Filters








289 Hits in 0.53 sec

The Boogie Verification Debugger (Tool Paper) [chapter]

Claire Le Goues, K. Rustan M. Leino, Michał Moskal
2011 Lecture Notes in Computer Science  
BVD plugins have been implemented for two state-of-the-art verifiers, VCC and Dafny.  ...  The Boogie Verification Debugger (BVD) is a tool that lets users explore the potential program errors reported by a deductive program verifier.  ...  There has also been work to improve the user experience with software model checkers. The typical output of a model checker is a full execution trace leading to an error.  ... 
doi:10.1007/978-3-642-24690-6_28 fatcat:stkuyghxqrbu7j4xmgf5dfakvy

Dafny Meets the Verification Benchmarks Challenge [chapter]

K. Rustan M. Leino, Rosemary Monahan
2010 Lecture Notes in Computer Science  
A suite of verification benchmarks for software verification tools and techniques, presented at VSTTE 2008 [11], provides an initial catalogue of benchmark challenges for the Verified Software Initiative  ...  Each of the eight programs is fed to the Dafny verifier, which without further user interaction automatically performs the verification in a few seconds.  ...  Acknowledgments We thank the authors of [11] and their research students for feedback on our initial attempts at these verification benchmarks.  ... 
doi:10.1007/978-3-642-15057-9_8 fatcat:bbnuys42ava4jmmt5ru565zhua

Formal Verification of the Ethereum 2.0 Beacon Chain [article]

Franck Cassez and Joanne Fuller and Aditya Asgaonkar
2021 arXiv   pre-print
Our software artefact is available at https://github.com/ConsenSys/eth2.0-dafny.  ...  We have formally specified and verified the absence of runtime errors in (a large and critical part of) the Beacon Chain reference implementation using the verification-friendly language Dafny.  ...  Our software artefact with the code and proofs in Dafny is freely available at https://github.com/ConsenSys/eth2.0-dafny. Related Work.  ... 
arXiv:2110.12909v1 fatcat:76mjydklyvh2thjgmbhx3h4h3m

Integrated Environment for Diagnosing Verification Errors [chapter]

Maria Christakis, K. Rustan M. Leino, Peter Müller, Valentin Wüstholz
2016 Lecture Notes in Computer Science  
To help a user with this task, this paper presents an extension of the Dafny IDE that seamlessly integrates the Dafny verifier, a dynamic symbolic execution engine, a verification debugger, and a technique  ...  The main challenge in debugging a verification failure is to determine whether the complaint is genuine or spurious, and to obtain enough information about the failed verification attempt to debug the  ...  Besides integrating BVD into the Dafny IDE, we provide easy access to excerpts from the counterexample through hover text.  ... 
doi:10.1007/978-3-662-49674-9_25 fatcat:wj3x2pop75gwtiwfg6s5z6sboq

Verifying security invariants in ExpressOS

Haohui Mai, Edgar Pek, Hui Xue, Samuel Talmadge King, Parthasarathy Madhusudan
2013 Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems - ASPLOS '13  
In our use of formal methods, we focus solely on proving that our OS implements our security invariants correctly, rather than striving for full functional correctness, requiring significantly less verification  ...  We thank Rustan Leino for encouraging us to use Dafny for our verification tasks. We also thank Shuo Tang for implementing an earlier version of the system.  ...  Also, this principle enables combining lightweight techniques like code contracts with heavywieght techniques like Dafny annotations [22] to further reduce verification effort.  ... 
doi:10.1145/2451116.2451148 dblp:conf/asplos/MaiPXKM13 fatcat:e6sxytmbrbd2dmgs2aq4qb53py

VerifyThis 2015

Marieke Huisman, Vladimir Klebanov, Rosemary Monahan, Michael Tautschnig
2016 International Journal on Software Tools for Technology Transfer (STTT)  
VerifyThis 2015 was a one-day program verification competition which took place on April 12th, 2015 in London, UK, as part of the European Joint Conferences on Theory and Practice of Software (ETAPS 2015  ...  It concludes with the results of the competition and some ideas and thoughts for future instalments of VerifyThis.  ...  Their contributions helped us to support participants with travel grants, and to finance the various prizes.  ... 
doi:10.1007/s10009-016-0438-x fatcat:7yknibf43nhyzbood4ylzohpyy

Verifying security invariants in ExpressOS

Haohui Mai, Edgar Pek, Hui Xue, Samuel Talmadge King, Parthasarathy Madhusudan
2013 SIGPLAN notices  
In our use of formal methods, we focus solely on proving that our OS implements our security invariants correctly, rather than striving for full functional correctness, requiring significantly less verification  ...  We thank Rustan Leino for encouraging us to use Dafny for our verification tasks. We also thank Shuo Tang for implementing an earlier version of the system.  ...  Also, this principle enables combining lightweight techniques like code contracts with heavywieght techniques like Dafny annotations [22] to further reduce verification effort.  ... 
doi:10.1145/2499368.2451148 fatcat:e3kqzgbohrf2bbtuirtb6nmngy

Robust, generic, modularly-verified map

Derek Bronish, Hampton Smith
2011 Proceedings of the 5th ACM workshop on Programming languages meets program verification - PLPV '11  
The foundational-yet-sophisticated nature of this concept makes it an ideal benchmark for software verification efforts.  ...  The concept of associating keys with values is important for a wide range of applications and it can accommodate a broad variety of implementations with diverse performance profiles.  ...  The specification of Dafny Map's Add procedure, which is used to define a new mapping As was the case with Dafny, this implementation is fully and automatically verified.  ... 
doi:10.1145/1929529.1929533 dblp:conf/plpv/BronishS11 fatcat:sltppnqwafcdbkavyaaa7aey5m

Jasmin

José Bacelar Almeida, Pierre-Yves Strub, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
The language is designed for enhancing portability of programs and for simplifying verification tasks.  ...  Jasmin is a framework for developing high-speed and high-assurance cryptographic software. The framework is structured around the Jasmin programming language and its compiler.  ...  N000141210914 and N000141512750, by Google Chrome University, by Cátedra PT-FLAD em Smart Cities & Smart Governance, and by Project "TEC4Growth -Pervasive Intelligence, Enhancers and Proofs of Concept with  ... 
doi:10.1145/3133956.3134078 dblp:conf/ccs/AlmeidaBBBGLOPS17 fatcat:vyxyeu3mtvff7bsios5hdfj5se

Komodo

Andrew Ferraiuolo, Andrew Baumann, Chris Hawblitzel, Bryan Parno
2017 Proceedings of the 26th Symposium on Operating Systems Principles - SOSP '17  
We show that the approach is practical and performant with a concrete implementation of a prototype in verified assembly code on ARM TrustZone.  ...  Intel SGX promises powerful security: an arbitrary number of user-mode enclaves protected against physical attacks and privileged software adversaries.  ...  ACKNOWLEDGEMENTS We thank the anonymous reviewers and our shepherd George Candea for valuable feedback, and Rustan Leino and Jay Lorch for help with Dafny.  ... 
doi:10.1145/3132747.3132782 dblp:conf/sosp/FerraiuoloBHP17 fatcat:wsua4s3a3nb4dcgtyfpzjtbqki

The COST IC0701 Verification Competition 2011 [chapter]

Thorsten Bormer, Marc Brockschmidt, Dino Distefano, Gidon Ernst, Jean-Christophe Filliâtre, Radu Grigore, Marieke Huisman, Vladimir Klebanov, Claude Marché, Rosemary Monahan, Wojciech Mostowski, Nadia Polikarpova (+5 others)
2012 Lecture Notes in Computer Science  
This paper reports on the experiences with the program verification competition held during the FoVeOOS conference in October 2011. There were 6 teams participating in this competition.  ...  We conclude with a discussion about the value of such competitions and lessons that can be learned from them. 1 http://www.key-project.org 2  ...  Both team members are novice users of Dafny, however with extensive experience in other Boogie-based verification tools.  ... 
doi:10.1007/978-3-642-31762-0_2 fatcat:jt5hy4ioevewfcubpq4lq4o4qu

Heaps and Data Structures: A Challenge for Automated Provers [chapter]

Sascha Böhme, Michał Moskal
2011 Lecture Notes in Computer Science  
Software verification is one of the most prominent application areas for automatic reasoning systems, but their potential improvement is limited by shortage of good benchmarks.  ...  In contrast, we propose a family of benchmarks in first-order logic with equality which is scalable, relatively simple to understand, yet closely resembles difficult verification conditions stemming from  ...  Moreover, they give SMT solvers significant edge over ATPs in software verification scenarios.  ... 
doi:10.1007/978-3-642-22438-6_15 fatcat:6psbiqawtvay5mltgy2q2pynia

Heterogeneous Verification of an Autonomous Curiosity Rover [article]

Rafael C. Cardoso, Marie Farrell, Matt Luckcuck, Angelo Ferrando, Michael Fisher
2020 arXiv   pre-print
This use of heterogeneous verification techniques is essential to provide guarantees about the nodes at different abstraction levels, and allows us to bring together relevant verification evidence to provide  ...  Our Dafny model has functions for accessing the environmental conditions at a given waypoint e.g. getEnvironment() and getWind().  ...  Dafny is used in the static verification of functional program correctness.  ... 
arXiv:2007.10045v1 fatcat:pxni3bsdyjbcplxwiwe7z264nu

Automated Verification of Nested DFS [chapter]

Jaco C. van de Pol
2015 Lecture Notes in Computer Science  
We use Dafny to annotate the algorithm with invariants and a global specification. The global specification requires that NDFS indeed solves the accepting cycle problem.  ...  In this paper we demonstrate the automated verification of the Nested Depth-First Search (NDFS) algorithm for detecting accepting cycles.  ...  The verification was run with Dafny version 1.8.2.10419 on a Macbook 2.7 GHz Intel Core i7 processor with 8GB RAM under MacOS 10.10.1 and Mono version 3.2.5.  ... 
doi:10.1007/978-3-319-19458-5_12 fatcat:ahgw6v7fcbdehnv4lmfgysenvm

Some usability hypotheses for verification

David J. Pearce
2015 Proceedings of the 6th Workshop on Evaluation and Usability of Programming Languages and Tools - PLATEAU 2015  
Despite this, very little is known about the effect of using such tools on software development.  ...  The idea of specifying and verifying software to eliminate errors has been studied extensively over the last three decades or more.  ...  Hoare logic underpins verification tools such as Dafny, Spec# and Whiley [1] . As such it is natural to connect such systems with Hoare logic when teaching.  ... 
doi:10.1145/2846680.2846691 dblp:conf/oopsla/Pearce15 fatcat:j4nuusepbjhyrltep7sj2cmmcm
« Previous Showing results 1 — 15 out of 289 results