-columns: 1fr; - grid-template-rows: 1fr 0.25fr 0.25fr; - grid-column-gap: 25px; - grid-row-gap: 10px; - align-content: center; - } - - @media (max-width: 60em) { - .hidden-member-mobile { - display: none; - } - } - - .member-pic { - align-self: center; - justify-self: center; - grid-area: 1 / 1 / 2 / 2; - padding-top: 30px; - } - - .member-name { - grid-area: 2 / 1 / 3 / 2; - /*justify-self: center;*/ - text-align: center; - font-size:1.2em; - } - - .member-info { - grid-area: 3 / 1 / 3 / 2; - /*justify-self: center;*/ - text-align: center; - font-size:0.8em; - font-weight: bold; - } - - /* note the plural */ - .sponsors { - display: grid; - grid-template-columns: auto; - grid-column-gap: 50px; - align-items: center; - justify-content: center; /* adjusted */ - width: 100%; - } - - @media screen and (max-width: 500px) { - .sponsors { - grid-template-columns: repeat(1, 200px); - } - } - - @media screen and (min-width: 500px) and (max-width:700px) { - .sponsors { - grid-template-columns: repeat(2, 200px); - } - } - - @media screen and (min-width: 700px){ - .sponsors { - grid-template-columns: repeat(3, 200px); - } - } - -/* Two sponsors */ -.sponsors-2 { - display: grid; - grid-template-columns: auto; - grid-column-gap: 50px; - align-items: center; - justify-content: center; /* adjusted */ - width: 100%; - } - - @media screen and (min-width: 500px) { - .sponsors-2 { - grid-template-columns: repeat(2, 200px); - } - } - - - /*single sponsor*/ - sponsors-1 { - display: grid; - grid-template-columns: auto; - grid-column-gap: 50px; - align-items: center; - justify-content: center; /* adjusted */ - width: 100%; - } - - - .sponsor { - display: grid; - grid-template-columns: 1fr; - grid-template-rows: 1fr 0.25fr 0.25fr; - grid-column-gap: 25px; - grid-row-gap: 10px; - align-content: center; - } - - @media (max-width: 60em) { - .hidden-sponsor-mobile { - display: none; - } - } - - .sponsor-pic { - align-self: center; - justify-self: center; - grid-area: 1 / 1 / 2 / 2; - padding-top: 30px; - } - - .sponsor-name { - grid-area: 2 / 1 / 3 / 2; - /*justify-self: center;*/ - text-align: center; - font-size:1.2em; - } - - .sponsor-info { - grid-area: 3 / 1 / 3 / 2; - /*justify-self: center;*/ - text-align: center; - font-size:0.8em; - font-weight: bold; - } - - .governing-container { - display: grid; - grid-template-columns: 30px auto; - grid-gap: 10px 70px; - - } - - .governing-item-pic { - grid-row-start: 1; - grid-row-end: span 2; - } - - .governing-item-heading { - grid-column-start: 2; - grid-column-end: 2; - grid-row-start: 1; - grid-row-end: span 1; - } - - .governing-item-text { - grid-column-start: 2; - grid-column-end: 2; - grid-row-start: 2; - grid-row-end: span 2; - } - - .bottom-ruler { - margin-top: 0px; - margin-bottom:5px; - border-top:2px solid #96ca50 /* logo green */ - } - - .highlight { - line-height: 1.3; - color:#668B37; /* greenDark */ - font-size:15px; - font-weight:bold; - } - - .emph { - color:#668B37; /* greenDark */ - } - - - .join { - color:#668B37; /* greenDark */ - font-size:20px; - font-weight: bold; - } - - .news { - width: auto; - height:auto; - padding-top:.5em; - padding-left:10px; - padding-right:5px; - margin-top:1em; - margin-left:60px; - margin-right:60px; - border-radius: .7em; - background-color: #EBEEF5; /* ligher than hover D6DBE4 */ - } - - .news:hover { - background-color: #D6DBE4; /* neutralLighter */ - } - - .news-column { - float: left; - padding: 5px; - } - - .news-clearfix::after { - content: ""; - clear: both; - display: table; - } - - .news-title { - width: 75px; - font-size: 200%; - line-height: 80%; - } - - .tag-link { - width: 6em - } - - .tag-span{ - display: none; - } - .tag-link:hover span { - display: inline; - } - - .news-content { - width: auto; - } - - .news-item { - width: auto; - height:auto; - padding:.3em; - margin-top:3rem; - margin-bottom:.5em; - border-radius: .4em; - background-color: #D6DBE4; /* neutralLighter */ - font-weight: bold; - clear: both; - } - .news-item:hover + .hide-tag{ - display: block; - color: green; - } - - .news-finish{ - clear:both; - margin-bottom: 4rem; - } - - .news-img { - float: right; - padding-left: 2rem; - } - - .news-text-container{ - overflow: hidden; - } - #floated-imgs { float: right; } - #floated-imgs img {display: block; } - - .memberlogopage h1 { - font-size:50px; - } - .memberlogopage h2 { - font-size:40px; - } - - .memberlogopage .sponsors { - margin-top: 30px; - margin-bottom: 60px; - } - - table.endorsement-table { - margin-left: 20px; - } - - .endorsement-table tr{ - margin-top: 10px; - } - - .endorsement-table td{ - padding: 10px; - padding-top: 30px; - vertical-align: top; - } - - table.data-table { - border-collapse: collapse; - width: 100%; - word-wrap: break-word; - border-width: 0px; - } - - .data-table tr { - border-width: 0px; - } - - .data-table th { - padding: 1ex 2ex 1ex 2ex; - border-style: solid none solid none; - border-color: black; - border-width: 2px; - } - - .data-table td, td.data-table-right { - padding: 0.8ex 2ex 0.8ex 2ex; - } - - td.data-table-right { - text-align: right; - } - - td.data-table-right, td.data-mean, td.data-stddev { - word-wrap: normal; - white-space: nowrap; - } - - td.data-mean { - padding: 0.8ex 0ex 0.8ex 2.5ex; - text-align: right; - } - - td.data-stddev { - padding: 0.8ex 1.5ex 0.8ex 1ex; - } - - td.monospace { - font-family: monospace; - } - - table.summit-talks { - border-collapse: collapse; - width: 100%; - } - - #summit-talks td, #summit-talks th { - border: 1px solid #ddd; - padding: 8px; - } - - td.break {background-color: #D6DBE4;} - - #summit-talks tr:hover {background-color: #ddd;} - - #summit-talks th { - padding-top: 12px; - padding-bottom: 12px; - text-align: left; - background-color: #96CA4F; - color: white; - } - .summit_chair{ - font-style: italic; - } - .summit-abstract-link{ - font-weight: bold; - } - h4.summit-abstract-title{ - background-color: #96CA4F; - color: white; - } - p.summit-abstract-type{ - font-style: italic; - } - p.summit-abstract-author{ - font-weight: normal; - } - span.summit-abstract-presenter{ - color: black; - text-decoration: underline; - } - span.summit-abstract-presenter-bold{ - color: black; - text-decoration: underline; - font-weight: bold; - } - span.summit-abstract-affiliation{ - font-style: normal; - color:#808080; - } - div.summit-abstract{ - padding-top: 5px; - padding-bottom: 10px; - } - - div.summit-abstract-tbd{ - padding-top: 5px; - padding-bottom: 10px; - background-color: yellow; - } - - /*note the plural*/ - .keynotes_grid { - display: grid; - display: inline-grid; - grid-template-columns: 300px 300px; - align-items: center; - justify-content: center; /* adjusted */ - width: 100%; - row-gap: 20px; - padding-bottom:20px; - /*grid-column-gap: 10px; - grid-row-gap: 10px;*/ - } - - @media screen and (max-width: 400px) { - .keynotes_grid { - grid-template-columns: repeat(1, 200px); - } - } -.keynote_talk { - grid-area: speaker_talk; - justify-self: center; - align-self: center; - width: 250px; - font-size:1.1em; - } - - /*note the plural*/ - .speakers_grid { - display: grid; - display: inline-grid; - grid-template-columns: auto; - align-items: center; - justify-content: center; /* adjusted */ - width: 100%; -} - - @media screen and (max-width: 400px) { - .speakers_grid { - grid-template-columns: repeat(1, 200px); - } - } - - @media screen and (min-width: 400px) and (max-width:600px) { - .speakers_grid { - grid-template-columns: repeat(2, 200px); - } - } - - @media screen and (min-width: 600px) and (max-width: 800px) { - .speakers_grid { - grid-template-columns: repeat(3, 200px); - } - } - - @media screen and (min-width: 800px){ - .speakers_grid { - grid-template-columns: repeat(4, 200px); - } - } - - .speaker { - display: grid; - grid-template-columns: 1fr; - /*grid-template-rows: 1fr 0.25fr 0.9fr;*/ - grid-template-rows: 200px 20px 30px; - grid-template-areas: "speaker_pic" "speaker_title" "speaker_talk"; - grid-row-gap: 20px; - align-content: center; - justify-self: center; - padding: 20px; - border-radius: 10px; - } - - .speaker_pic { - align-self: center; - justify-self: center; - grid-area: speaker_pic; - } - - .speaker_title { - grid-area: speaker_title; - justify-self: center; - align-self: center; - font-size:1.1em; - } - - .speaker_title { - grid-area: speaker_title; - justify-self: center; - align-self: center; - font-size:1.1em; - } - - .speaker_title_col { - color: #8897AE; /* neutralLight */ - } - - .speaker_talk { - grid-area: speaker_talk; - justify-self: center; - align-self: center; - width: 300px; - font-size:1.1em; - } - - .youtube_icon{ - width: 40px; - } - - .previous-summit-links{ - padding: 5px; - } - - .summit_div{ - padding-top: 10px; - } - h5.keynote{ - font-weight: bold; - } - p.keynote { - text-indent: 15px; - } - - .center { - display: inline-block; - margin-left: auto; - margin-right: auto; -} - -.center-imgs { - text-align:center; -} \ No newline at end of file diff --git a/PR_400/favicon.ico b/PR_400/favicon.ico deleted file mode 100644 index 4ece9d69..00000000 Binary files a/PR_400/favicon.ico and /dev/null differ diff --git a/PR_400/fonts/glyphicons-halflings-regular.eot b/PR_400/fonts/glyphicons-halflings-regular.eot deleted file mode 100644 index b93a4953..00000000 Binary files a/PR_400/fonts/glyphicons-halflings-regular.eot and /dev/null differ diff --git a/PR_400/fonts/glyphicons-halflings-regular.svg b/PR_400/fonts/glyphicons-halflings-regular.svg deleted file mode 100644 index 94fb5490..00000000 --- a/PR_400/fonts/glyphicons-halflings-regular.svg +++ /dev/null @@ -1,288 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \ No newline at end of file diff --git a/PR_400/fonts/glyphicons-halflings-regular.ttf b/PR_400/fonts/glyphicons-halflings-regular.ttf deleted file mode 100644 index 1413fc60..00000000 Binary files a/PR_400/fonts/glyphicons-halflings-regular.ttf and /dev/null differ diff --git a/PR_400/fonts/glyphicons-halflings-regular.woff b/PR_400/fonts/glyphicons-halflings-regular.woff deleted file mode 100644 index 9e612858..00000000 Binary files a/PR_400/fonts/glyphicons-halflings-regular.woff and /dev/null differ diff --git a/PR_400/fonts/glyphicons-halflings-regular.woff2 b/PR_400/fonts/glyphicons-halflings-regular.woff2 deleted file mode 100644 index 64539b54..00000000 Binary files a/PR_400/fonts/glyphicons-halflings-regular.woff2 and /dev/null differ diff --git a/PR_400/home.pml b/PR_400/home.pml deleted file mode 100644 index 40472e50..00000000 --- a/PR_400/home.pml +++ /dev/null @@ -1,11 +0,0 @@ - - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/images/Proof-FC.svg b/PR_400/images/Proof-FC.svg deleted file mode 100644 index 45986083..00000000 --- a/PR_400/images/Proof-FC.svg +++ /dev/null @@ -1 +0,0 @@ -AbstractModelC Imple-mentationProofFunctionalCorrectness \ No newline at end of file diff --git a/PR_400/images/Proof-FC.svg.license b/PR_400/images/Proof-FC.svg.license deleted file mode 100644 index a4cbf8f5..00000000 --- a/PR_400/images/Proof-FC.svg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2024 seL4 Project a Series of LF Projects, LLC. -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/acm-2023.svg b/PR_400/images/acm-2023.svg deleted file mode 100755 index 1fdc07fd..00000000 --- a/PR_400/images/acm-2023.svg +++ /dev/null @@ -1,2315 +0,0 @@ - - - - - - - - - - diff --git a/PR_400/images/arc-logo.svg b/PR_400/images/arc-logo.svg deleted file mode 100644 index 73adeb2b..00000000 --- a/PR_400/images/arc-logo.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/PR_400/images/arc-logo.svg.license b/PR_400/images/arc-logo.svg.license deleted file mode 100644 index f0e3878a..00000000 --- a/PR_400/images/arc-logo.svg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright Australian Research Council -SPDX-License-Identifier: LicenseRef-ARC diff --git a/PR_400/images/call-graph.png b/PR_400/images/call-graph.png deleted file mode 100644 index 3fa45e33..00000000 Binary files a/PR_400/images/call-graph.png and /dev/null differ diff --git a/PR_400/images/call-graph.png.license b/PR_400/images/call-graph.png.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/call-graph.png.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/contacts.png b/PR_400/images/contacts.png deleted file mode 100644 index e6bdf4a4..00000000 Binary files a/PR_400/images/contacts.png and /dev/null differ diff --git a/PR_400/images/contacts.png.license b/PR_400/images/contacts.png.license deleted file mode 100644 index ae446459..00000000 --- a/PR_400/images/contacts.png.license +++ /dev/null @@ -1,3 +0,0 @@ -Copyright 2019 BSGStudio -From https://all-free-download.com/free-vector/download/communication-icons_311138.html -SPDX-License-Identifier: LicenseRef-All-Free-Download diff --git a/PR_400/images/contributing.jpg b/PR_400/images/contributing.jpg deleted file mode 100644 index 57e51b50..00000000 Binary files a/PR_400/images/contributing.jpg and /dev/null differ diff --git a/PR_400/images/contributing.jpg.license b/PR_400/images/contributing.jpg.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/contributing.jpg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/faq.svg b/PR_400/images/faq.svg deleted file mode 100644 index 5293da9c..00000000 --- a/PR_400/images/faq.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/PR_400/images/faq.svg.license b/PR_400/images/faq.svg.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/faq.svg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/hacms-award.jpg b/PR_400/images/hacms-award.jpg deleted file mode 100644 index 35e8c9e4..00000000 Binary files a/PR_400/images/hacms-award.jpg and /dev/null differ diff --git a/PR_400/images/hacms-award.jpg.license b/PR_400/images/hacms-award.jpg.license deleted file mode 100644 index b3e21b3a..00000000 --- a/PR_400/images/hacms-award.jpg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2023 John Launchbury -SPDX-License-Identifier: LicenseRef-UsedWithPermission diff --git a/PR_400/images/happy-sel4-day.svg b/PR_400/images/happy-sel4-day.svg deleted file mode 100644 index 014cf149..00000000 --- a/PR_400/images/happy-sel4-day.svg +++ /dev/null @@ -1,100 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/images/happy-sel4-day.svg.license b/PR_400/images/happy-sel4-day.svg.license deleted file mode 100644 index e058c076..00000000 --- a/PR_400/images/happy-sel4-day.svg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2024 June Andronick -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/icons/android-icon-144x144.png b/PR_400/images/icons/android-icon-144x144.png deleted file mode 100644 index d79c77b8..00000000 Binary files a/PR_400/images/icons/android-icon-144x144.png and /dev/null differ diff --git a/PR_400/images/icons/android-icon-192x192.png b/PR_400/images/icons/android-icon-192x192.png deleted file mode 100644 index 66fb346b..00000000 Binary files a/PR_400/images/icons/android-icon-192x192.png and /dev/null differ diff --git a/PR_400/images/icons/android-icon-36x36.png b/PR_400/images/icons/android-icon-36x36.png deleted file mode 100644 index 310cab9c..00000000 Binary files a/PR_400/images/icons/android-icon-36x36.png and /dev/null differ diff --git a/PR_400/images/icons/android-icon-48x48.png b/PR_400/images/icons/android-icon-48x48.png deleted file mode 100644 index bd1466a4..00000000 Binary files a/PR_400/images/icons/android-icon-48x48.png and /dev/null differ diff --git a/PR_400/images/icons/android-icon-72x72.png b/PR_400/images/icons/android-icon-72x72.png deleted file mode 100644 index 65cf541e..00000000 Binary files a/PR_400/images/icons/android-icon-72x72.png and /dev/null differ diff --git a/PR_400/images/icons/android-icon-96x96.png b/PR_400/images/icons/android-icon-96x96.png deleted file mode 100644 index 6d3377d8..00000000 Binary files a/PR_400/images/icons/android-icon-96x96.png and /dev/null differ diff --git a/PR_400/images/icons/apple-touch-icon-114x114.png b/PR_400/images/icons/apple-touch-icon-114x114.png deleted file mode 100644 index 9b5b3537..00000000 Binary files a/PR_400/images/icons/apple-touch-icon-114x114.png and /dev/null differ diff --git a/PR_400/images/icons/apple-touch-icon-120x120.png b/PR_400/images/icons/apple-touch-icon-120x120.png deleted file mode 100644 index aae5b3a0..00000000 Binary files a/PR_400/images/icons/apple-touch-icon-120x120.png and /dev/null differ diff --git a/PR_400/images/icons/apple-touch-icon-144x144.png b/PR_400/images/icons/apple-touch-icon-144x144.png deleted file mode 100644 index d79c77b8..00000000 Binary files a/PR_400/images/icons/apple-touch-icon-144x144.png and /dev/null differ diff --git a/PR_400/images/icons/apple-touch-icon-152x152.png b/PR_400/images/icons/apple-touch-icon-152x152.png deleted file mode 100644 index 160c170e..00000000 Binary files a/PR_400/images/icons/apple-touch-icon-152x152.png and /dev/null differ diff --git a/PR_400/images/icons/apple-touch-icon-180x180.png b/PR_400/images/icons/apple-touch-icon-180x180.png deleted file mode 100644 index f4d084d3..00000000 Binary files a/PR_400/images/icons/apple-touch-icon-180x180.png and /dev/null differ diff --git a/PR_400/images/icons/apple-touch-icon-57x57.png b/PR_400/images/icons/apple-touch-icon-57x57.png deleted file mode 100644 index 93074149..00000000 Binary files a/PR_400/images/icons/apple-touch-icon-57x57.png and /dev/null differ diff --git a/PR_400/images/icons/apple-touch-icon-60x60.png b/PR_400/images/icons/apple-touch-icon-60x60.png deleted file mode 100644 index 11b47a7c..00000000 Binary files a/PR_400/images/icons/apple-touch-icon-60x60.png and /dev/null differ diff --git a/PR_400/images/icons/apple-touch-icon-72x72.png b/PR_400/images/icons/apple-touch-icon-72x72.png deleted file mode 100644 index 65cf541e..00000000 Binary files a/PR_400/images/icons/apple-touch-icon-72x72.png and /dev/null differ diff --git a/PR_400/images/icons/apple-touch-icon-76x76.png b/PR_400/images/icons/apple-touch-icon-76x76.png deleted file mode 100644 index 3d0a5016..00000000 Binary files a/PR_400/images/icons/apple-touch-icon-76x76.png and /dev/null differ diff --git a/PR_400/images/icons/apple-touch-icon-precomposed.png b/PR_400/images/icons/apple-touch-icon-precomposed.png deleted file mode 100644 index 9236c996..00000000 Binary files a/PR_400/images/icons/apple-touch-icon-precomposed.png and /dev/null differ diff --git a/PR_400/images/icons/apple-touch-icon.png b/PR_400/images/icons/apple-touch-icon.png deleted file mode 100644 index 9236c996..00000000 Binary files a/PR_400/images/icons/apple-touch-icon.png and /dev/null differ diff --git a/PR_400/images/icons/browserconfig.xml b/PR_400/images/icons/browserconfig.xml deleted file mode 100644 index c5541482..00000000 --- a/PR_400/images/icons/browserconfig.xml +++ /dev/null @@ -1,2 +0,0 @@ - -#ffffff \ No newline at end of file diff --git a/PR_400/images/icons/facebook.svg.license b/PR_400/images/icons/facebook.svg.license deleted file mode 100644 index cc0b3a3f..00000000 --- a/PR_400/images/icons/facebook.svg.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2022 Facebook -SPDX-License-Identifier: LicenseRef-UsedWithPermission - -See https://www.facebook.com/brand/resources/facebookapp/guidelines for brand guidelines \ No newline at end of file diff --git a/PR_400/images/icons/favicon-16x16.png b/PR_400/images/icons/favicon-16x16.png deleted file mode 100644 index 1e2e2c1f..00000000 Binary files a/PR_400/images/icons/favicon-16x16.png and /dev/null differ diff --git a/PR_400/images/icons/favicon-32x32.png b/PR_400/images/icons/favicon-32x32.png deleted file mode 100644 index 1dabebb0..00000000 Binary files a/PR_400/images/icons/favicon-32x32.png and /dev/null differ diff --git a/PR_400/images/icons/favicon-96x96.png b/PR_400/images/icons/favicon-96x96.png deleted file mode 100644 index 6d3377d8..00000000 Binary files a/PR_400/images/icons/favicon-96x96.png and /dev/null differ diff --git a/PR_400/images/icons/favicon.ico b/PR_400/images/icons/favicon.ico deleted file mode 100644 index 4ece9d69..00000000 Binary files a/PR_400/images/icons/favicon.ico and /dev/null differ diff --git a/PR_400/images/icons/linkedin.svg b/PR_400/images/icons/linkedin.svg deleted file mode 100644 index b4b86a72..00000000 --- a/PR_400/images/icons/linkedin.svg +++ /dev/null @@ -1,80 +0,0 @@ - - - - - - - - - - - - - - diff --git a/PR_400/images/icons/linkedin.svg.license b/PR_400/images/icons/linkedin.svg.license deleted file mode 100644 index 52bbf327..00000000 --- a/PR_400/images/icons/linkedin.svg.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2022 LinkedIn -SPDX-License-Identifier: LicenseRef-UsedWithPermission - -See https://brand.linkedin.com/downloads for brand guidelines \ No newline at end of file diff --git a/PR_400/images/icons/manifest.json b/PR_400/images/icons/manifest.json deleted file mode 100644 index 9f2c7429..00000000 --- a/PR_400/images/icons/manifest.json +++ /dev/null @@ -1,41 +0,0 @@ -{ - "name": "App", - "icons": [ - { - "src": "\\/images\/icons\/android-icon-36x36.png", - "sizes": "36x36", - "type": "image\/png", - "density": "0.75" - }, - { - "src": "\/images\/icons\/android-icon-48x48.png", - "sizes": "48x48", - "type": "image\/png", - "density": "1.0" - }, - { - "src": "\/images\/icons\/android-icon-72x72.png", - "sizes": "72x72", - "type": "image\/png", - "density": "1.5" - }, - { - "src": "\/images\/icons\/android-icon-96x96.png", - "sizes": "96x96", - "type": "image\/png", - "density": "2.0" - }, - { - "src": "\/images\/icons\/android-icon-144x144.png", - "sizes": "144x144", - "type": "image\/png", - "density": "3.0" - }, - { - "src": "\/images\/icons\/android-icon-192x192.png", - "sizes": "192x192", - "type": "image\/png", - "density": "4.0" - } - ] -} diff --git a/PR_400/images/icons/mastodon.svg b/PR_400/images/icons/mastodon.svg deleted file mode 100755 index 8fe44a5b..00000000 --- a/PR_400/images/icons/mastodon.svg +++ /dev/null @@ -1,188 +0,0 @@ - - - - - - - - - - diff --git a/PR_400/images/icons/mastodon.svg.license b/PR_400/images/icons/mastodon.svg.license deleted file mode 100644 index d5f267cd..00000000 --- a/PR_400/images/icons/mastodon.svg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2022 Mastodon -SPDX-License-Identifier: LicenseRef-UsedWithPermission \ No newline at end of file diff --git a/PR_400/images/icons/mstile-144x144.png b/PR_400/images/icons/mstile-144x144.png deleted file mode 100644 index d79c77b8..00000000 Binary files a/PR_400/images/icons/mstile-144x144.png and /dev/null differ diff --git a/PR_400/images/icons/mstile-150x150.png b/PR_400/images/icons/mstile-150x150.png deleted file mode 100644 index 2e1940f2..00000000 Binary files a/PR_400/images/icons/mstile-150x150.png and /dev/null differ diff --git a/PR_400/images/icons/mstile-310x310.png b/PR_400/images/icons/mstile-310x310.png deleted file mode 100644 index 78dd7dd6..00000000 Binary files a/PR_400/images/icons/mstile-310x310.png and /dev/null differ diff --git a/PR_400/images/icons/mstile-70x70.png b/PR_400/images/icons/mstile-70x70.png deleted file mode 100644 index 3459eeaf..00000000 Binary files a/PR_400/images/icons/mstile-70x70.png and /dev/null differ diff --git a/PR_400/images/icons/slides.svg b/PR_400/images/icons/slides.svg deleted file mode 100755 index 0241e180..00000000 --- a/PR_400/images/icons/slides.svg +++ /dev/null @@ -1,57 +0,0 @@ - - - - - - - - - - diff --git a/PR_400/images/icons/slides.svg.license b/PR_400/images/icons/slides.svg.license deleted file mode 100644 index 0fd67970..00000000 --- a/PR_400/images/icons/slides.svg.license +++ /dev/null @@ -1,10 +0,0 @@ -Copyright 2022 Twitter -SPDX-License-Identifier: LicenseRef-UsedWithPermission - -License details: -Image sourced from Flaticon -Licensee: user83622535 -Download date: 03 Nov 2022 -License type: Free for commercial use WITH ATTRIBUTION license * -Description Licensor's Author -Presentation Syahrul Hidayatullah \ No newline at end of file diff --git a/PR_400/images/icons/twitter.svg b/PR_400/images/icons/twitter.svg deleted file mode 100644 index 7a77c1d1..00000000 --- a/PR_400/images/icons/twitter.svg +++ /dev/null @@ -1,79 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/images/icons/twitter.svg.license b/PR_400/images/icons/twitter.svg.license deleted file mode 100644 index ff3555b8..00000000 --- a/PR_400/images/icons/twitter.svg.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2022 Twitter -SPDX-License-Identifier: LicenseRef-UsedWithPermission - -See https://about.twitter.com/en/who-we-are/brand-toolkit for brand guidelines \ No newline at end of file diff --git a/PR_400/images/icons/youtube.svg b/PR_400/images/icons/youtube.svg deleted file mode 100644 index 6251c019..00000000 --- a/PR_400/images/icons/youtube.svg +++ /dev/null @@ -1,88 +0,0 @@ - - - - - - - - - - diff --git a/PR_400/images/icons/youtube.svg.license b/PR_400/images/icons/youtube.svg.license deleted file mode 100644 index 29857562..00000000 --- a/PR_400/images/icons/youtube.svg.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2022 Youtube -SPDX-License-Identifier: LicenseRef-UsedWithPermission - -See https://www.youtube.com/howyoutubeworks/resources/brand-resources/ for brand guidelines \ No newline at end of file diff --git a/PR_400/images/icons/youtube_nobckgnd.svg b/PR_400/images/icons/youtube_nobckgnd.svg deleted file mode 100755 index 03086b90..00000000 --- a/PR_400/images/icons/youtube_nobckgnd.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/PR_400/images/icons/youtube_nobckgnd.svg.license b/PR_400/images/icons/youtube_nobckgnd.svg.license deleted file mode 100644 index 29857562..00000000 --- a/PR_400/images/icons/youtube_nobckgnd.svg.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2022 Youtube -SPDX-License-Identifier: LicenseRef-UsedWithPermission - -See https://www.youtube.com/howyoutubeworks/resources/brand-resources/ for brand guidelines \ No newline at end of file diff --git a/PR_400/images/l4family.svg b/PR_400/images/l4family.svg deleted file mode 100644 index 4af8c316..00000000 --- a/PR_400/images/l4family.svg +++ /dev/null @@ -1 +0,0 @@ -939495969798990001020304050607080910111213L3 L4“X”HazelnutPistachioL4/AlphaL4/MIPSseL4OKL4 MicrokernelOKL4 MicrovisorCodezeroP4 PikeOSFiascoFiasco.OCL4-embeddedNOVAAPI InheritanceCode InheritanceGMD/IBM/TU KarlsruheUNSW/NICTA/Data61TU DresdenCommercial CloneOK LabsCreators: \ No newline at end of file diff --git a/PR_400/images/l4family.svg.license b/PR_400/images/l4family.svg.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/l4family.svg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/learn.jpg b/PR_400/images/learn.jpg deleted file mode 100644 index e7881453..00000000 Binary files a/PR_400/images/learn.jpg and /dev/null differ diff --git a/PR_400/images/learn.jpg.license b/PR_400/images/learn.jpg.license deleted file mode 100644 index 0f36f80f..00000000 --- a/PR_400/images/learn.jpg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright Unknown -SPDX-License-Identifier: LicenseRef-unsplash diff --git a/PR_400/images/learning.jpg b/PR_400/images/learning.jpg deleted file mode 100644 index 41227881..00000000 Binary files a/PR_400/images/learning.jpg and /dev/null differ diff --git a/PR_400/images/learning.jpg.license b/PR_400/images/learning.jpg.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/learning.jpg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/lf-annual-report-2023.png b/PR_400/images/lf-annual-report-2023.png deleted file mode 100755 index 551ac467..00000000 Binary files a/PR_400/images/lf-annual-report-2023.png and /dev/null differ diff --git a/PR_400/images/lf-annual-report-2023.png.license b/PR_400/images/lf-annual-report-2023.png.license deleted file mode 100644 index 7b6205ae..00000000 --- a/PR_400/images/lf-annual-report-2023.png.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2023 Linux Foundation and seL4 Foundation -SPDX-License-Identifier: Fair diff --git a/PR_400/images/lf-annual-report.png b/PR_400/images/lf-annual-report.png deleted file mode 100755 index 1af4c976..00000000 Binary files a/PR_400/images/lf-annual-report.png and /dev/null differ diff --git a/PR_400/images/lf-annual-report.png.license b/PR_400/images/lf-annual-report.png.license deleted file mode 100644 index 045c46db..00000000 --- a/PR_400/images/lf-annual-report.png.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2022 Linux Foundation and seL4 Foundation -SPDX-License-Identifier: Fair diff --git a/PR_400/images/logo-text-white.svg b/PR_400/images/logo-text-white.svg deleted file mode 100644 index b802ec8d..00000000 --- a/PR_400/images/logo-text-white.svg +++ /dev/null @@ -1,135 +0,0 @@ - - - -image/svg+xml \ No newline at end of file diff --git a/PR_400/images/logo-text-white.svg.license b/PR_400/images/logo-text-white.svg.license deleted file mode 100644 index 30a1e2cf..00000000 --- a/PR_400/images/logo-text-white.svg.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2020 seL4 Project a Series of LF Projects, LLC. -SPDX-License-Identifier: LicenseRef-Trademark - -This file contains a trademark of the seL4 Foundation. diff --git a/PR_400/images/more_info.png b/PR_400/images/more_info.png deleted file mode 100644 index ba108f7e..00000000 Binary files a/PR_400/images/more_info.png and /dev/null differ diff --git a/PR_400/images/more_info.png.license b/PR_400/images/more_info.png.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/more_info.png.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/mosaic-high.jpg b/PR_400/images/mosaic-high.jpg deleted file mode 100644 index 04a21541..00000000 Binary files a/PR_400/images/mosaic-high.jpg and /dev/null differ diff --git a/PR_400/images/mosaic-high.jpg.license b/PR_400/images/mosaic-high.jpg.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/mosaic-high.jpg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/mosaic.jpg b/PR_400/images/mosaic.jpg deleted file mode 100644 index 8a315a61..00000000 Binary files a/PR_400/images/mosaic.jpg and /dev/null differ diff --git a/PR_400/images/mosaic.jpg.license b/PR_400/images/mosaic.jpg.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/mosaic.jpg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/retrofit.png b/PR_400/images/retrofit.png deleted file mode 100644 index 001aab05..00000000 Binary files a/PR_400/images/retrofit.png and /dev/null differ diff --git a/PR_400/images/retrofit.png.license b/PR_400/images/retrofit.png.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/retrofit.png.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/roadmap.jpg b/PR_400/images/roadmap.jpg deleted file mode 100644 index 38f77c10..00000000 Binary files a/PR_400/images/roadmap.jpg and /dev/null differ diff --git a/PR_400/images/roadmap.jpg.license b/PR_400/images/roadmap.jpg.license deleted file mode 100644 index 9cba84fc..00000000 --- a/PR_400/images/roadmap.jpg.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2019 Delfi de la Rua -SPDX-License-Identifier: LicenseRef-unsplash - -https://unsplash.com/photos/vfzfavUZmfc/download?force=true diff --git a/PR_400/images/rust-logo-blk.svg b/PR_400/images/rust-logo-blk.svg deleted file mode 100755 index 1a6c762d..00000000 --- a/PR_400/images/rust-logo-blk.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/PR_400/images/rust-logo-blk.svg.license b/PR_400/images/rust-logo-blk.svg.license deleted file mode 100644 index 5aebb977..00000000 --- a/PR_400/images/rust-logo-blk.svg.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2023 Rust Foundation -SPDX-License-Identifier: CC-BY-4.0 - -https://foundation.rust-lang.org/policies/logo-policy-and-media-guide/ diff --git a/PR_400/images/scales.png b/PR_400/images/scales.png deleted file mode 100644 index 157474c8..00000000 Binary files a/PR_400/images/scales.png and /dev/null differ diff --git a/PR_400/images/scales.png.license b/PR_400/images/scales.png.license deleted file mode 100644 index 661ce9a8..00000000 --- a/PR_400/images/scales.png.license +++ /dev/null @@ -1,3 +0,0 @@ -Copyright 2013 Pixabay -SPDX-License-Identifier: LicenseRef-Pixabay - https://pixabay.com/vectors/balance-scale-silhouette-justice-147053/ diff --git a/PR_400/images/seL4.svg b/PR_400/images/seL4.svg deleted file mode 100644 index c029c6e8..00000000 --- a/PR_400/images/seL4.svg +++ /dev/null @@ -1,11 +0,0 @@ - - - - - - - - - - - diff --git a/PR_400/images/seL4.svg.license b/PR_400/images/seL4.svg.license deleted file mode 100644 index 30a1e2cf..00000000 --- a/PR_400/images/seL4.svg.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2020 seL4 Project a Series of LF Projects, LLC. -SPDX-License-Identifier: LicenseRef-Trademark - -This file contains a trademark of the seL4 Foundation. diff --git a/PR_400/images/sel4-birthdaycake.png b/PR_400/images/sel4-birthdaycake.png deleted file mode 100644 index 088ff5ac..00000000 Binary files a/PR_400/images/sel4-birthdaycake.png and /dev/null differ diff --git a/PR_400/images/sel4-birthdaycake.png.license b/PR_400/images/sel4-birthdaycake.png.license deleted file mode 100644 index 7df69034..00000000 --- a/PR_400/images/sel4-birthdaycake.png.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2019 Gernot Heiser -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/sel4-foundation-logo.svg b/PR_400/images/sel4-foundation-logo.svg deleted file mode 100644 index 188d5e22..00000000 --- a/PR_400/images/sel4-foundation-logo.svg +++ /dev/null @@ -1 +0,0 @@ - \ No newline at end of file diff --git a/PR_400/images/sel4-foundation-logo.svg.license b/PR_400/images/sel4-foundation-logo.svg.license deleted file mode 100644 index 92dad973..00000000 --- a/PR_400/images/sel4-foundation-logo.svg.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2020 seL4 Project a Series of LF Projects, LLC. -SPDX-License-Identifier: LicenseRef-Trademark - -This file contains a trademark of the seL4 foundation. diff --git a/PR_400/images/sel4-summit-logo.svg b/PR_400/images/sel4-summit-logo.svg deleted file mode 100644 index 207f8ad3..00000000 --- a/PR_400/images/sel4-summit-logo.svg +++ /dev/null @@ -1,182 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/images/sel4-summit-logo.svg.license b/PR_400/images/sel4-summit-logo.svg.license deleted file mode 100644 index 0c9d6752..00000000 --- a/PR_400/images/sel4-summit-logo.svg.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2022 seL4 Project a Series of LF Projects, LLC. -SPDX-License-Identifier: LicenseRef-Trademark - -This file contains a variation on the trademark of the seL4 Foundation. diff --git a/PR_400/images/sel4_quad_low.jpg b/PR_400/images/sel4_quad_low.jpg deleted file mode 100644 index df1900db..00000000 Binary files a/PR_400/images/sel4_quad_low.jpg and /dev/null differ diff --git a/PR_400/images/sel4_quad_low.jpg.license b/PR_400/images/sel4_quad_low.jpg.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/sel4_quad_low.jpg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/services.png b/PR_400/images/services.png deleted file mode 100644 index a8dbc56f..00000000 Binary files a/PR_400/images/services.png and /dev/null differ diff --git a/PR_400/images/services.png.license b/PR_400/images/services.png.license deleted file mode 100644 index 7037d770..00000000 --- a/PR_400/images/services.png.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2023 iStock -SPDX-License-Identifier: LicenseRef-UsedWithPermission diff --git a/PR_400/images/smaccmcopter-defcon.jpg b/PR_400/images/smaccmcopter-defcon.jpg deleted file mode 100644 index 5f28c6c5..00000000 Binary files a/PR_400/images/smaccmcopter-defcon.jpg and /dev/null differ diff --git a/PR_400/images/smaccmcopter-defcon.jpg.license b/PR_400/images/smaccmcopter-defcon.jpg.license deleted file mode 100644 index bd683f45..00000000 --- a/PR_400/images/smaccmcopter-defcon.jpg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2021 DARPA -SPDX-License-Identifier: LicenseRef-UsedWithPermission diff --git a/PR_400/images/summit/RTX-David.png b/PR_400/images/summit/RTX-David.png deleted file mode 100644 index fe941caf..00000000 Binary files a/PR_400/images/summit/RTX-David.png and /dev/null differ diff --git a/PR_400/images/summit/alison.jpg b/PR_400/images/summit/alison.jpg deleted file mode 100755 index 4a84f310..00000000 Binary files a/PR_400/images/summit/alison.jpg and /dev/null differ diff --git a/PR_400/images/summit/axel.png b/PR_400/images/summit/axel.png deleted file mode 100644 index c26fdcda..00000000 Binary files a/PR_400/images/summit/axel.png and /dev/null differ diff --git a/PR_400/images/summit/axel.png.licence b/PR_400/images/summit/axel.png.licence deleted file mode 100644 index 3dd90822..00000000 --- a/PR_400/images/summit/axel.png.licence +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2022, Hensoldt Cyber - SPDX-License-Identifier: LicenseRef-PhotoLicence \ No newline at end of file diff --git a/PR_400/images/summit/blue-mountains.jpg b/PR_400/images/summit/blue-mountains.jpg deleted file mode 100644 index 1777ea7a..00000000 Binary files a/PR_400/images/summit/blue-mountains.jpg and /dev/null differ diff --git a/PR_400/images/summit/blue-mountains.jpg.licence b/PR_400/images/summit/blue-mountains.jpg.licence deleted file mode 100644 index 5773b0c9..00000000 --- a/PR_400/images/summit/blue-mountains.jpg.licence +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2024, Dominic Kurniawan Suryaputra - SPDX-License-Identifier: LicenseRef-PhotoLicence - # Three Sisters, Echo Point Road, Katoomba NSW, Australia - # Free to use under the Unsplash License \ No newline at end of file diff --git a/PR_400/images/summit/boat.jpg b/PR_400/images/summit/boat.jpg deleted file mode 100644 index 5f70d88d..00000000 Binary files a/PR_400/images/summit/boat.jpg and /dev/null differ diff --git a/PR_400/images/summit/boat.jpg.licence b/PR_400/images/summit/boat.jpg.licence deleted file mode 100644 index d163c7ba..00000000 --- a/PR_400/images/summit/boat.jpg.licence +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2019, Mitchell Luo - SPDX-License-Identifier: LicenseRef-PhotoLicence - # Boat, Maritime Museum Sydney - # Free to use under the Unsplash License \ No newline at end of file diff --git a/PR_400/images/summit/bondi.jpg b/PR_400/images/summit/bondi.jpg deleted file mode 100644 index 0dad5e1d..00000000 Binary files a/PR_400/images/summit/bondi.jpg and /dev/null differ diff --git a/PR_400/images/summit/bondi.jpg.licence b/PR_400/images/summit/bondi.jpg.licence deleted file mode 100644 index 08468ab9..00000000 --- a/PR_400/images/summit/bondi.jpg.licence +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2020, Priyanka D - SPDX-License-Identifier: LicenseRef-PhotoLicence - # Cloudy day at the beach - # Free to use under the Unsplash License \ No newline at end of file diff --git a/PR_400/images/summit/boyd.jpg b/PR_400/images/summit/boyd.jpg deleted file mode 100755 index db03249f..00000000 Binary files a/PR_400/images/summit/boyd.jpg and /dev/null differ diff --git a/PR_400/images/summit/brad.jpg b/PR_400/images/summit/brad.jpg deleted file mode 100755 index dc1dc890..00000000 Binary files a/PR_400/images/summit/brad.jpg and /dev/null differ diff --git a/PR_400/images/summit/cyberagentur.png b/PR_400/images/summit/cyberagentur.png deleted file mode 100755 index 41bae4b3..00000000 Binary files a/PR_400/images/summit/cyberagentur.png and /dev/null differ diff --git a/PR_400/images/summit/cyberagentur.png.licence b/PR_400/images/summit/cyberagentur.png.licence deleted file mode 100644 index d7d30a19..00000000 --- a/PR_400/images/summit/cyberagentur.png.licence +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2022, Cyberagentur - SPDX-License-Identifier: LicenseRef-PhotoLicence \ No newline at end of file diff --git a/PR_400/images/summit/darren.jpg b/PR_400/images/summit/darren.jpg deleted file mode 100644 index efe09658..00000000 Binary files a/PR_400/images/summit/darren.jpg and /dev/null differ diff --git a/PR_400/images/summit/dcofer-2022-2-small.jpg b/PR_400/images/summit/dcofer-2022-2-small.jpg deleted file mode 100644 index 18d02a2a..00000000 Binary files a/PR_400/images/summit/dcofer-2022-2-small.jpg and /dev/null differ diff --git a/PR_400/images/summit/everton.jpg b/PR_400/images/summit/everton.jpg deleted file mode 100755 index 2cc7e4bf..00000000 Binary files a/PR_400/images/summit/everton.jpg and /dev/null differ diff --git a/PR_400/images/summit/gernot.jpg b/PR_400/images/summit/gernot.jpg deleted file mode 100755 index 2b6b3352..00000000 Binary files a/PR_400/images/summit/gernot.jpg and /dev/null differ diff --git a/PR_400/images/summit/indan.jpg b/PR_400/images/summit/indan.jpg deleted file mode 100755 index eafa5e79..00000000 Binary files a/PR_400/images/summit/indan.jpg and /dev/null differ diff --git a/PR_400/images/summit/john-h.jpg b/PR_400/images/summit/john-h.jpg deleted file mode 100644 index fee58086..00000000 Binary files a/PR_400/images/summit/john-h.jpg and /dev/null differ diff --git a/PR_400/images/summit/john-l.jpg b/PR_400/images/summit/john-l.jpg deleted file mode 100755 index fc87268d..00000000 Binary files a/PR_400/images/summit/john-l.jpg and /dev/null differ diff --git a/PR_400/images/summit/juliana.jpeg b/PR_400/images/summit/juliana.jpeg deleted file mode 100755 index e02cfbd8..00000000 Binary files a/PR_400/images/summit/juliana.jpeg and /dev/null differ diff --git a/PR_400/images/summit/kathleen.jpg b/PR_400/images/summit/kathleen.jpg deleted file mode 100755 index 101abddc..00000000 Binary files a/PR_400/images/summit/kathleen.jpg and /dev/null differ diff --git a/PR_400/images/summit/lucy.jpg b/PR_400/images/summit/lucy.jpg deleted file mode 100755 index 39adaec9..00000000 Binary files a/PR_400/images/summit/lucy.jpg and /dev/null differ diff --git a/PR_400/images/summit/matthew.jpg b/PR_400/images/summit/matthew.jpg deleted file mode 100644 index d15aeefa..00000000 Binary files a/PR_400/images/summit/matthew.jpg and /dev/null differ diff --git a/PR_400/images/summit/michal.jpg b/PR_400/images/summit/michal.jpg deleted file mode 100755 index 5034ddba..00000000 Binary files a/PR_400/images/summit/michal.jpg and /dev/null differ diff --git a/PR_400/images/summit/nick.jpg b/PR_400/images/summit/nick.jpg deleted file mode 100644 index 588faa1c..00000000 Binary files a/PR_400/images/summit/nick.jpg and /dev/null differ diff --git a/PR_400/images/summit/ning2.png b/PR_400/images/summit/ning2.png deleted file mode 100644 index 61165cc0..00000000 Binary files a/PR_400/images/summit/ning2.png and /dev/null differ diff --git a/PR_400/images/summit/opera-house.png b/PR_400/images/summit/opera-house.png deleted file mode 100644 index f3bc8648..00000000 Binary files a/PR_400/images/summit/opera-house.png and /dev/null differ diff --git a/PR_400/images/summit/opera-house.png.licence b/PR_400/images/summit/opera-house.png.licence deleted file mode 100644 index 1dbfb04c..00000000 --- a/PR_400/images/summit/opera-house.png.licence +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2019, Kay - SPDX-License-Identifier: LicenseRef-PhotoLicence - # Opera House - # Free to use under the Unsplash License \ No newline at end of file diff --git a/PR_400/images/summit/paul.jpg b/PR_400/images/summit/paul.jpg deleted file mode 100755 index 436aaf21..00000000 Binary files a/PR_400/images/summit/paul.jpg and /dev/null differ diff --git a/PR_400/images/summit/pc22.png b/PR_400/images/summit/pc22.png deleted file mode 100644 index 9d0e664f..00000000 Binary files a/PR_400/images/summit/pc22.png and /dev/null differ diff --git a/PR_400/images/summit/perry.jpg b/PR_400/images/summit/perry.jpg deleted file mode 100644 index 50c7db19..00000000 Binary files a/PR_400/images/summit/perry.jpg and /dev/null differ diff --git a/PR_400/images/summit/person-pc.svg b/PR_400/images/summit/person-pc.svg deleted file mode 100755 index 762a1408..00000000 --- a/PR_400/images/summit/person-pc.svg +++ /dev/null @@ -1,100 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/images/summit/program-at-a-glance-2023.svg b/PR_400/images/summit/program-at-a-glance-2023.svg deleted file mode 100644 index 27e2b6c8..00000000 --- a/PR_400/images/summit/program-at-a-glance-2023.svg +++ /dev/null @@ -1,714 +0,0 @@ - - - -Day 1Sep 19th, 2023Day 2Sep 20th, 2023Day 3Sep 21st, 2023KeynoteKeynoteSIGs & CommunityTalkTalkTalkShort TalksTalkTalkTalkTalkBoFBoFTalkTalkTalkTalkBoFBoFTalkPanelTalkTalkTrainingTalkTalkShort TalksTalkShort Talks diff --git a/PR_400/images/summit/program-at-a-glance-2024.svg b/PR_400/images/summit/program-at-a-glance-2024.svg deleted file mode 100644 index ee1d6269..00000000 --- a/PR_400/images/summit/program-at-a-glance-2024.svg +++ /dev/null @@ -1,1313 +0,0 @@ - - - -Weekend of Oct 12 & 13, 2024Mon Oct 14, 2024Day 1Tue Oct 15, 2024Day 2Wed Oct 16, 2024Day 3Thu Oct 17, 2024Day 4Fri Oct 18, 2024KeynotePanelKeynoteTraining day@UNSW (TBC)Lions OSRustTalksTalksTalksPotentialbush walking led by Gernot Heiser (contact him if interested)InformalSocial Activitiesorganised by local Sydney-siders. Stay tunedTalksTalksBoFsTalksTalksBoFsReceptionDinner diff --git a/PR_400/images/summit/program.svg b/PR_400/images/summit/program.svg deleted file mode 100644 index 1411f825..00000000 --- a/PR_400/images/summit/program.svg +++ /dev/null @@ -1,1576 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/images/summit/robbie.png b/PR_400/images/summit/robbie.png deleted file mode 100644 index c0912d06..00000000 Binary files a/PR_400/images/summit/robbie.png and /dev/null differ diff --git a/PR_400/images/summit/sam-security-photo.jpg b/PR_400/images/summit/sam-security-photo.jpg deleted file mode 100755 index a34667a7..00000000 Binary files a/PR_400/images/summit/sam-security-photo.jpg and /dev/null differ diff --git a/PR_400/images/summit/sel4_summit_2022.svg b/PR_400/images/summit/sel4_summit_2022.svg deleted file mode 100755 index 3bc2ee76..00000000 --- a/PR_400/images/summit/sel4_summit_2022.svg +++ /dev/null @@ -1,286 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/images/summit/sel4_summit_2023.svg b/PR_400/images/summit/sel4_summit_2023.svg deleted file mode 100755 index 388e53cd..00000000 --- a/PR_400/images/summit/sel4_summit_2023.svg +++ /dev/null @@ -1,310 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/images/summit/sel4_summit_2024.svg b/PR_400/images/summit/sel4_summit_2024.svg deleted file mode 100755 index f5ae45c3..00000000 --- a/PR_400/images/summit/sel4_summit_2024.svg +++ /dev/null @@ -1,297 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/PR_400/images/summit/sid.jpg b/PR_400/images/summit/sid.jpg deleted file mode 100755 index 6a002baa..00000000 Binary files a/PR_400/images/summit/sid.jpg and /dev/null differ diff --git a/PR_400/images/summit/sydney-harbour.jpg b/PR_400/images/summit/sydney-harbour.jpg deleted file mode 100755 index d10da51d..00000000 Binary files a/PR_400/images/summit/sydney-harbour.jpg and /dev/null differ diff --git a/PR_400/images/summit/ticky.jpg b/PR_400/images/summit/ticky.jpg deleted file mode 100755 index b45bfff3..00000000 Binary files a/PR_400/images/summit/ticky.jpg and /dev/null differ diff --git a/PR_400/images/summit/todd.jpg b/PR_400/images/summit/todd.jpg deleted file mode 100644 index 7d0c5275..00000000 Binary files a/PR_400/images/summit/todd.jpg and /dev/null differ diff --git a/PR_400/images/support.png b/PR_400/images/support.png deleted file mode 100644 index 8c8c3036..00000000 Binary files a/PR_400/images/support.png and /dev/null differ diff --git a/PR_400/images/support.png.license b/PR_400/images/support.png.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/support.png.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/trusted.svg b/PR_400/images/trusted.svg deleted file mode 100644 index 0c85277f..00000000 --- a/PR_400/images/trusted.svg +++ /dev/null @@ -1,206 +0,0 @@ - - - - diff --git a/PR_400/images/trusted.svg.license b/PR_400/images/trusted.svg.license deleted file mode 100644 index 4b45c657..00000000 --- a/PR_400/images/trusted.svg.license +++ /dev/null @@ -1,2 +0,0 @@ -Copyright 2020 CSIRO's Data61 -SPDX-License-Identifier: CC-BY-SA-4.0 diff --git a/PR_400/images/tsc/anna.png b/PR_400/images/tsc/anna.png deleted file mode 100644 index 81027850..00000000 Binary files a/PR_400/images/tsc/anna.png and /dev/null differ diff --git a/PR_400/images/tsc/corey.jpg b/PR_400/images/tsc/corey.jpg deleted file mode 100644 index 1564bf5f..00000000 Binary files a/PR_400/images/tsc/corey.jpg and /dev/null differ diff --git a/PR_400/images/tsc/ihor.jpg b/PR_400/images/tsc/ihor.jpg deleted file mode 100644 index 67c04ad1..00000000 Binary files a/PR_400/images/tsc/ihor.jpg and /dev/null differ diff --git a/PR_400/images/tsc/kent.jpg b/PR_400/images/tsc/kent.jpg deleted file mode 100644 index 9f6716af..00000000 Binary files a/PR_400/images/tsc/kent.jpg and /dev/null differ diff --git a/PR_400/images/tsc/kevin.jpg b/PR_400/images/tsc/kevin.jpg deleted file mode 100644 index 35baad5a..00000000 Binary files a/PR_400/images/tsc/kevin.jpg and /dev/null differ diff --git a/PR_400/images/tsc/matthew.jpg b/PR_400/images/tsc/matthew.jpg deleted file mode 100644 index d15aeefa..00000000 Binary files a/PR_400/images/tsc/matthew.jpg and /dev/null differ diff --git a/PR_400/images/tsc/rafal.jpg b/PR_400/images/tsc/rafal.jpg deleted file mode 100644 index 2dea7fe5..00000000 Binary files a/PR_400/images/tsc/rafal.jpg and /dev/null differ diff --git a/PR_400/images/tsc/yanyan.jpg b/PR_400/images/tsc/yanyan.jpg deleted file mode 100644 index 56d55f66..00000000 Binary files a/PR_400/images/tsc/yanyan.jpg and /dev/null differ diff --git a/PR_400/index.html b/PR_400/index.html deleted file mode 100644 index 6225ceae..00000000 --- a/PR_400/index.html +++ /dev/null @@ -1,323 +0,0 @@ - - - - - - Home | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - seL4 - -

The seL4® Microkernel

-

- Security is no excuse for bad performance -

-
- The benchmark for performance.
- The world's most highly assured OS kernel.
- Open source & community-supported under the seL4 Foundation. -
- - - -
-
-
- News -
- -
-
    -
  • - - 06 Sep 2024: Welcome Kry10, Gold sponsor of the seL4 Summit 2024 - -
  • - -
  • - - 16 Aug 2024: Welcome Collins, Bronze sponsor of the seL4 Summit 2024 - -
  • - -
  • - - 14 Aug 2024: Welcome TII, Bronze sponsor of the seL4 Summit 2024 - -
  • - -
  • - more... -
  • -
-
-
-
-
- -
-
- -
- seL4 -
-
- What is seL4? -
-
- The world’s most high-assured operating system kernel -
-
- -
- -
- seL4 Foundation -
-
- seL4 Foundation -
-
- Open source foundation for seL4 and its ecosystem. Want to join? -
-
- -
- -
- Contacts -
-
- Stay in touch -
-
- Mailing lists, blog, contacts, chat -
-
- -
- -
- Contribute -
-
- Commercial Support -
-
- Endorsed service providers for seL4 -
-
- -
- -
- seL4 quadcopter -
-
- Use -
-
- Build or retrofit your product to run on seL4 -
-
- - -
- -
- Learn -
-
- Learn -
-
- Tutorials, documentation, courses -
-
- - -
- -
- Support -
-
- Support seL4 -
-
- Funding the next big steps for the seL4 project -
-
- -
- -
- Branding -
-
- The seL4 Trademark -
-
- Compliance rules and promoting the brand -
-
- -
- -
- seL4 Summit -
-
- seL4 Summit -
-
- The annual summit organised by the seL4 Foundation. -
-
- -
- -
- Contribute -
-
- Contribute -
-
- Contributing code, documentation, proofs -
-
- -
- -
- More info -
-
- Want to know more? -
-
- Research, roadmap, FAQ -
-
- -
- -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/js/bootstrap.min.js b/PR_400/js/bootstrap.min.js deleted file mode 100644 index eb0a8b41..00000000 --- a/PR_400/js/bootstrap.min.js +++ /dev/null @@ -1,6 +0,0 @@ -/*! - * Bootstrap v3.4.1 (https://getbootstrap.com/) - * Copyright 2011-2019 Twitter, Inc. - * Licensed under the MIT license - */ -if("undefined"==typeof jQuery)throw new Error("Bootstrap's JavaScript requires jQuery");!function(t){"use strict";var e=jQuery.fn.jquery.split(" ")[0].split(".");if(e[0]<2&&e[1]<9||1==e[0]&&9==e[1]&&e[2]<1||3this.$items.length-1||t<0))return this.sliding?this.$element.one("slid.bs.carousel",function(){e.to(t)}):i==t?this.pause().cycle():this.slide(idocument.documentElement.clientHeight;this.$element.css({paddingLeft:!this.bodyIsOverflowing&&t?this.scrollbarWidth:"",paddingRight:this.bodyIsOverflowing&&!t?this.scrollbarWidth:""})},s.prototype.resetAdjustments=function(){this.$element.css({paddingLeft:"",paddingRight:""})},s.prototype.checkScrollbar=function(){var t=window.innerWidth;if(!t){var e=document.documentElement.getBoundingClientRect();t=e.right-Math.abs(e.left)}this.bodyIsOverflowing=document.body.clientWidth
',trigger:"hover focus",title:"",delay:0,html:!1,container:!1,viewport:{selector:"body",padding:0},sanitize:!0,sanitizeFn:null,whiteList:t},m.prototype.init=function(t,e,i){if(this.enabled=!0,this.type=t,this.$element=g(e),this.options=this.getOptions(i),this.$viewport=this.options.viewport&&g(document).find(g.isFunction(this.options.viewport)?this.options.viewport.call(this,this.$element):this.options.viewport.selector||this.options.viewport),this.inState={click:!1,hover:!1,focus:!1},this.$element[0]instanceof document.constructor&&!this.options.selector)throw new Error("`selector` option must be specified when initializing "+this.type+" on the window.document object!");for(var o=this.options.trigger.split(" "),n=o.length;n--;){var s=o[n];if("click"==s)this.$element.on("click."+this.type,this.options.selector,g.proxy(this.toggle,this));else if("manual"!=s){var a="hover"==s?"mouseenter":"focusin",r="hover"==s?"mouseleave":"focusout";this.$element.on(a+"."+this.type,this.options.selector,g.proxy(this.enter,this)),this.$element.on(r+"."+this.type,this.options.selector,g.proxy(this.leave,this))}}this.options.selector?this._options=g.extend({},this.options,{trigger:"manual",selector:""}):this.fixTitle()},m.prototype.getDefaults=function(){return m.DEFAULTS},m.prototype.getOptions=function(t){var e=this.$element.data();for(var i in e)e.hasOwnProperty(i)&&-1!==g.inArray(i,o)&&delete e[i];return(t=g.extend({},this.getDefaults(),e,t)).delay&&"number"==typeof t.delay&&(t.delay={show:t.delay,hide:t.delay}),t.sanitize&&(t.template=n(t.template,t.whiteList,t.sanitizeFn)),t},m.prototype.getDelegateOptions=function(){var i={},o=this.getDefaults();return this._options&&g.each(this._options,function(t,e){o[t]!=e&&(i[t]=e)}),i},m.prototype.enter=function(t){var e=t instanceof this.constructor?t:g(t.currentTarget).data("bs."+this.type);if(e||(e=new this.constructor(t.currentTarget,this.getDelegateOptions()),g(t.currentTarget).data("bs."+this.type,e)),t instanceof g.Event&&(e.inState["focusin"==t.type?"focus":"hover"]=!0),e.tip().hasClass("in")||"in"==e.hoverState)e.hoverState="in";else{if(clearTimeout(e.timeout),e.hoverState="in",!e.options.delay||!e.options.delay.show)return e.show();e.timeout=setTimeout(function(){"in"==e.hoverState&&e.show()},e.options.delay.show)}},m.prototype.isInStateTrue=function(){for(var t in this.inState)if(this.inState[t])return!0;return!1},m.prototype.leave=function(t){var e=t instanceof this.constructor?t:g(t.currentTarget).data("bs."+this.type);if(e||(e=new this.constructor(t.currentTarget,this.getDelegateOptions()),g(t.currentTarget).data("bs."+this.type,e)),t instanceof g.Event&&(e.inState["focusout"==t.type?"focus":"hover"]=!1),!e.isInStateTrue()){if(clearTimeout(e.timeout),e.hoverState="out",!e.options.delay||!e.options.delay.hide)return e.hide();e.timeout=setTimeout(function(){"out"==e.hoverState&&e.hide()},e.options.delay.hide)}},m.prototype.show=function(){var t=g.Event("show.bs."+this.type);if(this.hasContent()&&this.enabled){this.$element.trigger(t);var e=g.contains(this.$element[0].ownerDocument.documentElement,this.$element[0]);if(t.isDefaultPrevented()||!e)return;var i=this,o=this.tip(),n=this.getUID(this.type);this.setContent(),o.attr("id",n),this.$element.attr("aria-describedby",n),this.options.animation&&o.addClass("fade");var s="function"==typeof this.options.placement?this.options.placement.call(this,o[0],this.$element[0]):this.options.placement,a=/\s?auto?\s?/i,r=a.test(s);r&&(s=s.replace(a,"")||"top"),o.detach().css({top:0,left:0,display:"block"}).addClass(s).data("bs."+this.type,this),this.options.container?o.appendTo(g(document).find(this.options.container)):o.insertAfter(this.$element),this.$element.trigger("inserted.bs."+this.type);var l=this.getPosition(),h=o[0].offsetWidth,d=o[0].offsetHeight;if(r){var p=s,c=this.getPosition(this.$viewport);s="bottom"==s&&l.bottom+d>c.bottom?"top":"top"==s&&l.top-dc.width?"left":"left"==s&&l.left-ha.top+a.height&&(n.top=a.top+a.height-l)}else{var h=e.left-s,d=e.left+s+i;ha.right&&(n.left=a.left+a.width-d)}return n},m.prototype.getTitle=function(){var t=this.$element,e=this.options;return t.attr("data-original-title")||("function"==typeof e.title?e.title.call(t[0]):e.title)},m.prototype.getUID=function(t){for(;t+=~~(1e6*Math.random()),document.getElementById(t););return t},m.prototype.tip=function(){if(!this.$tip&&(this.$tip=g(this.options.template),1!=this.$tip.length))throw new Error(this.type+" `template` option must consist of exactly 1 top-level element!");return this.$tip},m.prototype.arrow=function(){return this.$arrow=this.$arrow||this.tip().find(".tooltip-arrow")},m.prototype.enable=function(){this.enabled=!0},m.prototype.disable=function(){this.enabled=!1},m.prototype.toggleEnabled=function(){this.enabled=!this.enabled},m.prototype.toggle=function(t){var e=this;t&&((e=g(t.currentTarget).data("bs."+this.type))||(e=new this.constructor(t.currentTarget,this.getDelegateOptions()),g(t.currentTarget).data("bs."+this.type,e))),t?(e.inState.click=!e.inState.click,e.isInStateTrue()?e.enter(e):e.leave(e)):e.tip().hasClass("in")?e.leave(e):e.enter(e)},m.prototype.destroy=function(){var t=this;clearTimeout(this.timeout),this.hide(function(){t.$element.off("."+t.type).removeData("bs."+t.type),t.$tip&&t.$tip.detach(),t.$tip=null,t.$arrow=null,t.$viewport=null,t.$element=null})},m.prototype.sanitizeHtml=function(t){return n(t,this.options.whiteList,this.options.sanitizeFn)};var e=g.fn.tooltip;g.fn.tooltip=function i(o){return this.each(function(){var t=g(this),e=t.data("bs.tooltip"),i="object"==typeof o&&o;!e&&/destroy|hide/.test(o)||(e||t.data("bs.tooltip",e=new m(this,i)),"string"==typeof o&&e[o]())})},g.fn.tooltip.Constructor=m,g.fn.tooltip.noConflict=function(){return g.fn.tooltip=e,this}}(jQuery),function(n){"use strict";var s=function(t,e){this.init("popover",t,e)};if(!n.fn.tooltip)throw new Error("Popover requires tooltip.js");s.VERSION="3.4.1",s.DEFAULTS=n.extend({},n.fn.tooltip.Constructor.DEFAULTS,{placement:"right",trigger:"click",content:"",template:''}),((s.prototype=n.extend({},n.fn.tooltip.Constructor.prototype)).constructor=s).prototype.getDefaults=function(){return s.DEFAULTS},s.prototype.setContent=function(){var t=this.tip(),e=this.getTitle(),i=this.getContent();if(this.options.html){var o=typeof i;this.options.sanitize&&(e=this.sanitizeHtml(e),"string"===o&&(i=this.sanitizeHtml(i))),t.find(".popover-title").html(e),t.find(".popover-content").children().detach().end()["string"===o?"html":"append"](i)}else t.find(".popover-title").text(e),t.find(".popover-content").children().detach().end().text(i);t.removeClass("fade top bottom left right in"),t.find(".popover-title").html()||t.find(".popover-title").hide()},s.prototype.hasContent=function(){return this.getTitle()||this.getContent()},s.prototype.getContent=function(){var t=this.$element,e=this.options;return t.attr("data-content")||("function"==typeof e.content?e.content.call(t[0]):e.content)},s.prototype.arrow=function(){return this.$arrow=this.$arrow||this.tip().find(".arrow")};var t=n.fn.popover;n.fn.popover=function e(o){return this.each(function(){var t=n(this),e=t.data("bs.popover"),i="object"==typeof o&&o;!e&&/destroy|hide/.test(o)||(e||t.data("bs.popover",e=new s(this,i)),"string"==typeof o&&e[o]())})},n.fn.popover.Constructor=s,n.fn.popover.noConflict=function(){return n.fn.popover=t,this}}(jQuery),function(s){"use strict";function n(t,e){this.$body=s(document.body),this.$scrollElement=s(t).is(document.body)?s(window):s(t),this.options=s.extend({},n.DEFAULTS,e),this.selector=(this.options.target||"")+" .nav li > a",this.offsets=[],this.targets=[],this.activeTarget=null,this.scrollHeight=0,this.$scrollElement.on("scroll.bs.scrollspy",s.proxy(this.process,this)),this.refresh(),this.process()}function e(o){return this.each(function(){var t=s(this),e=t.data("bs.scrollspy"),i="object"==typeof o&&o;e||t.data("bs.scrollspy",e=new n(this,i)),"string"==typeof o&&e[o]()})}n.VERSION="3.4.1",n.DEFAULTS={offset:10},n.prototype.getScrollHeight=function(){return this.$scrollElement[0].scrollHeight||Math.max(this.$body[0].scrollHeight,document.documentElement.scrollHeight)},n.prototype.refresh=function(){var t=this,o="offset",n=0;this.offsets=[],this.targets=[],this.scrollHeight=this.getScrollHeight(),s.isWindow(this.$scrollElement[0])||(o="position",n=this.$scrollElement.scrollTop()),this.$body.find(this.selector).map(function(){var t=s(this),e=t.data("target")||t.attr("href"),i=/^#./.test(e)&&s(e);return i&&i.length&&i.is(":visible")&&[[i[o]().top+n,e]]||null}).sort(function(t,e){return t[0]-e[0]}).each(function(){t.offsets.push(this[0]),t.targets.push(this[1])})},n.prototype.process=function(){var t,e=this.$scrollElement.scrollTop()+this.options.offset,i=this.getScrollHeight(),o=this.options.offset+i-this.$scrollElement.height(),n=this.offsets,s=this.targets,a=this.activeTarget;if(this.scrollHeight!=i&&this.refresh(),o<=e)return a!=(t=s[s.length-1])&&this.activate(t);if(a&&e=n[t]&&(n[t+1]===undefined||e .active"),n=i&&r.support.transition&&(o.length&&o.hasClass("fade")||!!e.find("> .fade").length);function s(){o.removeClass("active").find("> .dropdown-menu > .active").removeClass("active").end().find('[data-toggle="tab"]').attr("aria-expanded",!1),t.addClass("active").find('[data-toggle="tab"]').attr("aria-expanded",!0),n?(t[0].offsetWidth,t.addClass("in")):t.removeClass("fade"),t.parent(".dropdown-menu").length&&t.closest("li.dropdown").addClass("active").end().find('[data-toggle="tab"]').attr("aria-expanded",!0),i&&i()}o.length&&n?o.one("bsTransitionEnd",s).emulateTransitionEnd(a.TRANSITION_DURATION):s(),o.removeClass("in")};var t=r.fn.tab;r.fn.tab=e,r.fn.tab.Constructor=a,r.fn.tab.noConflict=function(){return r.fn.tab=t,this};var i=function(t){t.preventDefault(),e.call(r(this),"show")};r(document).on("click.bs.tab.data-api",'[data-toggle="tab"]',i).on("click.bs.tab.data-api",'[data-toggle="pill"]',i)}(jQuery),function(l){"use strict";var h=function(t,e){this.options=l.extend({},h.DEFAULTS,e);var i=this.options.target===h.DEFAULTS.target?l(this.options.target):l(document).find(this.options.target);this.$target=i.on("scroll.bs.affix.data-api",l.proxy(this.checkPosition,this)).on("click.bs.affix.data-api",l.proxy(this.checkPositionWithEventLoop,this)),this.$element=l(t),this.affixed=null,this.unpin=null,this.pinnedOffset=null,this.checkPosition()};function i(o){return this.each(function(){var t=l(this),e=t.data("bs.affix"),i="object"==typeof o&&o;e||t.data("bs.affix",e=new h(this,i)),"string"==typeof o&&e[o]()})}h.VERSION="3.4.1",h.RESET="affix affix-top affix-bottom",h.DEFAULTS={offset:0,target:window},h.prototype.getState=function(t,e,i,o){var n=this.$target.scrollTop(),s=this.$element.offset(),a=this.$target.height();if(null!=i&&"top"==this.affixed)return n+~]|"+M+")"+M+"*"),U=new RegExp(M+"|>"),X=new RegExp(F),V=new RegExp("^"+I+"$"),G={ID:new RegExp("^#("+I+")"),CLASS:new RegExp("^\\.("+I+")"),TAG:new RegExp("^("+I+"|[*])"),ATTR:new RegExp("^"+W),PSEUDO:new RegExp("^"+F),CHILD:new RegExp("^:(only|first|last|nth|nth-last)-(child|of-type)(?:\\("+M+"*(even|odd|(([+-]|)(\\d*)n|)"+M+"*(?:([+-]|)"+M+"*(\\d+)|))"+M+"*\\)|)","i"),bool:new RegExp("^(?:"+R+")$","i"),needsContext:new RegExp("^"+M+"*[>+~]|:(even|odd|eq|gt|lt|nth|first|last)(?:\\("+M+"*((?:-\\d)?\\d*)"+M+"*\\)|)(?=[^-]|$)","i")},Y=/HTML$/i,Q=/^(?:input|select|textarea|button)$/i,J=/^h\d$/i,K=/^[^{]+\{\s*\[native \w/,Z=/^(?:#([\w-]+)|(\w+)|\.([\w-]+))$/,ee=/[+~]/,te=new RegExp("\\\\[\\da-fA-F]{1,6}"+M+"?|\\\\([^\\r\\n\\f])","g"),ne=function(e,t){var n="0x"+e.slice(1)-65536;return t||(n<0?String.fromCharCode(n+65536):String.fromCharCode(n>>10|55296,1023&n|56320))},re=/([\0-\x1f\x7f]|^-?\d)|^-$|[^\0-\x1f\x7f-\uFFFF\w-]/g,ie=function(e,t){return t?"\0"===e?"\ufffd":e.slice(0,-1)+"\\"+e.charCodeAt(e.length-1).toString(16)+" ":"\\"+e},oe=function(){T()},ae=be(function(e){return!0===e.disabled&&"fieldset"===e.nodeName.toLowerCase()},{dir:"parentNode",next:"legend"});try{H.apply(t=O.call(p.childNodes),p.childNodes),t[p.childNodes.length].nodeType}catch(e){H={apply:t.length?function(e,t){L.apply(e,O.call(t))}:function(e,t){var n=e.length,r=0;while(e[n++]=t[r++]);e.length=n-1}}}function se(t,e,n,r){var i,o,a,s,u,l,c,f=e&&e.ownerDocument,p=e?e.nodeType:9;if(n=n||[],"string"!=typeof t||!t||1!==p&&9!==p&&11!==p)return n;if(!r&&(T(e),e=e||C,E)){if(11!==p&&(u=Z.exec(t)))if(i=u[1]){if(9===p){if(!(a=e.getElementById(i)))return n;if(a.id===i)return n.push(a),n}else if(f&&(a=f.getElementById(i))&&v(e,a)&&a.id===i)return n.push(a),n}else{if(u[2])return H.apply(n,e.getElementsByTagName(t)),n;if((i=u[3])&&d.getElementsByClassName&&e.getElementsByClassName)return H.apply(n,e.getElementsByClassName(i)),n}if(d.qsa&&!N[t+" "]&&(!y||!y.test(t))&&(1!==p||"object"!==e.nodeName.toLowerCase())){if(c=t,f=e,1===p&&(U.test(t)||z.test(t))){(f=ee.test(t)&&ve(e.parentNode)||e)===e&&d.scope||((s=e.getAttribute("id"))?s=s.replace(re,ie):e.setAttribute("id",s=S)),o=(l=h(t)).length;while(o--)l[o]=(s?"#"+s:":scope")+" "+xe(l[o]);c=l.join(",")}try{return H.apply(n,f.querySelectorAll(c)),n}catch(e){N(t,!0)}finally{s===S&&e.removeAttribute("id")}}}return g(t.replace(B,"$1"),e,n,r)}function ue(){var r=[];return function e(t,n){return r.push(t+" ")>b.cacheLength&&delete e[r.shift()],e[t+" "]=n}}function le(e){return e[S]=!0,e}function ce(e){var t=C.createElement("fieldset");try{return!!e(t)}catch(e){return!1}finally{t.parentNode&&t.parentNode.removeChild(t),t=null}}function fe(e,t){var n=e.split("|"),r=n.length;while(r--)b.attrHandle[n[r]]=t}function pe(e,t){var n=t&&e,r=n&&1===e.nodeType&&1===t.nodeType&&e.sourceIndex-t.sourceIndex;if(r)return r;if(n)while(n=n.nextSibling)if(n===t)return-1;return e?1:-1}function de(t){return function(e){return"input"===e.nodeName.toLowerCase()&&e.type===t}}function he(n){return function(e){var t=e.nodeName.toLowerCase();return("input"===t||"button"===t)&&e.type===n}}function ge(t){return function(e){return"form"in e?e.parentNode&&!1===e.disabled?"label"in e?"label"in e.parentNode?e.parentNode.disabled===t:e.disabled===t:e.isDisabled===t||e.isDisabled!==!t&&ae(e)===t:e.disabled===t:"label"in e&&e.disabled===t}}function ye(a){return le(function(o){return o=+o,le(function(e,t){var n,r=a([],e.length,o),i=r.length;while(i--)e[n=r[i]]&&(e[n]=!(t[n]=e[n]))})})}function ve(e){return e&&"undefined"!=typeof e.getElementsByTagName&&e}for(e in d=se.support={},i=se.isXML=function(e){var t=e&&e.namespaceURI,n=e&&(e.ownerDocument||e).documentElement;return!Y.test(t||n&&n.nodeName||"HTML")},T=se.setDocument=function(e){var t,n,r=e?e.ownerDocument||e:p;return r!=C&&9===r.nodeType&&r.documentElement&&(a=(C=r).documentElement,E=!i(C),p!=C&&(n=C.defaultView)&&n.top!==n&&(n.addEventListener?n.addEventListener("unload",oe,!1):n.attachEvent&&n.attachEvent("onunload",oe)),d.scope=ce(function(e){return a.appendChild(e).appendChild(C.createElement("div")),"undefined"!=typeof e.querySelectorAll&&!e.querySelectorAll(":scope fieldset div").length}),d.cssHas=ce(function(){try{return C.querySelector(":has(*,:jqfake)"),!1}catch(e){return!0}}),d.attributes=ce(function(e){return e.className="i",!e.getAttribute("className")}),d.getElementsByTagName=ce(function(e){return e.appendChild(C.createComment("")),!e.getElementsByTagName("*").length}),d.getElementsByClassName=K.test(C.getElementsByClassName),d.getById=ce(function(e){return a.appendChild(e).id=S,!C.getElementsByName||!C.getElementsByName(S).length}),d.getById?(b.filter.ID=function(e){var t=e.replace(te,ne);return function(e){return e.getAttribute("id")===t}},b.find.ID=function(e,t){if("undefined"!=typeof t.getElementById&&E){var n=t.getElementById(e);return n?[n]:[]}}):(b.filter.ID=function(e){var n=e.replace(te,ne);return function(e){var t="undefined"!=typeof e.getAttributeNode&&e.getAttributeNode("id");return t&&t.value===n}},b.find.ID=function(e,t){if("undefined"!=typeof t.getElementById&&E){var n,r,i,o=t.getElementById(e);if(o){if((n=o.getAttributeNode("id"))&&n.value===e)return[o];i=t.getElementsByName(e),r=0;while(o=i[r++])if((n=o.getAttributeNode("id"))&&n.value===e)return[o]}return[]}}),b.find.TAG=d.getElementsByTagName?function(e,t){return"undefined"!=typeof t.getElementsByTagName?t.getElementsByTagName(e):d.qsa?t.querySelectorAll(e):void 0}:function(e,t){var n,r=[],i=0,o=t.getElementsByTagName(e);if("*"===e){while(n=o[i++])1===n.nodeType&&r.push(n);return r}return o},b.find.CLASS=d.getElementsByClassName&&function(e,t){if("undefined"!=typeof t.getElementsByClassName&&E)return t.getElementsByClassName(e)},s=[],y=[],(d.qsa=K.test(C.querySelectorAll))&&(ce(function(e){var t;a.appendChild(e).innerHTML="",e.querySelectorAll("[msallowcapture^='']").length&&y.push("[*^$]="+M+"*(?:''|\"\")"),e.querySelectorAll("[selected]").length||y.push("\\["+M+"*(?:value|"+R+")"),e.querySelectorAll("[id~="+S+"-]").length||y.push("~="),(t=C.createElement("input")).setAttribute("name",""),e.appendChild(t),e.querySelectorAll("[name='']").length||y.push("\\["+M+"*name"+M+"*="+M+"*(?:''|\"\")"),e.querySelectorAll(":checked").length||y.push(":checked"),e.querySelectorAll("a#"+S+"+*").length||y.push(".#.+[+~]"),e.querySelectorAll("\\\f"),y.push("[\\r\\n\\f]")}),ce(function(e){e.innerHTML="";var t=C.createElement("input");t.setAttribute("type","hidden"),e.appendChild(t).setAttribute("name","D"),e.querySelectorAll("[name=d]").length&&y.push("name"+M+"*[*^$|!~]?="),2!==e.querySelectorAll(":enabled").length&&y.push(":enabled",":disabled"),a.appendChild(e).disabled=!0,2!==e.querySelectorAll(":disabled").length&&y.push(":enabled",":disabled"),e.querySelectorAll("*,:x"),y.push(",.*:")})),(d.matchesSelector=K.test(c=a.matches||a.webkitMatchesSelector||a.mozMatchesSelector||a.oMatchesSelector||a.msMatchesSelector))&&ce(function(e){d.disconnectedMatch=c.call(e,"*"),c.call(e,"[s!='']:x"),s.push("!=",F)}),d.cssHas||y.push(":has"),y=y.length&&new RegExp(y.join("|")),s=s.length&&new RegExp(s.join("|")),t=K.test(a.compareDocumentPosition),v=t||K.test(a.contains)?function(e,t){var n=9===e.nodeType&&e.documentElement||e,r=t&&t.parentNode;return e===r||!(!r||1!==r.nodeType||!(n.contains?n.contains(r):e.compareDocumentPosition&&16&e.compareDocumentPosition(r)))}:function(e,t){if(t)while(t=t.parentNode)if(t===e)return!0;return!1},j=t?function(e,t){if(e===t)return l=!0,0;var n=!e.compareDocumentPosition-!t.compareDocumentPosition;return n||(1&(n=(e.ownerDocument||e)==(t.ownerDocument||t)?e.compareDocumentPosition(t):1)||!d.sortDetached&&t.compareDocumentPosition(e)===n?e==C||e.ownerDocument==p&&v(p,e)?-1:t==C||t.ownerDocument==p&&v(p,t)?1:u?P(u,e)-P(u,t):0:4&n?-1:1)}:function(e,t){if(e===t)return l=!0,0;var n,r=0,i=e.parentNode,o=t.parentNode,a=[e],s=[t];if(!i||!o)return e==C?-1:t==C?1:i?-1:o?1:u?P(u,e)-P(u,t):0;if(i===o)return pe(e,t);n=e;while(n=n.parentNode)a.unshift(n);n=t;while(n=n.parentNode)s.unshift(n);while(a[r]===s[r])r++;return r?pe(a[r],s[r]):a[r]==p?-1:s[r]==p?1:0}),C},se.matches=function(e,t){return se(e,null,null,t)},se.matchesSelector=function(e,t){if(T(e),d.matchesSelector&&E&&!N[t+" "]&&(!s||!s.test(t))&&(!y||!y.test(t)))try{var n=c.call(e,t);if(n||d.disconnectedMatch||e.document&&11!==e.document.nodeType)return n}catch(e){N(t,!0)}return 0":{dir:"parentNode",first:!0}," ":{dir:"parentNode"},"+":{dir:"previousSibling",first:!0},"~":{dir:"previousSibling"}},preFilter:{ATTR:function(e){return e[1]=e[1].replace(te,ne),e[3]=(e[3]||e[4]||e[5]||"").replace(te,ne),"~="===e[2]&&(e[3]=" "+e[3]+" "),e.slice(0,4)},CHILD:function(e){return e[1]=e[1].toLowerCase(),"nth"===e[1].slice(0,3)?(e[3]||se.error(e[0]),e[4]=+(e[4]?e[5]+(e[6]||1):2*("even"===e[3]||"odd"===e[3])),e[5]=+(e[7]+e[8]||"odd"===e[3])):e[3]&&se.error(e[0]),e},PSEUDO:function(e){var t,n=!e[6]&&e[2];return G.CHILD.test(e[0])?null:(e[3]?e[2]=e[4]||e[5]||"":n&&X.test(n)&&(t=h(n,!0))&&(t=n.indexOf(")",n.length-t)-n.length)&&(e[0]=e[0].slice(0,t),e[2]=n.slice(0,t)),e.slice(0,3))}},filter:{TAG:function(e){var t=e.replace(te,ne).toLowerCase();return"*"===e?function(){return!0}:function(e){return e.nodeName&&e.nodeName.toLowerCase()===t}},CLASS:function(e){var t=m[e+" "];return t||(t=new RegExp("(^|"+M+")"+e+"("+M+"|$)"))&&m(e,function(e){return t.test("string"==typeof e.className&&e.className||"undefined"!=typeof e.getAttribute&&e.getAttribute("class")||"")})},ATTR:function(n,r,i){return function(e){var t=se.attr(e,n);return null==t?"!="===r:!r||(t+="","="===r?t===i:"!="===r?t!==i:"^="===r?i&&0===t.indexOf(i):"*="===r?i&&-1:\x20\t\r\n\f]*)[\x20\t\r\n\f]*\/?>(?:<\/\1>|)$/i;function j(e,n,r){return m(n)?S.grep(e,function(e,t){return!!n.call(e,t,e)!==r}):n.nodeType?S.grep(e,function(e){return e===n!==r}):"string"!=typeof n?S.grep(e,function(e){return-1)[^>]*|#([\w-]+))$/;(S.fn.init=function(e,t,n){var r,i;if(!e)return this;if(n=n||D,"string"==typeof e){if(!(r="<"===e[0]&&">"===e[e.length-1]&&3<=e.length?[null,e,null]:q.exec(e))||!r[1]&&t)return!t||t.jquery?(t||n).find(e):this.constructor(t).find(e);if(r[1]){if(t=t instanceof S?t[0]:t,S.merge(this,S.parseHTML(r[1],t&&t.nodeType?t.ownerDocument||t:E,!0)),N.test(r[1])&&S.isPlainObject(t))for(r in t)m(this[r])?this[r](t[r]):this.attr(r,t[r]);return this}return(i=E.getElementById(r[2]))&&(this[0]=i,this.length=1),this}return e.nodeType?(this[0]=e,this.length=1,this):m(e)?void 0!==n.ready?n.ready(e):e(S):S.makeArray(e,this)}).prototype=S.fn,D=S(E);var L=/^(?:parents|prev(?:Until|All))/,H={children:!0,contents:!0,next:!0,prev:!0};function O(e,t){while((e=e[t])&&1!==e.nodeType);return e}S.fn.extend({has:function(e){var t=S(e,this),n=t.length;return this.filter(function(){for(var e=0;e\x20\t\r\n\f]*)/i,he=/^$|^module$|\/(?:java|ecma)script/i;ce=E.createDocumentFragment().appendChild(E.createElement("div")),(fe=E.createElement("input")).setAttribute("type","radio"),fe.setAttribute("checked","checked"),fe.setAttribute("name","t"),ce.appendChild(fe),v.checkClone=ce.cloneNode(!0).cloneNode(!0).lastChild.checked,ce.innerHTML="",v.noCloneChecked=!!ce.cloneNode(!0).lastChild.defaultValue,ce.innerHTML="",v.option=!!ce.lastChild;var ge={thead:[1,"","
"],col:[2,"","
"],tr:[2,"","
"],td:[3,"","
"],_default:[0,"",""]};function ye(e,t){var n;return n="undefined"!=typeof e.getElementsByTagName?e.getElementsByTagName(t||"*"):"undefined"!=typeof e.querySelectorAll?e.querySelectorAll(t||"*"):[],void 0===t||t&&A(e,t)?S.merge([e],n):n}function ve(e,t){for(var n=0,r=e.length;n",""]);var me=/<|&#?\w+;/;function xe(e,t,n,r,i){for(var o,a,s,u,l,c,f=t.createDocumentFragment(),p=[],d=0,h=e.length;d\s*$/g;function je(e,t){return A(e,"table")&&A(11!==t.nodeType?t:t.firstChild,"tr")&&S(e).children("tbody")[0]||e}function De(e){return e.type=(null!==e.getAttribute("type"))+"/"+e.type,e}function qe(e){return"true/"===(e.type||"").slice(0,5)?e.type=e.type.slice(5):e.removeAttribute("type"),e}function Le(e,t){var n,r,i,o,a,s;if(1===t.nodeType){if(Y.hasData(e)&&(s=Y.get(e).events))for(i in Y.remove(t,"handle events"),s)for(n=0,r=s[i].length;n").attr(n.scriptAttrs||{}).prop({charset:n.scriptCharset,src:n.url}).on("load error",i=function(e){r.remove(),i=null,e&&t("error"===e.type?404:200,e.type)}),E.head.appendChild(r[0])},abort:function(){i&&i()}}});var Ut,Xt=[],Vt=/(=)\?(?=&|$)|\?\?/;S.ajaxSetup({jsonp:"callback",jsonpCallback:function(){var e=Xt.pop()||S.expando+"_"+Ct.guid++;return this[e]=!0,e}}),S.ajaxPrefilter("json jsonp",function(e,t,n){var r,i,o,a=!1!==e.jsonp&&(Vt.test(e.url)?"url":"string"==typeof e.data&&0===(e.contentType||"").indexOf("application/x-www-form-urlencoded")&&Vt.test(e.data)&&"data");if(a||"jsonp"===e.dataTypes[0])return r=e.jsonpCallback=m(e.jsonpCallback)?e.jsonpCallback():e.jsonpCallback,a?e[a]=e[a].replace(Vt,"$1"+r):!1!==e.jsonp&&(e.url+=(Et.test(e.url)?"&":"?")+e.jsonp+"="+r),e.converters["script json"]=function(){return o||S.error(r+" was not called"),o[0]},e.dataTypes[0]="json",i=C[r],C[r]=function(){o=arguments},n.always(function(){void 0===i?S(C).removeProp(r):C[r]=i,e[r]&&(e.jsonpCallback=t.jsonpCallback,Xt.push(r)),o&&m(i)&&i(o[0]),o=i=void 0}),"script"}),v.createHTMLDocument=((Ut=E.implementation.createHTMLDocument("").body).innerHTML="
",2===Ut.childNodes.length),S.parseHTML=function(e,t,n){return"string"!=typeof e?[]:("boolean"==typeof t&&(n=t,t=!1),t||(v.createHTMLDocument?((r=(t=E.implementation.createHTMLDocument("")).createElement("base")).href=E.location.href,t.head.appendChild(r)):t=E),o=!n&&[],(i=N.exec(e))?[t.createElement(i[1])]:(i=xe([e],t,o),o&&o.length&&S(o).remove(),S.merge([],i.childNodes)));var r,i,o},S.fn.load=function(e,t,n){var r,i,o,a=this,s=e.indexOf(" ");return-1").append(S.parseHTML(e)).find(r):e)}).always(n&&function(e,t){a.each(function(){n.apply(this,o||[e.responseText,t,e])})}),this},S.expr.pseudos.animated=function(t){return S.grep(S.timers,function(e){return t===e.elem}).length},S.offset={setOffset:function(e,t,n){var r,i,o,a,s,u,l=S.css(e,"position"),c=S(e),f={};"static"===l&&(e.style.position="relative"),s=c.offset(),o=S.css(e,"top"),u=S.css(e,"left"),("absolute"===l||"fixed"===l)&&-1<(o+u).indexOf("auto")?(a=(r=c.position()).top,i=r.left):(a=parseFloat(o)||0,i=parseFloat(u)||0),m(t)&&(t=t.call(e,n,S.extend({},s))),null!=t.top&&(f.top=t.top-s.top+a),null!=t.left&&(f.left=t.left-s.left+i),"using"in t?t.using.call(e,f):c.css(f)}},S.fn.extend({offset:function(t){if(arguments.length)return void 0===t?this:this.each(function(e){S.offset.setOffset(this,t,e)});var e,n,r=this[0];return r?r.getClientRects().length?(e=r.getBoundingClientRect(),n=r.ownerDocument.defaultView,{top:e.top+n.pageYOffset,left:e.left+n.pageXOffset}):{top:0,left:0}:void 0},position:function(){if(this[0]){var e,t,n,r=this[0],i={top:0,left:0};if("fixed"===S.css(r,"position"))t=r.getBoundingClientRect();else{t=this.offset(),n=r.ownerDocument,e=r.offsetParent||n.documentElement;while(e&&(e===n.body||e===n.documentElement)&&"static"===S.css(e,"position"))e=e.parentNode;e&&e!==r&&1===e.nodeType&&((i=S(e).offset()).top+=S.css(e,"borderTopWidth",!0),i.left+=S.css(e,"borderLeftWidth",!0))}return{top:t.top-i.top-S.css(r,"marginTop",!0),left:t.left-i.left-S.css(r,"marginLeft",!0)}}},offsetParent:function(){return this.map(function(){var e=this.offsetParent;while(e&&"static"===S.css(e,"position"))e=e.offsetParent;return e||re})}}),S.each({scrollLeft:"pageXOffset",scrollTop:"pageYOffset"},function(t,i){var o="pageYOffset"===i;S.fn[t]=function(e){return B(this,function(e,t,n){var r;if(x(e)?r=e:9===e.nodeType&&(r=e.defaultView),void 0===n)return r?r[i]:e[t];r?r.scrollTo(o?r.pageXOffset:n,o?n:r.pageYOffset):e[t]=n},t,e,arguments.length)}}),S.each(["top","left"],function(e,n){S.cssHooks[n]=_e(v.pixelPosition,function(e,t){if(t)return t=Be(e,n),Pe.test(t)?S(e).position()[n]+"px":t})}),S.each({Height:"height",Width:"width"},function(a,s){S.each({padding:"inner"+a,content:s,"":"outer"+a},function(r,o){S.fn[o]=function(e,t){var n=arguments.length&&(r||"boolean"!=typeof e),i=r||(!0===e||!0===t?"margin":"border");return B(this,function(e,t,n){var r;return x(e)?0===o.indexOf("outer")?e["inner"+a]:e.document.documentElement["client"+a]:9===e.nodeType?(r=e.documentElement,Math.max(e.body["scroll"+a],r["scroll"+a],e.body["offset"+a],r["offset"+a],r["client"+a])):void 0===n?S.css(e,t,i):S.style(e,t,n,i)},s,n?e:void 0,n)}})}),S.each(["ajaxStart","ajaxStop","ajaxComplete","ajaxError","ajaxSuccess","ajaxSend"],function(e,t){S.fn[t]=function(e){return this.on(t,e)}}),S.fn.extend({bind:function(e,t,n){return this.on(e,null,t,n)},unbind:function(e,t){return this.off(e,null,t)},delegate:function(e,t,n,r){return this.on(t,e,n,r)},undelegate:function(e,t,n){return 1===arguments.length?this.off(e,"**"):this.off(t,e||"**",n)},hover:function(e,t){return this.mouseenter(e).mouseleave(t||e)}}),S.each("blur focus focusin focusout resize scroll click dblclick mousedown mouseup mousemove mouseover mouseout mouseenter mouseleave change select submit keydown keypress keyup contextmenu".split(" "),function(e,n){S.fn[n]=function(e,t){return 0 - - - Redirecting… - - - - -

Redirecting…

- Click here if you are not redirected. - diff --git a/PR_400/news/2020.html b/PR_400/news/2020.html deleted file mode 100644 index 987d1708..00000000 --- a/PR_400/news/2020.html +++ /dev/null @@ -1,352 +0,0 @@ - - - - - - News about seL4 and the seL4 Foundation | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - seL4 - -
-
-

- News about - seL4 - and the - seL4 Foundation — 2020 -

-
-
- News from other years: - 2020 - 2021 - 2022 - 2023 - 2024 -
-
- - -
- -

There is now a YouTube channel run by the seL4 -Foundation. It presently has two playlists, one with the recordings of the seL4 -material from this year’s UNSW Advanced Operating Systems course, and one with -seL4 Summit talks from Trustworthy Systems.

- -

More to come, enjoy.

- -
-
- - -
-seL4 logo -

Announcing the releases of seL4, CAmkES and CapDL under the seL4 Foundation. -Below you can find links to release notes with updates to other supporting -projects to come before the end of the year. Versioned Releases:

- - - -
-
- - -
- -

The 3rd seL4 Summit will -take place (virtually) on 15–18 November (US East Coast time). The program -features a tutorial and 3 days packed with great talks and panels.

- -

Presentations will be streamed according to the schedule and available for -download right after, and there will be an on-line discussion forum.

- -

Registration is only $80US

- -
-
- - -
-Adventium Labs logo -

We’re happy to announce the newest member of the seL4 Foundation: -Minneapolis-based company Adventium Labs. -Adventium Labs develops solutions for safe and secure software-intensive complex -systems, with specialties in separation architectures, model-based system -engineering, and mathematical analysis technologies. They are leveraging these -capabilities to extend seL4 into safety and security critical industries, -including medical devices, defense and commercial avionics, and industrial -control.

- -
-
- - -
-RISC-V logo -

RISC-V (RV64) is the third ISA with verified seL4. The functional correctness -proof of seL4 on the RV64 ISA has completed. Congratulations to the awesome -Proof Engineering Team of the Trustworthy Systems group on achieving this major -milestone for seL4! And many thanks to HENSOLDT Cyber for making it possible.

- -

What we have now is the refinement proof from the seL4 formal spec to the C -implementation, putting RV64 on the same level as x64 in terms of seL4 -verification. The binary verification, which extends this refinement to the -binary code of the kernel is progressing, stay tuned for more news on that in -the foreseeable future.

- -

More on this in this blog -post.

- -
-
- - -
-UNSW logo -Yet another contribution of [UNSW Sydney](https://www.unsw.edu.au) to the seL4 -community: This year Gernot Heiser is making the seL4-related videos from his -UNSW Advanced Operating Systems class freely available. You'll find them at the -[UNSW CSeLearning COMP9242 YouTube -channel](https://www.youtube.com/playlist?list=PLbSaCpDlfd6qLbEsKquVo3--0gwYBmrUV). - -At present there are the first two modules, which provide some background on -microkernels and seL4, and discuss the seL4 API. More material will show up over -the next two months. - -The complete course material, including all lecture slides, the project spec and -code, are available, as always, from the [COMP9042 web -site](https://www.cse.unsw.edu.au/~cs9242/current/). - -
-
- - -
- -

- - seL4 Whitepaper - - - The whitepaper "The seL4 Microkernel - An Introduction" provides an - introduction to and overview of seL4. We explain what seL4 is (and - is not) and explore its defining features. We explain what makes - seL4 uniquely qualified as the operating-system kernel of choice - for security- and safety- critical systems, and generally embedded - and cyber-physical systems. In particular, we explain seL4's - assurance story, its security- and safety-relevant features, and - its benchmark-setting performance. We also discuss typical usage - scenarios, including incremental cyber retrofit of legacy systems. - - You can download here. -

- -
-
- - -
-Breakaway logo -

We’re happy to announce the first new member since the launch of the seL4 -Foundation: Sydney-based company Breakaway Consulting. -Through Founder and Managing Director Ben Leslie, Breakaway comes with 20 years -of experience in L4 microkernels and systems based on various L4 kernels. Prior -to founding Breakaway, Ben was a student with what is now the TS Group, and then -VP Engineering of Open Kernel Labs. Breakaway offers consulting services on -architecture, design and implementation of seL4-based systems.

- -
-
- - -
-seL4 Foundation launch -

- The Trustworthy Systems group is - excited to announce the creation of the seL4 - Foundation. Its aim is to provide a neutral and independent organisation - to ensure the longevity of seL4, and grow its ecosystem of adopters and - contributors. - - It has a high-profile Board - consisting of Gernot Heiser (Chair), June Andronick, Gerwin Klein, John - Launchbury, Sascha Kegreiß, Daniel Potts. - - It already has a number of members, including major adopters HENSOLDT Cyber - and Ghost Systems, and providers of services for seL4, Cog Systems and - DornerWorks. Please check the membership - page for details and how to join. - - The seL4 Foundation is set up under the Linux Foundation, which provides a - mature and well-known framework. -

- -

- More information on the Blog - post about "The seL4 Foundation — What and Why", and in the press - releases from the - Linux Foundation. -

-
-
- - -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/news/2021.html b/PR_400/news/2021.html deleted file mode 100644 index 9523ce34..00000000 --- a/PR_400/news/2021.html +++ /dev/null @@ -1,1187 +0,0 @@ - - - - - - News about seL4 and the seL4 Foundation | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - seL4 - -
-
-

- News about - seL4 - and the - seL4 Foundation — 2021 -

-
-
- News from other years: - 2020 - 2021 - 2022 - 2023 - 2024 -
-
- - -
-TII logo -

The seL4 Foundation is pleased to welcome the Technology Innovation Institute.

- -

Technology Innovation Institute’s (TII) Secure Systems Research Centre (SSRC) -has obtained seL4 Foundation membership that will enable the Centre to -participate in and contribute to driving the open source for a robust -hypervisor technology. The critical technology will help build a secure -software stack for many edge devices, such as secure communicators and -drones. Through the membership, TII will research, contribute to and advance -next-generation high-end edge device environments that focus on resilience, -isolation, trust, and security.

- -
-
- - -
-RISC-V logo -

- In July, we announced that the assurance story for seL4 on RISC-V - keeps building, with the completion of the proof that seL4 enforces integrity, following the earlier - proofs of functional correctness and binary correctness for seL4 on RISC-V. -

-

- The next step in the assurance stack is now also completed for RISC-V with - the proof that seL4 enforces confidentiality, i.e. that seL4 provably - enforces information flow control, when it is correctly configured to do so. -

-

- "This completes the 3 big CIA security properties for seL4 on RISC-V: - confidentiality, integrity and availability. While integrity ensures there is - no unauthorised interference with private data, confidentiality ensures there - is no unauthorised access to private data”, says Gernot Heiser, chair of the - seL4 Foundation. -

- - - ARC logo - - -

- We thank Ryan - Barry of the Trustworthy Systems group at UNSW, main author of these proofs! We - also gratefully acknowledge funding from the Australian Reseach Council through grant - DP190103743 which has enabled this work. The proof is available on GitHub. -

- -
-
- - -
- -

- - Proofcraft logo - - - The seL4 Foundation has awarded Interim - Endorsement to Proofcraft as a - Trusted Service Provider for commercial support, verification projects, - training and consulting on formal verification of seL4 and seL4-based systems. - More on our services and products page. -

- -
-
- - -
- -

- - seL4 logo - - - Following CSIRO's abandoning of Trustworthy Systems (TS) and the seL4 - technology TS developed, the seL4 community and the seL4 Foundation have grown - a lot. This has led to concerns that the broader participation might have the - potential to undermine the integrity of seL4. In his latest blog, Gernot - explains why there is no reason for such concern. seL4's open governance - and technical leadership is based on technical merit and established trust, - not money. -

- -
-
- - -
-Proofcraft Logo -

The seL4 Foundation is pleased to welcome Proofcraft.

- -

Founded by the seL4 verification leaders, -Proofcraft offers commercial support, verification -projects, training and consulting on formal verification in general, and -involving seL4 specifically. By applying mathematical machine-checked software -verification, Proofcraft increases critical software systems’ reliability, -safety and security, for a verified future!

- -
-
- - -
- -

- - Xcalibyte logo - - Xcalibyte, a member of the seL4 Foundation, is hosting a webinar on Sep 16, - 2021, given by Gernot Heiser, seL4 Foundation Chairman & Scientia Professor, - UNSW Sydney, and Yuning Liang, CEO & co-founder, Xcalibyte. The topic will be - 'The seL4 Microkernel: Proved Security for Cyberphysical Systems'. -

-

- To register: http://xcalscan.mikecrm.com/Uw4y9HU. -

- -
-
- - -
- -

- Ghost logo - The seL4 Foundation thanks Ghost for its - generous contribution. Ghost's commitment strengthens the seL4 - Foundation's mission to continue advancing the ecosystem, the code - base, and the verification efforts of seL4, the world's most - advanced and highly assured operating-system kernel. -

- -

- As a founding member of the Foundation, Ghost is developing - self-driving cars using seL4, aiming to make the first formally - proven safety-critical system on the road into a reality for - millions of drivers. -

- -

- We warmly thank Ghost for its continued support! -

- -
-
- - -
- -

- - HENSOLDT Cyber - - - The seL4 Foundation has awarded interim endorsement to the - seL4-based TRENTOS - secure operating system from Foundation member HENSOLDT Cyber. This is the - first time a product is endorsed, and marks a new milestone for the Foundation - and the growth of the seL4 ecosystem. -

- -

- HENSOLDT Cyber's training module for TRENTOS has also received interim - endorsement, which constitutes another milestone as the first endorsed - training provided from outside the Trustworthy Systems group. -

- -

- Details on interim-endorsed services and products are on our services and products - page. -

- -
-
- - -
-Lotus Cars logo -

The seL4 Foundation welcomes Lotus Cars.

- -

Lotus is a leader in the Global Premium Sport Car market. We stand out as a -brand dedicated to pure driving experience. Committed to advancing technology -with precision and passion, Lotus continues to spearhead research into areas -such as autonomous driving, connectivity, intelligence, electrification. Emira, -Evija, Evora are representative models that in recent years drive Lotus’ -world-wide reputation. Going forward, Lotus’ approach will be based on the -principle of “EAS-IP” (Electrify, Amplify, Simplify, Intensify and Personify), a -globally R&D strategy, and excellent autonomous driving solutions to create a -novel, technology-based driving experience for future global users.

- -

In joining the seL4 Foundation, Lotus is committed to the development and -deployment of the seL4 microkernel in the field of autonomous driving, advance -Lotus’ automotive operating system to meet the overall functional safety goals -of the system, and realize the launch of safe and reliable autonomous driving -products.

- -
-
- - -
- -

- - SMACCMcopter at DEF CON - - - On 6 August DARPA brought the - “SMACCMcopter” - to DEF CON - and invited the assembled hacker elite to attack it. The - SMACCMcopter was the research vehicle of the Air Team at - DARPA's HACMS - program. The Trustworthy Systems - team worked - with project partners to deploy seL4 and leverage formal - methods to protect the drone from cyber attacks. -

-

- The result? Predictably, sel4's verified security enforcement - defeated - the hackers - comprehensively. As DARPA - said: “Formal methods FTW!” -

- -
-
- - -
-KSU logo -

The seL4 Foundation is pleased to Kansas State University -as Associate Member.

- -

KSU has for years been collaborating for years on seL4-based projects with a -number of Foundation members under multiple DARPA projects and we are looking -forward to their continued involvement.

- -
-
- - -
- -

- seL4 birthday cake - - On 29th July 2009, the original functional correctness proof of seL4 was - completed, a widely-recognised research breakthrough and the first big - milestone in seL4's history. We obviously had a party then, and have since - celebrated its anniversary, calling it, tongue-in-cheek, “International Proof - Day”. -

-

- On the fifth anniversary we open-sourced seL4, which was another major - milestone, which we referred to as “seL4 Freedom Day”. -

-

- Today marks the 12th anniversary of the proof, and the 7th anniversary of - open-sourcing, and from now on we'll refer to the date simply as "seL4 Day”. -

-

- The seL4 community is now definitely global. Still we would normally have a - physical party in Sydney, but won't be able to due to the renewed Covid-19 - restrictions — so we'll all be remote ;-) -

-
- seL4 -

- Happy seL4 Day everyone!

-
-

- A virtual toast to you all, and a big thank-you to all for your continued - support! -

- -
-
- - -
- -

- - RISC-V logo - - - The assurance story for seL4 - on RISC-V keeps building. We first formally - proved functional correctness: that - the seL4 C code on RISC-V platforms behaves exactly as its specification - says. We then established binary correctness: that - the machine code running on the processor behaves exactly as the C code, and - by extension, as the specification says. We now have established the - crucial integrity property for seL4 on RISC-V: that the - specification, and by extension the kernel binary, prevents an application - running on top from modifying data without authorisation. In seL4 speak: seL4 - provably enforces capability-based access control. -

- -

- “The integrity property is crucial for security: it is key to enforce - the isolation of components running on top of the - kernel”, says Gerwin Klein, seL4 verification expert and chair of the - seL4 Foundation technical steering committee. “This is what allows - critical components, like the network controller that has access to - software-controlled brakes in a modern car, to securely run alongside - untrusted software, like the entertainment system. With integrity proved, you - know that an attack on or from a vulnerable untrusted part of the system - cannot compromise the critical parts.” -

- - - ARC logo - - -

- Integrity had been proved in the original seL4 verification on the - Arm32 architecture. It is now also established for RISC-V - architecture, making it the only 64-bit architecture that has an OS - with such a comprehensive verification and security story. We thank - Ryan - Barry of Trustworthy Systems, main author of these proofs! We - also gratefully acknowledge funding from the - Australian Reseach Council through grant - DP190103743 which has enabled this work. -

- -

- See Gernot's - blog for more details. - The - proof is available on GitHub. -

- -
-
- - -
-TU Munich logo -

The seL4 Foundation is pleased to welcome Technical University of Munich as -Associate Member.

- -

The TUM, home of the Isabelle theorem prover used in the verification of seL4, has been a -collaborator of the Trustworthy Systems team for many years.

- -
-
- - -
-Second State logo -

The seL4 Foundation Second State as a member.

- -

Second State is the creator and maintainer of WasmEdge, a CNCF / Linux -Foundation project, which provides a high-performance, lightweight, -cross-platform, polyglot, and secure software runtime/sandbox for edge -computing. Based on the WebAssembly standard, WasmEdge could be 100 times faster -than Docker and hypervisor-based solutions. It supports multiple programming -languages, including DSLs, and can be embedded into multiple hosting -environments.

- -

Second State is currently porting WasmEdge to seL4. It will be one of the first -software runtimes in the seL4 ecosystem. By working with members in the seL4 -Foundation, Second State aims to create a real-time software sandbox for -automotive and industrial (ie smart factories) applications.

- -
-
- - -
- -

- With four new Premium Members joining the seL4 Foundation during - the past few weeks, we now welcome their representatives on the - seL4 Board. The new Board Members are: -

- - - - - - - - - - - - - - - - - - - - - - - -
- Dr Feng Zhou -     - - Dr. Feng Zhou represents Horizon - Robotics, where he is a Fellow. He has 15 years of academic - as well as 15 years of industry experience in video/image - compression & processing, computer vision, artificial - intelligence, and ASIC processor architecture. -
- Ian Xu -     - - Ian Xu represents Li Auto, - where he serves as Vice President, leading Computing - Platform design and development including hardware, OS and - run-time environment. His experience is in the design and - development of networking and wireless communication products. -
- Dr Matthew P. Grosvenor -     - - Dr Matthew P. Grosvenor - represents Jump Trading, - where he specializes on measurement and optimization of - high-performance and low-latency network systems. Matthew is a - former member of the Trustworthy Systems research group that - developed seL4. -
- Qiyan Wang - - Qiyan Wang represents NIO, where he - leads a global R&D team responsible for Vehicle Operating - System, Connected Vehicle Cloud, Vehicle Digital Architecture, - Cyber Security, and Vehicle Software Integration and - Validation. -     -
- -

- The four new members join five continuing members on - the seL4 Board, taking the size of - the Board to nine. -

-
-
- - -
-Jump Trading logo -

The seL4 Foundation welcomes Jump Trading as a -Premium Member.

- -

Jump is a research-based organization that is committed to applying cutting edge -technology to trading global financial markets. Jump has the full spectrum of -technology challenges from machine learning models and HPC at massive scale to -cybersecurity and trusted compute requirements that come from being a major -market participant in many asset classes. Jump was founded in 1999 and has over -20 global offices including Sydney, Shanghai and Singapore in Asia.

- -
-
- - -
-Li Auto logo -

The seL4 Foundation welcomes Li Auto Inc. as a Premium -Member.

- -

Li Auto is an innovator in China’s new energy vehicle market. The Company -designs, develops, manufactures, and sells premium smart electric vehicles. -Through innovations in product, technology, and business model, the Company -provides families with safe, convenient, and refined products and services. Li -Auto is a pioneer to successfully commercialize extended-range electric vehicles -in China. Its first model, Li ONE, is a six-seat, large premium electric SUV -equipped with a range extension system and advanced smart vehicle solutions. The -Company started volume production of Li ONE in November 2019 and released the -2021 Li ONE in May 2021. The Company leverages technology to create value for -its users. It concentrates its in-house development efforts on its proprietary -range extension system, next-generation electric vehicle technology, and smart -vehicle solutions. Beyond Li ONE, the Company aims to expand its product line by -developing new vehicles, including BEVs and EREVs, to target a broader consumer -base.

- -

Li Auto’s team will develop a secure highly extensible real-time open platform -for next generation self-driving vehicles based on the micro-kernel OS seL4. The -platform will enable an ecosystem for third party application developers.

- -
-
- - -
-Horizon Robotics logo -

The seL4 Foundation welcomes Horizon Robotics as a Premium -Member.

- -

Horizon Robotics is a global leader in the development of artificial -intelligence computing platforms. Its mission is to make driving safer and more -convenient as drivers transition to intelligent and self-driving vehicles. -Founded in Beijing in 2015, Horizon Robotics develops next-generation autonomous -driving technology integrating edge-AI processors, algorithms, and toolkits. -Horizon has reinvented the automotive-grade AI processor with Horizon Journey -SOC and its Brain Processing Unit AI engine (Horizon BPU), to offer the ultimate -balance of high-performance, low power, and cost effectiveness for inference at -the edge. Horizon’s state-of-the-art AI toolkit and model zoo enable developers -to optimize and deploy their own neural network models to Journey BPU with ease. -Horizon also offers vision perception algorithms to accelerate -time-to-production in the dynamic and highly competitive ADAS/AD market.

- -

The evolution of automotive E/E architecture continues rapidly. With complicated -hardware consolidation, software consolidation and separation happen -simultaneously. “To address the challenges of safety, security and -realtime in autonomous software, a fundamental high quality state-of-the-art -microkernel is needed. We are looking forward to working with members of seL4 -Foundation to build mixed-critical platform and solution for next-generation -autonomous driving vehicles.”

- -
-
- - -
-Xcalibyte logo -

The seL4 Foundation welcomes Xcalibyte as a member.

- -

Xcalibyte’s mission is to improve the quality of software by creating -easy-to-use tools that help developers build and deploy reliable and secure -code. Founded by world-class software experts with decades of experience in -compiler optimization and software development, Xcalibyte was established in -2018 and has offices in Shenzhen, Shanghai, Beijing and Hong Kong. Xcalibyte -enhances the speed and accuracy of code auditing, code evaluation, and code -defect detection. We use advanced static code analysis to help reduce costs, -improve productivity, and ensure software developers in China and all over the -world have the proper capabilities to develop better, more reliable software.

- -

“As we are actively working with members of the seL4 Foundation, it makes -perfect sense for us to be part of the organisation. Our code analysis tools are -being used by community members and we are aiming to ensure they develop high -quality and secure code.”

- -
-
- - -
-NIO logo -

The seL4 Foundation welcomes NIO Inc as a Premium member.

- -

NIO is a pioneer in China’s premium electric vehicle market. We design, jointly -manufacture, and sell smart and connected premium electric vehicles, driving -innovations in next generation technologies in connectivity, autonomous driving, -and artificial intelligence. Redefining user experience, we provide users with -comprehensive, convenient, and innovative charging solutions and other -user-centric service offerings. NIO went public in the U.S. in 2018. So far, NIO -has launched 3 mass-production vehicle models: ES8, ES6, and EC6, and -accumulated deliveries to users are over 120,000. Starting September, NIO will -start delivering to users in Norway. NIO invests heavily in in-house R&D to -build full-stack cutting-edge technologies around intelligent and autonomous -driving EV. Its engineering teams are distributed across the globe, including -US, UK, Germany and China.

- -

The Digital Systems department at NIO is missioned to develop the most advanced -software platform for the next-generation autonomous driving vehicles in the -industry from the ground up. This platform is internally named NIO Vehicle -Operating System (NVOS) and based off seL4. It involves solving a wide range of -technical challenges, such as seamless app development on heterogeneous hardware -chipsets, low-latency & high throughput data processing, powerful AI framework, -automobile-grade safety and security guarantee, and complete toolchains to -provide Android alike development experience.

- -
-
- - -
-seL4 -

The seL4 Foundation has released the following updates:

- - - -

Various repositories with support libraries and tools have also been updated. -Please refer to the following release manifests:

- - - -
-
- - -
-June Andronick -

The seL4 Foundation has appointed Dr June Andronick as (part time) CEO. June, -already a permanent board member as one of the founders of the seL4 technology, -continues to fulfil the role of Treasurer.

- -
-
- - -
-Kry10 logo -

The seL4 Foundation welcomes New-Zealand based Kry10 -as our latest member.

- -

“We believe that formal methods and proven code is the only viable option -for software, whether it is AI, Industrial controls, or really anything else. -seL4 is the first, and only real practical kernel to show the world how it -should be done,” says Boyd Multerer, CEO and Founder of Kry10.

- -

“At Kry10, we are building a full-featured operating system on top of the -seL4 Kernel, along with tooling, services, key management and more. We are -aiming at industrial use, but it is suitable for consumer devices and more. -Combined with the Erlang BEAM VM for applications, we intend to deliver systems -with great security and minimal downtime, even across upgrades.”

- -
-
- - -
-seL4 Foundation logo -

- It has been heart-warming to see the response of the seL4 community to the - news of the dismantlement of the Trustworthy Systems group (TS), creator of - seL4. -

- -

- The seL4 Foundation, as well as its members and ecosystem, want to reinforce - their commitment to the success and support of seL4. The TS team will be - rebuilding at UNSW and a number of Foundation-endorsed seL4 services providers as well as the newly - created Proofcraft verification - company are dedicated to support seL4 in the future. -

-

- - With this recent news, it's never been more important to work together as a - community to support seL4 and the transition of the support and development to - the Foundation and its members. People have been asking how to help. Offers of - support keep coming. We are looking at various options for sustainable - support, with a priority of keeping the team together. There are options on - the table that we are exploring that may allow us to do that. Please help us - with that, the existing TS team is the best base for stable seL4 support. -

-

- In the meantime, here are 4 concrete things that can be done now. Spread - the word to people who care about seL4’s future, and - contact us if you - want to discuss. -

-
    -
  1. - - donations and crowdfunding, in particular towards the “continuity - project”.
    - - https://sel4.systems/Foundation/Support/
    - seL4 - crowdfunding page
    - - The crowd-funding platform works for large and small financial - contributions, and contributions can be dedicated to specific topics. Fans - are always welcome to contribute and show the continued support to seL4 :), - but if you know of companies that would like to show financial support - without a longer-term commitment, this is a quick and easy mechanism to do - so.
    - We have set up a dedicated “continuity project” to raise funds specifically - targeted to the transition of the infrastructure (testing, boards etc) and - the immediate support needs (maintenance of all configurations, libraries, - releases etc) to the Foundation. All donors of $1,000 and above will be - listed on the page above. - -
  2. -
  3. - - get more members signed up to the Foundation.
    - - https://sel4.systems/Foundation/Join/
    - - A push to get more organisations joining in the coming weeks will be a clear - message of the strong support to seL4 and will provide the necessary funds - funds to transition more support to the Foundation. Longer term, membership - helps deliver on the Foundation’s vision to increase usability, exposure, - support, education, participation, and verification of seL4. Join or help - spreading the word to join to your partners and customers. - -
  4. -
  5. - in-kind offer of expertise.
    - - The number of seL4 experts is growing. Active participation and especially - support for new users and beginners on Discourse - (https://sel4.discourse.group) and the mailing list will help keep the - community active. Likewise contributions to reviews and discussion on GitHub - on pull requests and issues will help to keep things moving. The focus has - shifted away from just D61 contributions in the past year already, now is - the time to keep the momentum up. The TS team and people in the technical - steering committee are working on moving testing and verification - infrastructure to UNSW. This will include opening up the infrastructure such - that members can contribute hardware tests. We will send more information - about this in the next few weeks. Please contact Gerwin as the TSC chair if - you are interested in this or have additional ideas how to help.
    - - We were gearing up for the next seL4 release. This might be slightly delayed - by the infrastructure move, but if everything comes together as planned the - release will go ahead. -
  6. -
  7. - jobs in the seL4 ecosystem.
    - - - https://sel4.systems/Foundation/Jobs/
    - - While some expertise is needed to be kept within the Foundation, it is also - important to keep it within the community. We have just set up a page for - members to post jobs related to seL4. This will help match seL4 experts to - organisations willing to build upon, develop or support seL4. Contact - foundation@sel4.systems to post on that page. -
  8. -
- -
-
- - -
-seL4 Foundation logo -

The community has expressed a need to more easily find seL4 experts to hire. The -Foundations has created a “Jobs in seL4 ecosystem” page -where members can post offers for positions with seL4 expertise.

- -
-
- - -
-RISC-V logo -

Today, the seL4 Foundation and RISC-V -International announced that the verified seL4 microkernel -on the RV64 architecture has been proved down to the executable code by CSIRO’s -Data61, thanks to funding provided by HENSOLDT Cyber -GmbH. This guarantees that the seL4 microkernel on -RV64 will operate to specification even when built with an untrusted C compiler, -GCC.

- -

Within and across open collaboration communities it is essential to work -together on areas of mutual interest. RISC-V and seL4 are pleased to announce -their progress and their alliances as they join forces to enable stronger -overall security, combining security-oriented architecture and operating system -design.

- -

“We are excited to be one of the first architectures with secure operating -system kernels with such a strong formal verification story,” said Mark -Himelstein, CTO of RISC-V International. “RISC-V is continuing to increase the -security features that encompass the ISA and the secure seL4 kernel is a natural -complement.”

- -

“This is another milestone for seL4, which continues to define the state of the -art in OS security,” added Prof Gernot Heiser, Chairman of the seL4 Foundation. -“Stronger aligning the two open ecosystems makes a lot of sense.”

- -

“The verified seL4 microkernel forms the core of TRENTOS, our secure operating -system for our MiG-V chip, a RISC-V processor with supply chain security”, said -Sascha Kegreiß”, CTO of HENSOLDT Cyber GmbH. “This unique combination of -hardware and software security can protect critical assets from advanced -persistent cyber threats.”

- -

”Translation validation ties all of our verification efforts together,” said Dr -Zoltan Kocsis, CSIRO Verification Engineer. “Bringing translation validation to -a modern, 64-bit processor presented significant scalability challenges but, in -the end, we were able to overcome them.”

- -

For more details on binary verification of seL4 on RISC-V see Gernot’s blog: -seL4 on RISC-V Verified to Binary Code (and seL4 and RISC-V Foundations form an -alliance).

- -
-
- - -
-ETH Zurich logo -

The seL4 Foundation is pleased to welcome ETH Zurich -as associate member, and is looking forward to further strengthening of ETH’s -engagement with seL4.

- -
-
- - -
- -

The seL4 Foundation now has an easy way for the general public to support -financially the development of seL4 and its open-source ecosystem, using the -Linux Foundation’s LFX -portal.

- -
-
- - -
-Raytheon logo -

The seL4 Foundation welcomes Raytheon Technologies as -our latest member.

- -

Members of the Raytheon Technologies team have been long-time core participants -in the seL4 ecosystem, predating the company’s formation in 2020, which brought -together Raytheon Company and United Technologies’ aerospace businesses, Collins -Aerospace and Pratt & Whitney. Collins Aerospace was a prime contractor in the -DARPA HACMS program, which demonstrated the seL4-based incremental cyber -retrofit of autonomous military vehicles. This was a major milestone in the -growth of seL4, demonstrating that it protects against cyber attacks on real -systems in operation. The same Raytheon Technologies team now leads the -follow-on DARPA CASE program, aiming at designed-in cyber-resiliency, including -the seL4-based framework for verified initialisation and configuration of -systems architectures.

- -
-
- - -
- -

The seL4 Foundation has extended Interim Endorsement -as Trusted Service Provider to HENSOLDT Cyber, for -consulting and development services for seL4-based systems. More on:

- - - -
-
- - -
- -

- The seL4 Foundation has commenced providing interim endorsement for - trusted service providers for seL4. These may apply - to consulting and development services as well as for training. In a - first step, the Foundation has given interim endorsement to the - following trusted service providers (in the order of approval): -

- - -

- Interim endorsement is intended to lead to full certification; the Foundation - will work with interim endorsees and the general membership on developing - certification schemes. More detail. -

- -

- - DornerWorks logo - - - Breakaway Consulting logo - - - Cog logo - -

- -
-
- - -
-Penten logo -

The seL4 Foundation welcomes Penten Pty Ltd as our -newest member. Penten is based in Canberra, Australia, and specialises in secure -communications technology and artificial intelligence. Penten has been -developing seL4-based products for a number of years, some of which are in daily -use in multiple defence forces.

- -
-
- - -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/news/2022.html b/PR_400/news/2022.html deleted file mode 100644 index 559387a0..00000000 --- a/PR_400/news/2022.html +++ /dev/null @@ -1,672 +0,0 @@ - - - - - - News about seL4 and the seL4 Foundation | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - seL4 - -
-
-

- News about - seL4 - and the - seL4 Foundation — 2022 -

-
-
- News from other years: - 2020 - 2021 - 2022 - 2023 - 2024 -
-
- - -
- - - -
-
- - -
-seL4 summit -

Videos of the seL4 summit 2022 are now available on the seL4 YouTube channel! -Links and slides can be found on the summit -Program and -Abstracts pages. Thanks to all the -speakers for making the seL4 summit 2022 a great success!

- -
-
- - -
-Google -

- The seL4 Foundation welcomes the open-sourcing - of core components of KataOS created by our Member Google. KataOS is based on seL4 and implemented - mostly in the Rust programming - language. KataOS is to be combined with a secure hardware platform on the - RISC-V architecture. -

-

- This is an exciting addition to the seL4 ecosystem that will ease deployment - of seL4-based systems. It also adds improved support for running - Rust programs on seL4, which is a hot topic in the seL4 community. -

- -
-
- - -
-Xcalibyte logo -

The seL4 Foundation thanks Xcalibyte for becoming a -Bronze sponsor of the seL4 Summit 2022.

- -

Xcalibyte’s mission is to improve the quality of software by creating -easy-to-use tools that help developers build and deploy reliable and secure -code. Founded by world-class software experts with decades of experience in -compiler optimization and software development, Xcalibyte was established in -2018 and has offices in Shenzhen, Shanghai, Beijing and Hong Kong. Xcalibyte -enhances the speed and accuracy of code auditing, code evaluation, and code -defect detection. We use advanced static code analysis to help reduce costs, -improve productivity, and ensure software developers in China and all over the -world have the proper capabilities to develop better, more reliable software.

- -
-
- - -
- -
-

- We are very fortunate to welcome four leaders at major funding agencies to participate in a session Funding agencies: priorities and - vision at the seL4 summit. They will each give their views - on the priorities and vision of their agency in terms of high-assurance systems. -

-
-
-
-
- William “Brad” Martin -
- -
-
-
- Paul Waller -
-
- Paul Waller -
- NCSC -
-
-
-
- Cyberagentur -
- -
-
-
- Dr. Shreekant (Ticky) Thakkar -
- -
-
- -
-
- - -
-DornerWorks logo -

The seL4 Foundation thanks DornerWorks for becoming -a Bronze sponsor of the seL4 Summit 2022.

- -

DornerWorks helps product makers turn their ideas -into reality with FPGA, hardware, and embedded software engineering expertise. -Among other areas, DornerWorks specialises in seL4 microkernel-based -development.

- -

Innovative companies are building products on a trusted software base with the -guidance of DornerWorks engineers. As a founding member of the seL4 Foundation, -DornerWorks can accelerate the integration of seL4 as the trusted software base -for your products.

- -

If you are interesting in sponsoring the seL4 summit 2022, please contact -summit@sel4.systems.

- -
-
- - -
-Horizon Robotics logo -

The seL4 Foundation thanks Horizon Robotics for becoming -a Bronze sponsor of the seL4 Summit 2022.

- -

Horizon Robotics is a leading provider of computing platforms for smart vehicles -with the mission to make human life safer and better.

- -

Premium member of the seL4 Foundation, Horizon works with members of seL4 -Foundation to build mixed-critical platform and solution for next-generation -autonomous driving vehicles.

- -

If you are interesting in sponsoring the seL4 summit 2022, please contact -summit@sel4.systems.

- -
-
- - -
-SpacemiT -

The seL4 Foundation welcomes SpacemiT as a member.

- -

SpacemiT, a semiconductor innovation company focusing on high-performance RISC-V -architecture chips, announced that it has officially joined the seL4 Foundation. -SpacemiT will work closely with seL4 to promote RISC-V+seL4 and will also focus -on the security and performance of the operating system, thus assuring -confidence in the security of the RISC-V architecture.

- -
-
- - -
-seL4 summit -

This hybrid event will be held in Munich, Germany, 10-13 October 2022.

- -

The seL4 summit will cover the complete seL4 ecosystem, consisting of the -verified microkernel, as well as all seL4-related technology, tools, -infrastructure, products, projects, and people.

- -

Tickets include:

- -
    -
  • Participation in the 3-day conference, including talks, keynotes, seL4 updates & discussions
  • -
  • A one-day bootcamp with workshops and trainings
  • -
  • Networking with other seL4 experts and enthusiasts
  • -
  • Participation in the mentoring program (for students and junior engineers)
  • -
- -

Mentorship program

- -

As part of the registration process, attendees have the opportunity to opt-in to -a new, informal mentorship program. The purpose of this program is to foster -mentorship relationships within the seL4 community. The program committee will -match students and junior engineers who wish to participate as mentees with -volunteer mentors. Participating attendees will be introduced to their -counterparts during the summit, and will carry on afterwards with whatever level -of involvement suits both parties. Mentors are welcome to volunteer for any -level of involvement.

- - - -
-
- - -
-Google logo -

The seL4 Foundation is pleased to welcome Google as our latest member.

- -

We are excited to see their interest in seL4 and look forward to seeing their work with seL4.

- -
-
- - -
-seL4 summit logo -

- Have a look at the seL4 summit Program! - We have an amazing line-up of cool seL4 work, with a combination of - technical research and development, experience reports of seL4 in the field, - technical discussions and Birds-of-a-feather sessions, as well as a whole - day of seL4 bootcamp with tutorials and training. -

-

- - seL4 Summit program - -

- -
-
- - -
-LatticeX -

The seL4 Foundation is pleased to welcome Lattice X.

- -

LatticeX Foundation cultivates academic research, technology advancements and industrial -applications in the fields that foster the development of LatticeX ecosystem.

- -

LatticeX is the vision of large-scale distributed network supporting the expansive economy -activities and broader business applications where users can recognize the sovereignty and privacy -of their own data, and leverage the ecosystem of sophisticated computing technologies to -collaboratively unearth the value of data and benefit from data-value transactions throughout.

- -

Yuning Liang, LatticeX Foundation Security Advisor said: “We are so glad to join seL4 foundation. -Hopefully, we can specialise seL4 technology into the web 3.0 domain from cross chain bridge node OS -to hardware wallet OS for improving their security and stability.”

- -
-
- - -
- -

- A reminder that you have until Monday 9th of May 2022 to propose a talk - for the seL4 Summit 2022. -

-

- -

- -
-
- - -
-seL4 Summit 2022 -

- It is our pleasure to confirm that the seL4 Summit 2022 will be in: -

- -
-

Munich, Germany in the week of Oct 10th, 2022

-
- -

- It will be hosted by seL4 Foundation member - Hensoldt Cyber. - It will be a hybrid in-person/online event. - If you'd like to propose a talk to be delivered - remotely, please notify it in the submission. -

- -

- Remember that you have until Monday 9th of May 2022 to - propose a talk. -

- -
-

Share your seL4 work

-

Share your seL4 experience

-

Share your seL4 thoughts

-

Share your seL4 questions

-
-
-
- - -
-seL4 logo -

The Linux Foundation has registered seL4® as a trademark in the -United States and other countries. We encourage the use of the -seL4® name and logo in your -work, following the usage rules here.

- -
-
- - -
-seL4 Foundation Logo -

Our second Annual General Meeting (AGM) 6 April 2022. As our membership now is -truly global, covering New Zealand, Australia, China, the Middle East, Central -and Western Europe, the US East, Central and West coasts, there is no time that -is not in the middle of the night for some members. Hence we will hold the AGM -in two sessions:

- -
    -
  • 2022-04-06 07:00 - 08:30 UTC
  • -
  • 2022-04-06 23:00 - 2022-04-07 00:30 UTC
  • -
- -
-
- - -
-seL4 Summit 2022 Logo -
-

- We are calling for proposals to present at the seL4 Summit 2022. -

-

Share your seL4 work

-

Share your seL4 experience

-

Share your seL4 thoughts

-

Share your seL4 questions

-
- -

- Check the full Call For Presentations. To propose a - talk, send an abstract of one page or less by Monday 9th of May - 2022 to summit@sel4.systems. -

- -
-
- - -
-seL4 Summit 2022 Logo -

- The seL4 Foundation is excited to have gathered a top notch team of people to - serve as PC members for the seL4 summit - 2022. They come from across the the seL4 ecosystem: users, contributors, - committers, experts, advocates, researchers, and engineers. -

-

- Stay tuned for the Call for Presentation soon! -

-

- - PC for seL4 Summit 2022 - -

- -
-
- - -
-Olivier Engelkes -

The seL4 Foundation is pleased to welcome Olivier -Engelkes as Hensoldt -Cyber’s new representative on the seL4 Foundation Board.

- -

Olivier is Head of Engineering at HENSOLDT Cyber GmbH, premium -member of the seL4 Foundation and Munich-based -company which develops embedded IT products that meet the highest security -requirements, combining an operating system based on verified seL4 with a RISC-V -processor that is protected from supply-chain attacks. Olivier replaces Sascha -Kegreiß as HENSOLDT Cyber’s representative on the seL4 Foundation -Board.

- -
-
- - -
-NCSC Logo -

The seL4 Foundation is pleased to welcome the UK’s -National Cyber Security Centre (NCSC).

- -

The NCSC, the UK’s technical authority on cyber security, uses the seL4 -Microkernel to enforce separation in a number of high-assurance situations. The -government organisation is actively exploring research opportunities to further -develop its seL4 use cases. NCSC Technical Director Dr Ian Levy said: “We’re -pleased to join the seL4 Foundation. seL4 is some of the most highly assured -software and its development plays an important role in the next generation of -high-assurance devices. We support the long-term stability of the seL4 -microkernel ecosystem and are looking at opportunities to develop our use cases -for it.”

- -
-
- - -
-seL4 summit -

The seL4 Foundation will be organising the fourth edition of the seL4 Summit, in -October 2022.

- -

A Program Committee will be in charge of the technical side (more on that soon) -and an Hosting Team will be in charge of organising the event.

- -

We are now calling for bids to be the Host team for the seL4 Summit 2022!

- -

Bids should be sent to summit@sel4.systems before 22 February 2022.

- -

More information here.

- -
-
- - -
-Kry10 Logo -

The seL4 Foundation has awarded Interim Endorsement to Kry10 as a Trusted -Service Provider.

- -

More on our Services, Training and Products page.

- -
-
- - -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/news/2023.html b/PR_400/news/2023.html deleted file mode 100644 index 9263322e..00000000 --- a/PR_400/news/2023.html +++ /dev/null @@ -1,939 +0,0 @@ - - - - - - News about seL4 and the seL4 Foundation | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - seL4 - -
-
-

- News about - seL4 - and the - seL4 Foundation — 2023 -

-
-
- News from other years: - 2020 - 2021 - 2022 - 2023 - 2024 -
-
- - -
-DARPA Game Changer Award -

Each year, DARPA leadership selects the Game Changer program that was the most -impactful in the preceding 10 years.

- -

This year, the award goes to HACMS, the High-Assurance Cyber Military Systems -program, which has been instrumental in demonstrating how seL4 can be embedded -in real-world products (unmanned air and ground vehicles) and truly protect them -from cyber attacks.

- -

The award was presented by DARPA Director Stefanie Tompkins to the three HACMS -program managers, Kathleen Fisher, John Launchbury, and Ray Richards. We truly -thank all three for their visionary leadership.

- -

Our deep thanks to Darren Cofer as well, who masterfully lead the team, made of -Collins, Galois, Boeing, University of MN and the Trustworthy Systems group -(home of seL4 at the time) who demonstrated the technology on Boeing’s Unmanned -Little Bird helicopter, including cyber attacks during flight!

- -

A true game changer indeed.

- -
-
- - -
-NIO Logo -

We are excited to share that NIO recently unveiled their -seL4-based SkyOS operating system, -designed for Software Defined Vehicles, which they have been working on relentlessly for the past two years. At the -seL4 Summit 2023 Qiyan Wang, NIO’s Global VP of Digital Systems, announced that NIO cars based on seL4 are planned for next year!

- -
-
- - -
- - -

- The seL4 Microkit, - formerly known as the Core Platform, is an operating system framework on top - of seL4 provides a small set of simple abstractions that ease the design and - implementation of statically structured systems on seL4, while still - leveraging the kernel’s benefits of security and performance. The Microkit is - distributed as an SDK that integrates with the developer’s build system of - choice, significantly reducing the barrier to entry for new users of seL4. -

-

- The seL4 Microkit was developed in collaboration between Breakaway Consulting Pty Ltd and Trustworthy Systems, UNSW, and is now - an official seL4 Foundation project, making it - part of the seL4 eco-system. -

- -
-
- - -
-Rust logo -

For the last year, Nick Spinale, funded by the seL4 Foundation, has been -developing support for the Rust programming language in seL4 userspace.

- -

Nick has created a comprehensive language support infrastructure that integrates -well with the rest of the seL4 ecosystem (capDL, Microkit, sel4test) and also -integrates well with what Rust programmers would expect from the language side. -This work has now been accepted by the seL4 Foundation -Technical Steering Committee and can be found on -GitHub. Nick’s talk at the recent seL4 -summit is on seL4’s Youtube channel. -A demo system that uses the device driver framework, asynchronous programming in -Rust and library support from the Rust ecosystem to implement a small web server -is available on GitHub.

- -

The overall outcome will be to allow people to write safer user-level code on -top of seL4 without needing full formal verification, with a language that is -receiving increasing interest and that aligns extremely well with security and -safety critical embedded systems programming.

- -
-
- - -
- -

- Foundation member Proofcraft has - delivered a work - package towards the verification of the MCS variant of seL4. -

- -

- Having earlier started the design-to-code refinement proof of MCS seL4, funded - by the Foundation, Proofcraft has now delivered the completion of the proof - framework, setting up all the infrastructure and hierarchy of theorems about - the approximately 500 C functions of the kernel. -

- -

- This was made possible by a generous donation from Foundation member XCalibyte, for which the seL4 Foundation is - very grateful. We are looking for further funding that will - allow completion of the verification of the MCS variant. Once verified, MCS - will become the default configuration of seL4, bringing the highest levels of - assurance to mixed-criticality real-time systems. -

- -

- - XCalibyte logo - - - Proofcraft logo - -

- -
-
- - -
-seL4 summit logo -

- Videos of the seL4 summit 2023 are now - available on the seL4 - YouTube channel! Links and slides can be found on the summit Program and Abstracts pages. Thanks to - all the speakers for making the seL4 summit 2023 a great success! -

- -
-
- - -
-KU Institute for Information Sciences logo -

The seL4 Foundation is pleased to welcome The University of -Kansas as Associate Member. KU -has collaborated with a number of seL4 Foundation members along the years, -including in the DARPA CASE project, which produced a set of formal methods -tools that can be applied throughout the design and build process to create -seL4-based high-assurance cyber-resilient systems.

- -
-
- - -
-NIO logo -

The seL4 Foundation thanks NIO for sponsoring both the -reception and dinner for the seL4 Summit 2023. NIO -is also a gold sponsor of the summit.

- -

Email us at summit@sel4.systems if you are -interested in sponsoring the seL4 summit. More on sponsorship -here.

- -
-
- - -
- -

- We are very fortunate to welcome five industry leaders to participate at the - seL4 Summit 2023, in a session OS on - seL4: so many options!. Gapfruit, Kry10, Magnetite (MIT), and UNSW will - present their views on the priorities and vision for their OS on seL4. The - panel will be moderated by Todd Carpenter from Galois. -

- -
-
-
- Sid Hussmann -
-
- Sid Hussmann -
- Gapfruit -
-
-
-
- Kent McLeod -
-
- Kent McLeod -
- Kry10 -
-
-
-
- Juliana Furgala -
-
- Juliana Furgala -
- MIT - Lincoln Laboratory -
-
-
-
- Gernot Heiser -
-
- Gernot Heiser -
- Trustworthy Systems UNSW -
-
-
-
- Todd Carpenter -
-
- Todd Carpenter, Moderator
- Galois -
-
-
- -
-
- - -
-TII logo -

The seL4 Foundation thanks TII for becoming a Gold -sponsor of the seL4 Summit 2023.

- -

The Technology Innovation Institute’s (TII) Secure -Systems Research Centre (SSRC) aims to -drive end-to-end security and resilience in cyber-physical and autonomous -systems that will ensure safety. The research center adopts an applied research -approach, emphasizing practical applications. By employing seL4 as both a -microkernel and a hypervisor, SSRC seamlessly aligns its dedication to security -with the foundational technology crucial to achieving its objectives. This -critical technology forms the cornerstone of secure software stacks for diverse -edge devices, including secure communicators and drones. TII’s research not only -contributes to but propels the evolution of cutting-edge high-end edge device -environments. TII’s SSRC focus centers on resilience, isolation, trust, and -security, all with the intention of fostering a more secure digital landscape.

- -

Email us at summit@sel4.systems if you are -interested in sponsoring the seL4 summit. More on sponsorship -here.

- -
-
- - -
-Kry10 logo -

The seL4 Foundation thanks Kry10 for becoming a Gold -sponsor of the seL4 Summit 2023.

- -

Kry10 offers a full-featured operating system on top of the seL4 kernel, along -with tooling, services, key management and more. The Kry10 Platform is a fast -and easy way to build highly secure, next-generation cyber-physical devices. It -leverages the verification of seL4 to provide a secure, self-healing, truly -dynamic system with minimal downtime, even during upgrades.

- -

Kry10 is an Endorsed Service Provider of the seL4 -Foundation, offering support to enable seL4-based secure projects to be -affordable, maintainable, and remotely manageable.

- -

See here if you are -interested in sponsoring the seL4 summit 2023.

- -
-
- - -
-NIO logo -

The seL4 Foundation thanks NIO for becoming our first -Gold sponsor of the seL4 Summit 2023.

- -

NIO is a global EV company funded in 2015 and that went -public in the U.S. in 2018. NIO emphasizes user experience and technology -innovation. NIO is a strong supporter of seL4 and a premium member of the seL4 -Foundation. It has been investing heavily on building a full-fledge software -platform for modern vehicles based on seL4.

- -

See here if you are -interested in sponsoring the seL4 summit 2023.

- -
-
- - -
-Collins Aerospace logo -

The seL4 Foundation thanks Collins Aerospace -for becoming a Silver sponsor of the seL4 Summit 2023.

- -

Collins Aerospace, part of seL4 Foundation -member Raytheon Technologies, has been a long-time core -participant in the seL4 ecosystem. It was a prime contractor in the DARPA HACMS -program, which demonstrated the seL4-based incremental cyber retrofit of -autonomous military vehicles. This was a major milestone in the growth of seL4, -demonstrating that it protects against cyber attacks on real systems in -operation. The same team also led the follow-on DARPA CASE program, aiming at -designed-in cyber-resiliency, including the seL4-based framework for verified -initialisation and configuration of systems architectures.

- -

The seL4 Summit 2023 will take place in -Minneapolis, home town of this Collins Aerospace team involved in seL4.

- -

See here if you are -interested in sponsoring the seL4 summit 2023.

- -
-
- - -
-seL4 summit logo -

- Have a look at the program of - the seL4 summit 2023! We have a great - line-up of interesting seL4 work, with a combination of technical research and - development, experience reports of seL4 in the field, technical discussions - and birds-of-a-feather sessions, as well as a training session on getting - started with seL4. -

-

- - seL4 summit 2023 program - -

- -
-
- - -
- -
-

- We are pleased to announce that the two keynotes for the seL4 summit 2023 - will be Gage from NCSC and Sam Leffler from Google! Gage will talk about Scoping assurance activities with seL4 - and Sam about CantripOS: An OS for Ambient ML - Applications. -

- - NCSC logo - -

- Gage is an Assurance Lead in NCSC with expertise in - cryptography, software assurance and verification. He is part of a larger - team that seeks to provide assurance and articulate risk for a wide range of - products and customers. Whilst he is not a product developer himself, he has - been responsible for presenting assurance cases for products that rely on - seL4 to uphold security requirements. -

-
-
- - Google logo - -

- Sam Leffler has worked at Google for nearly 15 years. He - was part of the original team that developed ChromeOS and the ChromeBook, - was responsible for the networking components of Project Loon, and worked on - various infrastructure projects before joining Project Sparrow to help build - the CantripOS embedded operating system. Prior to joining Google he was an - independent contractor focused on wireless networking and operating systems. - Before contracting he worked for VMware, Silicon Graphics, Pixar, Lucasfilm, - and the Computer System Research Group (CSR) at UC Berkeley where he was - responsible for the 4.2BSD release of the UNIX operating system. At CSRG he - co-designed and implemented many of the facilities found in contemporary - UNIX systems including sockets, networking support (IP/TCP), reliable - signals, and more. -

-
- -
-
- - -
-Galois logo -

We are pleased to have Galois now part of the seL4 -Foundation, following its acquisition of Adventium labs, which has been a -member since 2020 and user of seL4 technologies for -years before that. Galois develops technology to guarantee the trustworthiness -of systems where failure is unacceptable. They apply cutting edge computer -science and mathematics to advance the state of the art in software and hardware -trustworthiness. The seL4 Foundation looks forward to our continuing -collaboration.

- -
-
- - -
-seL4 summit logo -

The seL4 summit 2023 will be held in Minneapolis, -USA, 19 - 21 September 2023.

- -

The seL4 summit will cover the complete seL4 ecosystem, consisting of the -verified microkernel, as well as all seL4-related technology, tools, -infrastructure, products, projects, and people.

- -

Tickets include:

- -
    -
  • Participation in the 3-day conference, including talks, keynotes, seL4 updates & discussions
  • -
  • Networking with other seL4 experts and enthusiasts
  • -
  • Reception and Dinner
  • -
- -

Register here

- -

The early bird cut-off date is 18 August 2023.

- -
-
- - -
-ACM Award Winners -

The 2022 ACM Software System Award -recognises seL4 as the first industrial-strength, high-performance operating -system to have been the subject of a complete, mechanically-checked proof of -full functional correctness, proofs of enforcement of the core security -properties of integrity and confidentiality, a proof to the binary code of the -kernel, and the first sound and complete worst-case execution-time analysis of a -protected mode OS.

- -

The award, recognising the development of a software system that has had a -lasting influence, goes to Gernot Heiser, University of New South Wales; Gerwin -Klein, Proofcraft; Harvey Tuch, Google; Kevin Elphinstone, University of New -South Wales; June Andronick, Proofcraft; David Cock, ETH Zurich; Philip Derrin, -Qualcomm; Dhammika Elkaduwe, University of Peradeniya; Kai Engelhardt; Toby -Murray, University of Melbourne; Rafal Kolanski, Proofcraft; Michael Norrish, -Australian National University; Thomas Sewell, University of Cambridge; and -Simon Winwood, Galois.

- -

We are committed to make sure that seL4’s recognised “lasting influence” live on -for the decades ahead!

- -
-
- - -
-seL4 summit logo -

The seL4 Summit 2023 will be held 19 - 21 -September 2023 at the Elliot Park Hotel, -Minneapolis, USA.

- -

The summit will be hosted by the Linux Foundation, and will be an in-person -event.

- -

Registration details to follow soon!

- -

Remember that you have until 24 April 2022 to propose a talk. -To propose a talk, upload an abstract of one page or less to the submission -portal.

- -
-
- - -
-Autoware Foundation -

The seL4 Foundation welcomes the Autoware Foundation as -a member.

- -

The Autoware Foundation hosts the Autoware Project, the world’s leading -open-source software project for autonomous driving.

- -

As a member of the seL4 Foundation, the Autoware Foundation will work with -members of the seL4 Foundation to implement a safe and secure Autonomous Driving -software stack based on Autoware, leveraging the formally-verified and -mixed-criticality capabilities of seL4.

- -
-
- - -
-seL4 summit logo -

- Call For Presentations for the seL4 Summit 2023 -

-
    -
  • Share your seL4 work
  • -
  • Share your seL4 experience
  • -
  • Share your seL4 thoughts
  • -
-

- Check the full Call For - Presentations. To propose a talk, upload an abstract of one page or less - by 10 April 2023 to the submission portal. -

- -
-
- - -
-seL4 summit -

- We are thrilled to announce our program committee for the seL4 Summit 2023. Our awesome team comes - from various parts of the seL4 ecosystem: users, contributors, committers, - experts, advocates, researchers, and engineers. -

- -
-
-
- Darren Cofer -
- -
- Raytheon -
-
- -
-
- Ihor Kuz -
- -
- Kry10 -
-
- -
-
- Perry Alexander -
- -
- U of Kansas -
-
- -
-
- June Andronick -
- -
- Proofcraft -
-
- -
-
- Todd Carpenter -
- -
- Galois Inc -
-
- - - -
-
- Axel Heider -
- -
- Hensoldt Cyber -
-
- -
-
- Gernot Heiser -
- -
- UNSW -
-
- - - -
-
- Nick Spinale -
- -
- Colias Group -
-
- -
-
- Robbie VanVossen -
- -
- Dornerworks -
-
- - -
-
- NCSC -
- -
- NCSC -
-
- -
-
-
- - -
-seL4 summit logo -

- It is our pleasure to confirm that the seL4 Summit 2023 will be in: -

-
Minneapolis, USA, Sept/Oct 2023 (dates TBC).
-

-
- The summit will be hosted by the Linux Foundation, and will be an - in-person event. -

-

- We will announce a Call for Presentations in the coming weeks. Stay tuned! -

- -
-
- - -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/news/2024.html b/PR_400/news/2024.html deleted file mode 100644 index 15e8d21e..00000000 --- a/PR_400/news/2024.html +++ /dev/null @@ -1,840 +0,0 @@ - - - - - - News about seL4 and the seL4 Foundation | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - seL4 - -
-
-

- News about - seL4 - and the - seL4 Foundation -

-
-
- News from older years: - 2020 - 2021 - 2022 - 2023 - 2024 -
-
- - -
- -

- The seL4 Foundation thanks Kry10 for - becoming a Gold sponsor of the seL4 - Summit 2024. -

-

- Kry10 offers a full-featured operating system on top of the seL4 kernel, along - with tooling, services, key management and more. The Kry10 Platform is a fast - and easy way to build highly secure, next-generation cyber-physical devices. It - leverages the verification of seL4 to provide a secure, self-healing, truly - dynamic system with minimal downtime, even during upgrades. - -

-

- Kry10 is an Endorsed Service Provider of the seL4 - Foundation, offering support to enable seL4-based secure projects to be - affordable, maintainable, and remotely manageable. -

-

- See here - if you are interested in sponsoring the seL4 summit 2024. -

- -
-
- - -
- -

- The seL4 Foundation thanks Collins Aerospace for - becoming a Bronze sponsor of the seL4 - Summit 2024. -

-

- Collins Aerospace, part of seL4 Foundation - member Raytheon Technologies, has been a long-time core - participant in the seL4 ecosystem. - It was a prime contractor in the DARPA HACMS - program, which demonstrated the seL4-based incremental cyber retrofit of - autonomous military vehicles. This was a major milestone in the growth of seL4, - demonstrating that it protects against cyber attacks on real systems in - operation. The same team also led the follow-on DARPA CASE program, aiming at - designed-in cyber-resiliency, including the seL4-based framework for verified - initialisation and configuration of systems architectures. -

-

- Collins Aerospace is now leading the INSPECTA team as part of DARPA's PROVERS program, which aims at developing formal methods tools to guide software engineers through designing proof-friendly software systems and reduce the proof repair workload. -

-

- See here - if you are interested in sponsoring the seL4 summit 2024. -

- - -
-
- - -
- -

- The seL4 Foundation thanks TII for - becoming a Bronze sponsor of the seL4 - Summit 2024. -

-

- The Technology Innovation Institute’s (TII) Secure Systems Research Centre (SSRC) aims to drive end-to-end security and resilience in cyber-physical and autonomous systems that will ensure safety. The research center adopts an applied research approach, emphasizing practical applications. By employing seL4 as both a microkernel and a hypervisor, SSRC seamlessly aligns its dedication to security with the foundational technology crucial to achieving its objectives. This critical technology forms the cornerstone of secure software stacks for diverse edge devices, including secure communicators and drones. TII’s research not only contributes to but propels the evolution of cutting-edge high-end edge device environments. TII’s SSRC focus centers on resilience, isolation, trust, and security, all with the intention of fostering a more secure digital landscape. -

-

- See here - if you are interested in sponsoring the seL4 summit 2024. -

- - - -
-
- - -
- -
-

- This year marks a very special seL4 day anniversary. -

-

- 20 years ago, the L4.verified project started, with the ambitious aim to formally verify an entire microkernel of - the L4 family. seL4 was born. -

-

- 15 years ago, on the 29th of July 2009, the original functional correctness proof of seL4 was completed, a - widely-recognised research breakthrough and the first big milestone in seL4's history. -

-

- 10 years ago, on the 29th of July 2014, seL4 was open-sourced, an instrumental step towards its adoption in a number - of sectors. -

-

- To celebrate these key anniversaries, a special panel will gather at the seL4 - summit 2024 to reflect on the journey over the past 20 years and discuss the future ahead. Stay tuned for more - info. -

-

- happy sel4 day -

-
- -
-
- - -
-seL4 logo -

It’s been a long time coming – we’re pleased to announce the release of

- -
    -
  • seL4 13.0.0: The seL4 -microkernel
  • -
  • Microkit 1.3.0: The seL4 -Microkit for building static-architecture systems
  • -
  • CAmkES 3.11.0: -Component Architecture for microkernel-based Embedded Systems
  • -
  • capDL 0.3.0: Tools for -generating, parsing and loading capability distribution specifications
  • -
  • rust-sel4 1.0.0: Rust -support for seL4 userspace. See -seL4/rust-sel4 on GitHub for more -information.
  • -
- -

Microkit 1.3.0 and rust-sel4-1.0.0 are the first official releases under the -seL4 foundation.

- -

Enjoy!

- -
-
- - -
- -
-

- Have a look at the program of the seL4 summit 2024. - We have a great line-up of interesting seL4 work, with a combination of - technical research and development, experience reports of seL4 in the field, - technical discussions and birds-of-a-feather sessions. -

-
-
- - seL4 summit - -

- Program at a glance. Go to the full program.

- - seL4 summit 2024 program - -

-
- -
-
- - -
- -
-

- We are pleased to announce that the two keynotes for the seL4 summit 2024 - will be Darren Cofer from - Collins Aerospace and - Ning Qu from - NIO. Darren will talk - about Industrial - Scale Proof Engineering for Critical Trustworthy Applications (INSPECTA) - and Ning about seL4 - in Software-Defined Vehicles: Vision, Roadmap, and Impact at NIO. -

-

- Darren Cofer - Darren Cofer is a Principal Fellow at Collins Aerospace. He - earned his PhD in Electrical and Computer Engineering from The University of - Texas at Austin. His area of expertise is developing and applying advanced - analysis methods and tools for verification and certification of - high-integrity systems. His background includes work with formal methods for - system and software analysis, the design of real-time embedded systems for - safety-critical applications, and the development of nuclear propulsion - systems in the U.S. Navy. Dr. Cofer has served as principal investigator on - many government-sponsored research programs, developing and using formal - methods for verification of safety and security properties. He served on - RTCA committee SC-205 developing new certification guidance for airborne - software (DO-178C) and was one of the developers of the Formal Methods - Supplement (DO-333). He is currently a member of SAE committee G-34 - developing certification guidance for the use of machine learning - technologies onboard aircraft. -

-

- Ning Qu - Ning Qu is a veteran in the autonomous driving industry and - a seasoned technical leader with extensive experience in operating systems, - high-performance runtime frameworks, and hardware-software co-design. - Currently, Ning serves as the Senior Director of the SkyOS team at NIO, - where he spearheads the development of SkyOS—a comprehensive suite of - platform software (including hypervisor, operating systems, and middleware) - for Software Defined Vehicles, showcased at NIO IN 2023. Before joining NIO, - Ning managed Waymo's ML Runtime team, playing a pivotal role in SF - Rider-only driverless launch on the Jaguar EV. At Baidu, he built the Apollo - OS from the ground up, establishing the foundation for the Apollo project. - Notably, he architected and developed Cyber RT and led Baidu's fully - driverless launch in 2020. Ning holds a B.S. and Ph.D. from Peking - University and has served as a researcher at CMU. -

-
-
-
- - -
- -

- The seL4 Foundation thanks UNSW Sydney for - becoming a Bronze sponsor of the seL4 - Summit 2024. -

-

- seL4 was created by the Trustworthy - Systems (TS) team, which is now part of the UNSW, a founding member of the seL4 Foundation. -

-

- The team has a track record of designing and implementing systems software for - performance and reliability, and using rigorous formal methods to prove that - they meet their security and reliability goals. Their aims are to: -

-
    -
  • shift the software industry away from ad-hoc, unreliable engineering - practices, and towards more principled and trustworthy methods; and
  • -
  • make verified software a default choice, especially in safety- and - security-critical systems.
  • -
-

- The team works with government and commercial partners, as well as the broader - software engineering community, to drive this change. -

-

- The seL4 Summit 2024 will take place - in Sydney, the hometown of Trustworthy - Systems and UNSW. -

-

- See here - if you are interested in sponsoring the seL4 summit 2024. -

- -
-
- - -
- -

- The seL4 Foundation thanks Proofcraft - for becoming a Bronze sponsor of the seL4 - Summit 2024. -

-

- Founded by the seL4 verification leaders, Proofcraft offers commercial support, - verification projects, training and consulting on formal verification in - general, and involving seL4 specifically. By applying mathematical - machine-checked software verification, Proofcraft increases critical software - systems' reliability, safety and security, for a verified future. -

-

- The seL4 Summit 2024 will take place - in Sydney, the hometown of Proofcraft. -

-

- See here - if you are interested in sponsoring the seL4 summit 2024. -

- - -
-
- - -
-seL4 summit logo -

The seL4 summit 2024 will be held in Sydney, -Australia, 15-17 October 2024.

- -

The seL4 summit will cover the complete seL4 ecosystem, consisting of the -verified microkernel, as well as all seL4-related technology, tools, -infrastructure, products, projects, and people.

- -

Tickets include:

- -
    -
  • Participation in the 3-day conference, including talks, keynotes, seL4 updates -& discussions
  • -
  • Networking with other seL4 experts and enthusiasts
  • -
  • Reception and dinner
  • -
- -

Register here

- -

The early bird cut-off date is 15 September 2024.

- -

Local seL4 Sydney-siders will look into organising some informal activities for -Monday 14 October 2024, before the summit kicks off, for anyone who wants to -join. Gernot may also organise a bush walk for the weekend before the summit. -Stayed tuned for more info!

- -
-
- - -
-seL4 Foundation logo -

The seL4 Foundation is pleased to welcome Apple as our -latest member.

- -

We are excited to see their interest in seL4 and look forward to seeing their -work with seL4.

- -
-
- - -
-Functional correctness proof -

We are extremely pleased to announce that the functional correctness proof for -seL4 on the 64-bit Arm architecture (AArch64) is complete!

- -

We congratulate to our member Proofcraft for this -great achievement, which marks a major milestone in the development of the seL4 -microkernel and its ecosystem.

- -

We also would like to express our immense gratitude to UK’s National Cyber -Security Centre (NCSC) for funding this work, which -is of great importance for the seL4 ecosystem.

- -

For more information check Proofcraft’s news item.

- -
-
- - -
-seL4 summit logo -

- Call For Presentations for the seL4 Summit 2024 -

-
    -
  • Share your seL4 work
  • -
  • Share your seL4 experience
  • -
  • Share your seL4 thoughts
  • -
-

- Check the full Call For - Presentations. To propose a talk, upload an abstract of one page or less - by 22 April 2024 to the - submission portal. -

-

- Also note the open - invitation for a 5-minute slot to talk about your seL4 deployment. -

- -
-
- - -
-seL4 summit logo -

- We are thrilled to announce our program committee for the seL4 Summit 2024. - Our awesome team comes - from various parts of the seL4 ecosystem: users, contributors, committers, - experts, advocates, researchers, and engineers. -

- -
-
-
- Ihor Kuz -
- -
- Kry10 -
-
- -
-
- Nick Spinale -
- -
- Colias Group -
-
- -
-
- NCSC -
- -
- NCSC -
-
- -
-
- Alison Felizzi -
- -
- Kry10 -
-
- -
-
- David Hardin -
- -
- Collins -
-
- -
-
- Everton de Matos -
- -
- TII -
-
- -
-
- Gernot Heiser -
- -
- UNSW -
-
- - - -
-
- John Hatcliff -
- -
- KSU -
-
- -
-
- - Lucy Parker -
- -
- -
-
- Matthew Brecknell -
- -
- Kry10 -
-
- -
-
- Michal Podhradsky -
- -
- Galois -
-
- -
-
- Robbie VanVossen -
- -
- Dornerworks -
-
-
-
-
- - -
-seL4 summit logo -

- It is our pleasure to confirm that the - seL4 Summit 2024 will be in: -

-

- Sydney, Australia, 15-17 Oct 2024. -

-

- We look forward to welcoming the community in the birthplace of seL4. -

-

- We will announce a Call for Presentations in the coming weeks. Stay tuned! -

-
- Sydney Harbour -
- -
-
- - -
- - - -
-
- - -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/news/index.html b/PR_400/news/index.html deleted file mode 100644 index 44101016..00000000 --- a/PR_400/news/index.html +++ /dev/null @@ -1,839 +0,0 @@ - - - - - - News about seL4 and the seL4 Foundation | seL4 - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- - -
-
- - seL4 - -
-
-

- News about - seL4 - and the - seL4 Foundation -

-
-
- News from older years: - 2020 - 2021 - 2022 - 2023 - 2024 -
-
- - -
- -

- The seL4 Foundation thanks Kry10 for - becoming a Gold sponsor of the seL4 - Summit 2024. -

-

- Kry10 offers a full-featured operating system on top of the seL4 kernel, along - with tooling, services, key management and more. The Kry10 Platform is a fast - and easy way to build highly secure, next-generation cyber-physical devices. It - leverages the verification of seL4 to provide a secure, self-healing, truly - dynamic system with minimal downtime, even during upgrades. - -

-

- Kry10 is an Endorsed Service Provider of the seL4 - Foundation, offering support to enable seL4-based secure projects to be - affordable, maintainable, and remotely manageable. -

-

- See here - if you are interested in sponsoring the seL4 summit 2024. -

- -
-
- - -
- -

- The seL4 Foundation thanks Collins Aerospace for - becoming a Bronze sponsor of the seL4 - Summit 2024. -

-

- Collins Aerospace, part of seL4 Foundation - member Raytheon Technologies, has been a long-time core - participant in the seL4 ecosystem. - It was a prime contractor in the DARPA HACMS - program, which demonstrated the seL4-based incremental cyber retrofit of - autonomous military vehicles. This was a major milestone in the growth of seL4, - demonstrating that it protects against cyber attacks on real systems in - operation. The same team also led the follow-on DARPA CASE program, aiming at - designed-in cyber-resiliency, including the seL4-based framework for verified - initialisation and configuration of systems architectures. -

-

- Collins Aerospace is now leading the INSPECTA team as part of DARPA's PROVERS program, which aims at developing formal methods tools to guide software engineers through designing proof-friendly software systems and reduce the proof repair workload. -

-

- See here - if you are interested in sponsoring the seL4 summit 2024. -

- - -
-
- - -
- -

- The seL4 Foundation thanks TII for - becoming a Bronze sponsor of the seL4 - Summit 2024. -

-

- The Technology Innovation Institute’s (TII) Secure Systems Research Centre (SSRC) aims to drive end-to-end security and resilience in cyber-physical and autonomous systems that will ensure safety. The research center adopts an applied research approach, emphasizing practical applications. By employing seL4 as both a microkernel and a hypervisor, SSRC seamlessly aligns its dedication to security with the foundational technology crucial to achieving its objectives. This critical technology forms the cornerstone of secure software stacks for diverse edge devices, including secure communicators and drones. TII’s research not only contributes to but propels the evolution of cutting-edge high-end edge device environments. TII’s SSRC focus centers on resilience, isolation, trust, and security, all with the intention of fostering a more secure digital landscape. -

-

- See here - if you are interested in sponsoring the seL4 summit 2024. -

- - - -
-
- - -
- -
-

- This year marks a very special seL4 day anniversary. -

-

- 20 years ago, the L4.verified project started, with the ambitious aim to formally verify an entire microkernel of - the L4 family. seL4 was born. -

-

- 15 years ago, on the 29th of July 2009, the original functional correctness proof of seL4 was completed, a - widely-recognised research breakthrough and the first big milestone in seL4's history. -

-

- 10 years ago, on the 29th of July 2014, seL4 was open-sourced, an instrumental step towards its adoption in a number - of sectors. -

-

- To celebrate these key anniversaries, a special panel will gather at the seL4 - summit 2024 to reflect on the journey over the past 20 years and discuss the future ahead. Stay tuned for more - info. -

-

- happy sel4 day -

-
- -
-
- - -
-seL4 logo -

It’s been a long time coming – we’re pleased to announce the release of

- -
    -
  • seL4 13.0.0: The seL4 -microkernel
  • -
  • Microkit 1.3.0: The seL4 -Microkit for building static-architecture systems
  • -
  • CAmkES 3.11.0: -Component Architecture for microkernel-based Embedded Systems
  • -
  • capDL 0.3.0: Tools for -generating, parsing and loading capability distribution specifications
  • -
  • rust-sel4 1.0.0: Rust -support for seL4 userspace. See -seL4/rust-sel4 on GitHub for more -information.
  • -
- -

Microkit 1.3.0 and rust-sel4-1.0.0 are the first official releases under the -seL4 foundation.

- -

Enjoy!

- -
-
- - -
- -
-

- Have a look at the program of the seL4 summit 2024. - We have a great line-up of interesting seL4 work, with a combination of - technical research and development, experience reports of seL4 in the field, - technical discussions and birds-of-a-feather sessions. -

-
-
- - seL4 summit - -

- Program at a glance. Go to the full program.

- - seL4 summit 2024 program - -

-
- -
-
- - -
- -
-

- We are pleased to announce that the two keynotes for the seL4 summit 2024 - will be Darren Cofer from - Collins Aerospace and - Ning Qu from - NIO. Darren will talk - about Industrial - Scale Proof Engineering for Critical Trustworthy Applications (INSPECTA) - and Ning about seL4 - in Software-Defined Vehicles: Vision, Roadmap, and Impact at NIO. -

-

- Darren Cofer - Darren Cofer is a Principal Fellow at Collins Aerospace. He - earned his PhD in Electrical and Computer Engineering from The University of - Texas at Austin. His area of expertise is developing and applying advanced - analysis methods and tools for verification and certification of - high-integrity systems. His background includes work with formal methods for - system and software analysis, the design of real-time embedded systems for - safety-critical applications, and the development of nuclear propulsion - systems in the U.S. Navy. Dr. Cofer has served as principal investigator on - many government-sponsored research programs, developing and using formal - methods for verification of safety and security properties. He served on - RTCA committee SC-205 developing new certification guidance for airborne - software (DO-178C) and was one of the developers of the Formal Methods - Supplement (DO-333). He is currently a member of SAE committee G-34 - developing certification guidance for the use of machine learning - technologies onboard aircraft. -

-

- Ning Qu - Ning Qu is a veteran in the autonomous driving industry and - a seasoned technical leader with extensive experience in operating systems, - high-performance runtime frameworks, and hardware-software co-design. - Currently, Ning serves as the Senior Director of the SkyOS team at NIO, - where he spearheads the development of SkyOS—a comprehensive suite of - platform software (including hypervisor, operating systems, and middleware) - for Software Defined Vehicles, showcased at NIO IN 2023. Before joining NIO, - Ning managed Waymo's ML Runtime team, playing a pivotal role in SF - Rider-only driverless launch on the Jaguar EV. At Baidu, he built the Apollo - OS from the ground up, establishing the foundation for the Apollo project. - Notably, he architected and developed Cyber RT and led Baidu's fully - driverless launch in 2020. Ning holds a B.S. and Ph.D. from Peking - University and has served as a researcher at CMU. -

-
-
-
- - -
- -

- The seL4 Foundation thanks UNSW Sydney for - becoming a Bronze sponsor of the seL4 - Summit 2024. -

-

- seL4 was created by the Trustworthy - Systems (TS) team, which is now part of the UNSW, a founding member of the seL4 Foundation. -

-

- The team has a track record of designing and implementing systems software for - performance and reliability, and using rigorous formal methods to prove that - they meet their security and reliability goals. Their aims are to: -

-
    -
  • shift the software industry away from ad-hoc, unreliable engineering - practices, and towards more principled and trustworthy methods; and
  • -
  • make verified software a default choice, especially in safety- and - security-critical systems.
  • -
-

- The team works with government and commercial partners, as well as the broader - software engineering community, to drive this change. -

-

- The seL4 Summit 2024 will take place - in Sydney, the hometown of Trustworthy - Systems and UNSW. -

-

- See here - if you are interested in sponsoring the seL4 summit 2024. -

- -
-
- - -
- -

- The seL4 Foundation thanks Proofcraft - for becoming a Bronze sponsor of the seL4 - Summit 2024. -

-

- Founded by the seL4 verification leaders, Proofcraft offers commercial support, - verification projects, training and consulting on formal verification in - general, and involving seL4 specifically. By applying mathematical - machine-checked software verification, Proofcraft increases critical software - systems' reliability, safety and security, for a verified future. -

-

- The seL4 Summit 2024 will take place - in Sydney, the hometown of Proofcraft. -

-

- See here - if you are interested in sponsoring the seL4 summit 2024. -

- - -
-
- - -
-seL4 summit logo -

The seL4 summit 2024 will be held in Sydney, -Australia, 15-17 October 2024.

- -

The seL4 summit will cover the complete seL4 ecosystem, consisting of the -verified microkernel, as well as all seL4-related technology, tools, -infrastructure, products, projects, and people.

- -

Tickets include:

- -
    -
  • Participation in the 3-day conference, including talks, keynotes, seL4 updates -& discussions
  • -
  • Networking with other seL4 experts and enthusiasts
  • -
  • Reception and dinner
  • -
- -

Register here

- -

The early bird cut-off date is 15 September 2024.

- -

Local seL4 Sydney-siders will look into organising some informal activities for -Monday 14 October 2024, before the summit kicks off, for anyone who wants to -join. Gernot may also organise a bush walk for the weekend before the summit. -Stayed tuned for more info!

- -
-
- - -
-seL4 Foundation logo -

The seL4 Foundation is pleased to welcome Apple as our -latest member.

- -

We are excited to see their interest in seL4 and look forward to seeing their -work with seL4.

- -
-
- - -
-Functional correctness proof -

We are extremely pleased to announce that the functional correctness proof for -seL4 on the 64-bit Arm architecture (AArch64) is complete!

- -

We congratulate to our member Proofcraft for this -great achievement, which marks a major milestone in the development of the seL4 -microkernel and its ecosystem.

- -

We also would like to express our immense gratitude to UK’s National Cyber -Security Centre (NCSC) for funding this work, which -is of great importance for the seL4 ecosystem.

- -

For more information check Proofcraft’s news item.

- -
-
- - -
-seL4 summit logo -

- Call For Presentations for the seL4 Summit 2024 -

-
    -
  • Share your seL4 work
  • -
  • Share your seL4 experience
  • -
  • Share your seL4 thoughts
  • -
-

- Check the full Call For - Presentations. To propose a talk, upload an abstract of one page or less - by 22 April 2024 to the - submission portal. -

-

- Also note the open - invitation for a 5-minute slot to talk about your seL4 deployment. -

- -
-
- - -
-seL4 summit logo -

- We are thrilled to announce our program committee for the seL4 Summit 2024. - Our awesome team comes - from various parts of the seL4 ecosystem: users, contributors, committers, - experts, advocates, researchers, and engineers. -

- -
-
-
- Ihor Kuz -
- -
- Kry10 -
-
- -
-
- Nick Spinale -
- -
- Colias Group -
-
- -
-
- NCSC -
- -
- NCSC -
-
- -
-
- Alison Felizzi -
- -
- Kry10 -
-
- -
-
- David Hardin -
- -
- Collins -
-
- -
-
- Everton de Matos -
- -
- TII -
-
- -
-
- Gernot Heiser -
- -
- UNSW -
-
- - - -
-
- John Hatcliff -
- -
- KSU -
-
- -
-
- - Lucy Parker -
- -
- -
-
- Matthew Brecknell -
- -
- Kry10 -
-
- -
-
- Michal Podhradsky -
- -
- Galois -
-
- -
-
- Robbie VanVossen -
- -
- Dornerworks -
-
-
-
-
- - -
-seL4 summit logo -

- It is our pleasure to confirm that the - seL4 Summit 2024 will be in: -

-

- Sydney, Australia, 15-17 Oct 2024. -

-

- We look forward to welcoming the community in the birthplace of seL4. -

-

- We will announce a Call for Presentations in the coming weeks. Stay tuned! -

-
- Sydney Harbour -
- -
-
- - -
- - - -
-
- - -
-
-
-
-
- -
- mastodon icon - youtube icon - linkedin icon -
-
- Copyright © 2024 seL4 Project a Series of LF Projects, LLC.
- seL4 is a trademark of LF Projects, LLC.
- For trademark usage guidelines, privacy and cookie policies, - and other applicable policies, as well as terms and conditions - governing this web site, please see - www.lfprojects.org - and the trademark guidelines. -
-
- - - -
-
- -
- - - -
- - diff --git a/PR_400/news/sel4-summit-last-call.mp4 b/PR_400/news/sel4-summit-last-call.mp4 deleted file mode 100644 index 0f124599..00000000 Binary files a/PR_400/news/sel4-summit-last-call.mp4 and /dev/null differ diff --git a/PR_400/news/sel4-summit-last-call.mp4.license b/PR_400/news/sel4-summit-last-call.mp4.license deleted file mode 100644 index 31518de8..00000000 --- a/PR_400/news/sel4-summit-last-call.mp4.license +++ /dev/null @@ -1,4 +0,0 @@ -Copyright 2020 seL4 Project a Series of LF Projects, LLC. -SPDX-License-Identifier: CC-BY-SA-4.0 - -This file contains a trademark of the seL4 Foundation. diff --git a/PR_400/redirects.json b/PR_400/redirects.json deleted file mode 100644 index 06a187ca..00000000 --- a/PR_400/redirects.json +++ /dev/null @@ -1 +0,0 @@ -{"/news.html":"https://sel4.github.io/website_pr_hosting/PR_400/news/","/Foundation/Summit/abstracts2022.html":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/abstracts2022.html","/Foundation/Summit/abstracts2022.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/abstracts2022.html","/Foundation/Summit/abstracts2023.html":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/abstracts2023.html","/Foundation/Summit/abstracts2023.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/abstracts2023.html","/Foundation/Summit/cfp.html":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2024/cfp.html","/About/Performance/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/About/Performance/","/About/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/About/","/About/seL4/index.html":"https://sel4.github.io/website_pr_hosting/PR_400/About/","/contact/mailman/":"https://lists.sel4.systems/postorius/lists/","/contact/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/contact/","/Foundation/Summit/2022/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/","/Foundation/Summit/2023/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/","/Foundation/Summit/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/","/Foundation/Membership/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Membership/","/Foundation/Governance/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Governance/","/Foundation/Join/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Join/","/Foundation/TSC/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/","/Foundation/Support/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Support/","/Foundation/Trademark/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Trademark/","/Foundation/Jobs/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Jobs/","/Foundation/Board/Minutes/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/","/Foundation/Board/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/","/Foundation/Contact/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Contact/","/Foundation/Services/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Services/","/Foundation/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Foundation/","/Learn/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Learn/","/Info/FAQ/":"https://docs.sel4.systems/projects/sel4/frequently-asked-questions.html","/Info/Docs/":"https://docs.sel4.systems/Documentation","/Info/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Info/","/Contribute/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Contribute/","/Use/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/Use/","/home.pml":"https://sel4.github.io/website_pr_hosting/PR_400/","/About/more-research.html":"https://sel4.github.io/website_pr_hosting/PR_400/Info/more-research.html"} \ No newline at end of file diff --git a/PR_400/robots.txt b/PR_400/robots.txt deleted file mode 100644 index 04785c56..00000000 --- a/PR_400/robots.txt +++ /dev/null @@ -1,2 +0,0 @@ -User-agent: * -Disallow: /*media=print diff --git a/PR_400/security.asc b/PR_400/security.asc deleted file mode 100644 index 9de2359c..00000000 --- a/PR_400/security.asc +++ /dev/null @@ -1,85 +0,0 @@ ------BEGIN PGP PUBLIC KEY BLOCK----- - -mQGNBGDbs1ABDADpc7IpnqszGQqrGrw+ExWD72wrAM+p3dsr2VGyMMa/ZZBUOKR4 -2RiB7+Kr2rXro1gvvoPBbhWjt5rd3xfCRyzzfoT0M1KHyb5Y8EXUqNrMSSDkr8qU -YYgtguTybydHD38DP4ztHK7V71ERelDBMyQ8LOw6m8dSuWBx9Jfhjpk1CdTyHBBw -WnXNOmkPBi6ZuKpm+wl1lQKclTZBh14q+81BvuvBl6qR5CLcE0GS4ab12x75aGxj -SPPhMf/zN75a6T15oZHiW3uTB8D0uCETtkQhekZm45dtDK20q7441H3f/PaUnYBX -A4GWS1v3pEwtDUo2/CqHhXfCwXas83KRkH1lcektJsNFgofH5bDsWaDNRex35NtA -KI0RLkbbNJtc603210rM3OqExJNK6L5MoY92IKIU4R9EIi2ZCt9ngUfIxcdCfjVg -AHJE025bcdAdtzoSZJNiTt5zIq2vLFE3L3nYWCndSj97JOxgyReaadvxnVzqwRwa -UY8foVjllm/RqjcAEQEAAbQzc2VMNCBGb3VuZGF0aW9uIHNlYyBjb250YWN0IDxz -ZWN1cml0eUBzZWw0LnN5c3RlbXM+iQHUBBMBCAA+AhsDBQsJCAcCBhUKCQgLAgQW -AgMBAh4BAheAFiEEdYLfIxBqim73RJPbaO+K98YhipoFAmSMAKoFCQdytFoACgkQ -aO+K98YhipqMBwv/RSwYulEx7iZMhMDM8O02KMkun0ExViLYkvtebz/hGkxch399 -EBHBcsJMiLbB3vkHxDukCAizO02V4AgimtDr/TDCx6RQfOuHYvC+Z+m9yoi9QeJe -svHseyAXWwyOyoIUvqU2TcjFRpq89I6p8lU4m0ZPZPlMNEACt5yGy9mIBisDMZZ0 -8AYLsKN1VfOLaGTKxDhEk9NtgXOoHgVMlX+Sq+P3NNksfZZUvDpEi13w/WnhJIl/ -YHKKzsH6BJlcDt52k40a+y+rL3qNOq7drv1XMN9qR3Mco0zDi1Gdpac+8oV19+EM -ofu8+yIdkS333vEzDOZqIlRC14irZtj7Y1O4LwLPPU+yRylee9pCZMyDSnaZqeRv -5X6L4pl0kQkHL6FS4DswblXWpYNAUXQC3kr0lHe9xAPGAHyVeN6GW4YkbmX5cLpN -v93uBnpOj3vVG7AdIcN9jwqCMFGqjk+lbxeFNpTNCW7r3wROnSCN5ZRS2j144IxK -ud5nVAig7LFI/a+7iQIzBBABCAAdFiEEIYI4ha4oP8DBzI5RIKhHzmq39fMFAmDb -5fQACgkQIKhHzmq39fMMww/9FBHAhoPIAPTl8KiXcMD3vSy9bUUgs0UH+HLC0QKK -qko+cr3ENV/KZaCoesWYhe8tgQXujJzs81LVLGiRSqgEJdmSlIJm30wQl+EaRIGT -IIet70lRdS/ZFmPXNySWT400NdgpqHUzMrfOVyxgAgR5Z7P8ChThfJl/s1W4QuKy -Z3Ydgu+mj9ww8wzUqMZ4oz2U5FLgygyXJ18PhSY7x3Y7tr23ASsMANGw1I1gAUpg -vziXx/PQdRDLcU7krd6OJw1Qe6TAbPQA1GFau6p24cQ9g0rP00lNiafWsicFgBMJ -NCM50HMSBstNBPn6A6omv9hF+43c+m6TDwF44qfQMqIerWFwSVTyB1mKqFezNas6 -VfwJ6BP6gfPn1sH4CWuOEVY37UVM3dMoNuOgOv4NEB3D3/XESw+BiAyJewb4iusw -qaKtu6ulvqcf+9b6jzEbiWCDJawLHizQoTgXulpdJnDZUruKwwVM6GJg6YH7Lr01 -ZBhHUhVxLG58EcbbCfOwtMYTtKDqA6Qb3qxHw49aeK0GWy4WOaJwzdvcighRakdN -Y9yY0S3u5CMxpVhnjKnMkHMAY5OIsi1Rvqso/0fcAqHcH6qSp7kUKMCbYxpBbjvm -7n6i0MA9AsfEUSX3gdUBBFWGpEYASnhfQA6PdCMfkRvq8yU1kfkHOimh+3nbLF0k -7825AY0EYNuzUAEMALGbK2sSUYS8ke3pwHfc5HiOWN9oxnIkB1d79yKxHQZ4kJMJ -9YRPsuhuF6DwJk0GXudtZ04U6vyl+Fr3ArnEBoeZ+sAHzFmm/3CbfYYLBGgh/BWO -hGIRP/9m89g4fKc/+DRM0gtcxArvAo47HUq+X4msbp3Eot7V5ZIyIoJ3YoLuEw98 -K3RCou3Sjvst0fy7X54ZafHzMEaX7x7Rs/TkW2YKMcActjMVJjtm+6tDfeQ7Yv71 -i8M0WTTUEX2W8OOm2i6/GoaJzCXIsfJNBJ4iagxi5sWaqOVl3zngHbYf6EIxsI4I -oKf8sNOtVN8KArXQw0HLhCLDRFn2sYp2FtJDOUzRq4+Sg5QAVuApUT7vJ/cKOT2d -C7VlzrrSCNlikxed65tZFVhXEgM7HKMG81SQwYYAAWTRe+gGtVEQH0vCk5rm5DAk -+Nxq+y6FZ0JVFQYuUsCVYY1piY/2JwNQ74oifHpF+YvC4EMlxpHEr38pcQafdIvy -4hdrHBQVTgkkBFSJWwARAQABiQG8BBgBCAAmAhsMFiEEdYLfIxBqim73RJPbaO+K -98YhipoFAmSMAN8FCQeGH4AACgkQaO+K98Yhipr7vAwAi0f/hk//ln3HJ+bu4ttH -wwjY7kQx9/7qh/r/pSGccKjDqpy0bv7H0+abVQhiqx3vIOyhJOfAwO47JZudy09J -6gn3+S/P+032zVvChRORI5w/Uhr7d4UUZpHI8+SxBQ9CakexwdQeU7JFQhh1WwDA -cg+X8a9+ITvesbUjl/pIy11luZ34HWWboImjSo7ArQauoapU/DHsCLTlv1SmbOxZ -bqkkAAv8ii9D2ra9MMiNifZOrUxoA/jQKyZXEZeriQ2p4g/ubADYCQ4QNSzoHKgF -Dxjyfi0peNjaZNL19uKKjSBL+s7cAW301VK2Q5PDyHkxuyEHiKMQV7IsqhMEVnS2 -iMtT4pxeuW/LEH+iS2rd0YUd03jG8IJ20oRLgBcfYja3QxPvCjEoZE4vrrjDWHYp -VUIT9BR9dtZw7Ip91uUTmYRFefBIFyjOw+gCgwNeqQV1oWl4f8hnHo/daYypdIBZ -7l6Ygrd7NYNuAumfwvbpM4k03WTVHO9/rHSwi2z+Cvn0uQINBGDb5XcBEADAyjkG -ZfB1nSUZUrSy+1kZ+rZbUlEamF2du5PWILgZCYvDAtkyS7KaRa29C8Hb4lDaT+XQ -59ArvnwXundp4mMuMY13bd4I8ommMGAoR2fCaUk1a48k0lEH67PiOrC3txZNEotZ -w6P7qEJTmkyFGIDUBL2IwMcwVY/3t05+mJG3jkjEJycmGUYma7zzKgpY2Sjs4uaU -3A4iD7eCkjZnx5AsQPpFB+57hlsd1q4C1Nl8po5N+wonhWZwEOTSCqFsS8Nffnve -dT4B5eX2JUkggc71UZb+0m3/t6oyDUEIsSfD/KJTeVsrvmpGaNqzoA202xc83pkU -aa94alK7xFw7GwCuZrW0dIWn3jzfWxPPTbGjbcsPoK17qBw9KM1lK7o21/1MinWE -aX33lh4kckbPzXBZopxCrrDW2IbY67PuHOIn5Sg8+zVqYkc402+6Cqga9dgtevHd -2uKnTotxHot6tfvFL306m/N4R0F0DuYx6sEYyfh495f5k+S7RoAnGBTOHFs/unVV -CL9IyTYbco8RqMXet7CNJzM3UtgL+r113eI5G8yuAZ868l7oy0SMsXUW8Yei6l6c -Irnc9pwnRTpEJVN/medXqI2xp81aVyNRhkvPtfrMN2n+BoM4O/XJ9+DqkFW2K8/P -pIz0onKsbw2LWz88LlyyDCimFxYdET2rjYLdHQARAQABiQPyBBgBCAAmAhsCFiEE -dYLfIxBqim73RJPbaO+K98YhipoFAmSMAOkFCQeGH4ACQMF0IAQZAQgAHRYhBEg4 -ZLDJ7Dtx1mcdPOwwdGR1o3lCBQJg2+V3AAoJEOwwdGR1o3lCLnQQAKyvPU4M5k8r -IxHP2NXVZVo3PuJq9YEPw6rB0pgX6/U7hhRG3l6OlWxs0XcN1f12bWRqx4f+m/3q -4UZVSsEn+NImvtrJdEJBO4gsjw/+iHAGRsCw0LlyYXPUHNoIZ0p3UYeoEofrWgHp -B5/WRNH/xopouSK9HRMxEV3FldYnKCEUeXHsPBC+A0hqaP4W4U42Vd9GSyYcnM8n -3j+Lf++ZJlVnFM9w6gSQ8EM5RP2tfGXqjJiiT5cDpXfNeAF8AODTvtKMoOLlDNas -GtIpE330br2OWTHVYAlRTf8FUqb1e2/okrzTfbF8uTy1KK+HaSpnN/n8BppbJ09i -8Ru9g4MHY2fkXxhesX1fz9laT0ZDlOo9D1YHEbosQy+hPJH8GDaiv8yYn8gPGtyU -FMsVREpz3oPZJs3hEIvBQNyc3sD9FS75x9RVKk7k8VxQuImIqv063FmnDb6YD04k -yU//+CikesS9yyvnSa8NUcR4tFdiA3qTxEbeVcjHNuwsXf3C5jfRp88ndBFH8I29 -u/V1HrOcUTeC0ba4ckYsj3ncLdSBV+cChcB22a3xNesqDfMopJoRSlTrCz9VbxmG -LPrk3B9rvCW/UeXiHh0aKkYtP2b7ezT3K6JpyvZ8oW0peQzNWfAtWJtIOFOFfYvl -Fhhiajr+BK6KEY3aAYkaQHSaPBv0t6x9CRBo74r3xiGKmovpDACsN9qaZhucAZ7L -LrgCPVQ9FI2PS7JXefc7XeNS5C47CQJi5mtCCIFEhs3lO/4CK+VVtFdJqSf0nsvU -I2hGDNyPzPDjEqub3XcVtnPyWm4IIzYCNn9r+HvEX8rQDPlm5EkiAhdIYTaipS9x -v8OM660qNI55sYeOqjvr7r2F3X8Itu39g04I+KYgUE/swoqcwJ+MDBVKf2KQyilu -pomCVn2PA/4GLT8Tkj2t+OOG36FdyMHqkyoXcfgz3YizmViKBMckQ91m1iN7NfdG -d2GNMjaCLa4dVIUsOs9Xk6zrJrs9KhO6/VkmXd0gD1ecw13WAN3IWTl3pShAGYxL -rJF9CUkYMCY2MFFva2V09x7K3+fnrj9q8nurQPZg38Mh42oGDpUC7MfnU9uQC2Ds -iHMUw8Y7mF+RNLMV5P70ByOTtBkjyY1kvaWid8GeJQoHg9U6oWuY/7+dVYb50Kv9 -72nkeiZNhkw44nmsbKm1tqmreyawJzG88TRUkdxyZtz3NT8mwDg= -=YhFB ------END PGP PUBLIC KEY BLOCK----- diff --git a/PR_400/sitemap.xml b/PR_400/sitemap.xml deleted file mode 100644 index 6ff905ba..00000000 --- a/PR_400/sitemap.xml +++ /dev/null @@ -1,684 +0,0 @@ - - - -https://sel4.github.io/website_pr_hosting/PR_400/news/2020.html - - -https://sel4.github.io/website_pr_hosting/PR_400/news/2021.html - - -https://sel4.github.io/website_pr_hosting/PR_400/news/2022.html - - -https://sel4.github.io/website_pr_hosting/PR_400/news/2023.html - - -https://sel4.github.io/website_pr_hosting/PR_400/news/2024.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/abstracts2022.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/abstracts2023.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2024/abstracts2024.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/bids.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/cfp.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2024/cfp.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/cfp.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Services/cog.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Services/dornerworks.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Services/endorsement.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Services/hc.html - - -https://sel4.github.io/website_pr_hosting/PR_400/news/ - - -https://sel4.github.io/website_pr_hosting/PR_400/About/Performance/ - - -https://sel4.github.io/website_pr_hosting/PR_400/About/ - - -https://sel4.github.io/website_pr_hosting/PR_400/contact/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2024/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Membership/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Governance/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Join/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Support/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Trademark/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Jobs/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Contact/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Services/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Learn/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Contribute/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Use/ - - -https://sel4.github.io/website_pr_hosting/PR_400/ - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Trademark/logo.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/more-research.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/principles.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/program.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2024/program.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/program.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/FAQ/proof.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2024/social-activities.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2024/submit.html - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/submit.html - - -https://sel4.github.io/website_pr_hosting/PR_400/About/seL4-whitepaper.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/200318-minutes-signed.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/200826-minutes-signed.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/201016-minutes-signed.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/210413-minutes-signed.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/210609-minutes-signed.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/211006-minutes-signed.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/2202-minutes-signed.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/2204-minutes-signed.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/221013-minutes-signed.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/2305-minutes-signed.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Board/Minutes/230928-minutes-unconfirmed.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Governance/seL4_Foundation_Fund_Charter.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Governance/seL4_Foundation_Key_Principles.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Governance/seL4_Foundation_Technical_Charter.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Join/Directed_Fund_Participation_Agreement.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Join/Participation_Agreement_Sample.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/seL4-Summit_Useful-Info.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d1_01_Welcome_June_Andronick.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d1_02_State_of_seL4-related_research_Gernot_Heiser.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d1_03_seL4_verification-roadmap_Proofcraft.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d1_04_Explaining_the_seL4_integrity_theorems_Matt_Brecknell.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d1_05_The_seL4_Core_Platform_(seL4CP)_Zoltan_Kocsis.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d1_06_The_seL4_Device_Driver_Framework_(sDDF)_Lucy_Parker.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d1_07_Multiprocessing_on_seL4_with_verified_kernels_Kent_Mcleod.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d1_08_Using_QEMU_to_extend_seL4_VirtIO_support_Hannu_Lyytinen.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d1_09_QEMU_as_prototyping_platform_for_seL4_systems_Axel_Heider.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d1_10_Porting_U-Boot_drivers_to_seL4_Mark_Jenkinson_&_Stephen_Williams.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d1_11_fence.t_hardware_support_for_preventing_microarchitectural_timing_channels_Nils_Wistoff.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_01_Kry10_Secure_Platform_Boyd_Multerer.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_02_Foundation_announcements.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_03_seL4_and_BEAM_a_match_made_in_Erlang_Ihor.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_04_Trustworthy_board_management_controllers_Daniel_Schwyn,_Ben_Fiedler.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_05_Rust_support_in_seL4_userspace_present_and_future_Nick_Spinale.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_06_Early_experiences_proving_the_correctness_of_a_network_stack_implementation_Alain_K%C3%A4gi.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_07_CASE_overview_Cyber_Assured_Systems_Engineering_Darren_Cofer.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_08_A_verified_architecture_for_trustworthy_remote_attestation_Grant_Jurgenson.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_09_FerrOS_Rust-y_unikernels_on_seL4_w_compile-time_assurances_Zack_Pierce.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_10_Make_seL4_an_ASIL-D_certified_system_Yuning_Liang.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_11_seL4_Summit_and_TCCOE_-_an_overview_Renato_Levy.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_01_Sebastian_Jester.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_03_Brad_Martin.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d2_12_funding_agencies_04_Shreekant_Thakkar.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d3_01_Overview_seL4_principles,_abstractions_and_use_Gernot_Heiser.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d3_02_Overview_what's_verified,_what's_not,_and_what_does_it_mean_June_Andronick.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d3_03_The_seL4_GitHub_test_suite_Gerwin_Klein.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d3_04_seL4_mainlining_experiences,_challenges,_and_solutions_Robbie.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d3_05_seL4_microkernel_for_virtualization_use-cases_%E2%80%9CThe_importance_of_a_standard_VMM%E2%80%9D.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d3_06_Improving_embedded_DevOps_with_seL4_VMM.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d3_07_Experience_teaching_seL4.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d3_08_DornerWorks%E2%80%99_VM_Composer.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2022/slides/d3_09_seL4_Foundation_overview,_update_and_vision.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-00-cofer.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-01-gage.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-02-brecknell.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-03-frost.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-04-klein.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-05-mcleod.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-06-kuz.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-07-ahvenj%C3%A4rvi.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-08-parker.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-09-heiser.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-10-guikema.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-11-felmeden.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-12-andronick.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-12-kuz.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day1-13-multerer.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-01-leffler.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-02-furgala.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-03-hussman.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-04-spinale.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-05-velickovic.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-06-hamlin.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-08-vanvossen.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-09-atkins.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-10-podhradsky.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-11-rollins.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-12-mao.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-13-wang.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day2-14-dematos.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day3-03-sebranek.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day3-04-dematos.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/Summit/2023/slides/day3-05-neises.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/tsc-meeting-2020-05-20.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/tsc-meeting-2021-01-29.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/tsc-meeting-2021-02-12.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/tsc-meeting-2021-12-17.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/tsc-meeting-2022-12-16.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/tsc-meeting-2023-09-12.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/tsc-meeting-2024-03-22.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/vote-2020-05-21.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/vote-2021-05-27.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/vote-2021-08-18.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/vote-2021-09-29.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/vote-2021-09-30.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/vote-2021-12-16.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/vote-2022-04-14.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/vote-2022-12-15.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/vote-2023-05-30.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Foundation/TSC/notes/vote-2023-07-17.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/GD-NICTA-whitepaper.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-brochure.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-0.0.1-rt-dev.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-1.0.0-rt-dev.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-1.0.4.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-10.0.0.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-10.1.0.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-10.1.1-mcs.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-10.1.1.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-11.0.0.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-12.0.0.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-12.1.0.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-13.0.0.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-2.0.0.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-2.1.0.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-3.0.0.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-3.0.1.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-3.1.0.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-3.2.0.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-4.0.0.pdf -2024-09-15T21:45:25+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-5.0.0.pdf -2024-09-15T21:45:25+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-5.1.0.pdf -2024-09-15T21:45:25+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-5.2.0-mcs.pdf -2024-09-15T21:45:25+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-5.2.0.pdf -2024-09-15T21:45:25+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-6.0.0.pdf -2024-09-15T21:45:25+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-7.0.0.pdf -2024-09-15T21:45:25+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-8.0.0.pdf -2024-09-15T21:45:25+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-9.0.0-mcs.pdf -2024-09-15T21:45:25+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-9.0.0.pdf -2024-09-15T21:45:25+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-9.0.1.pdf -2024-09-15T21:45:25+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-manual-latest.pdf -2024-09-15T21:45:24+00:00 - - -https://sel4.github.io/website_pr_hosting/PR_400/Info/Docs/seL4-spec.pdf -2024-09-15T21:45:25+00:00 - -