Filters








201 Hits in 5.0 sec

Building Certified Libraries for PCC: Dynamic Storage Allocation [chapter]

Dachuan Yu, Nadeem A. Hamid, Zhong Shao
2003 Lecture Notes in Computer Science  
In particular, we introduce a low-level language, CAP, for building certiÿed programs and present a certiÿed library for dynamic storage allocation.  ...  As a result, many low-level system libraries (e.g., memory management) have not yet been handled.  ...  We use CAP to build a certiÿed library for dynamic storage allocation, and further use this library to build a certiÿed program whose correctness proof can be mechanically checked.  ... 
doi:10.1007/3-540-36575-3_25 fatcat:awcqhzzakfcm5p6yzviemkc6mu

Building certified libraries for PCC: dynamic storage allocation

Dachuan Yu, Nadeem A. Hamid, Zhong Shao
2004 Science of Computer Programming  
In particular, we introduce a low-level language, CAP, for building certiÿed programs and present a certiÿed library for dynamic storage allocation.  ...  As a result, many low-level system libraries (e.g., memory management) have not yet been handled.  ...  We use CAP to build a certiÿed library for dynamic storage allocation, and further use this library to build a certiÿed program whose correctness proof can be mechanically checked.  ... 
doi:10.1016/j.scico.2004.01.003 fatcat:qsywunae75bbrkuum2paeybf5y

Clean-Slate Development of Certified OS Kernels

Zhong Shao
2015 Proceedings of the 2015 Conference on Certified Programs and Proofs - CPP '15  
Programming languages for building end-to-end certified kernels. OS kernels must address a multitude of abstraction layers and programming concerns.  ...  flow control), and then link everything together to build end-to-end certified systems.  ...  The LCF approach to building a theorem prover for a meta logic would amount to building a library inside ML that contained implementations for each axiom, yielding a term of the abstract thm datatype.  ... 
doi:10.1145/2676724.2693180 dblp:conf/cpp/Shao15 fatcat:ffiwrhqsdnbcflselj27eevbre

Interfacing Hoare Logic and Type Systems for Foundational Proof-Carrying Code [chapter]

Nadeem Abdul Hamid, Zhong Shao
2004 Lecture Notes in Computer Science  
In this paper, we introduce a Foundational Proof-Carrying Code (FPCC) framework for constructing certified code packages from typed assembly language that will interface with a similarly certified runtime  ...  valid OMB control number. certified code packages from typed assembly language that will interface with a similarly certified runtime system.  ...  Acknowledgments We would like to thank the anonymous referees for their comments on an earlier version of this paper.  ... 
doi:10.1007/978-3-540-30142-4_10 fatcat:ivxp7gh5zbagpdnrukxmucdayu

A Syntactic Approach to Foundational Proof-Carrying Code

Nadeem A. Hamid, Zhong Shao, Valery Trifonov, Stefan Monnier, Zhaozhong Ni
2003 Journal of automated reasoning  
Finally, I demonstrate an application of the framework to a typed assembly language with a region-based memory management library, where the library is certified using low-level Hoare logic reasoning.  ...  Now, the complete combination of compiled high-level code and low-level system libraries can be verified for safe operation according to a user's safety policy.  ...  An initial version was introduced in joint work with Yu [97] and used to certify a dynamic storage allocation library.  ... 
doi:10.1023/b:jars.0000021012.97318.e9 fatcat:j4hktdoafbb6njacssl3atbtq4

Safety checking of machine code

Zhichen Xu, Barton P. Miller, Thomas Reps
2000 Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation - PLDI '00  
This approach opens up the possibility of being able to certify code produced by any compiler from any source language, which gives the code producers more freedom in choosing the language in which they  ...  We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system.  ...  Acknowledgments We thank Rastislav Bodik, Jianjun Chen, Brian Wylie, Ari Tamches, and Philip Roth for their feedback on the paper.  ... 
doi:10.1145/349299.349313 dblp:conf/pldi/XuMR00 fatcat:yqgkxf3c7jfbtmxtra2c6jwkwq

Safety checking of machine code

Zhichen Xu, Barton P. Miller, Thomas Reps
2000 SIGPLAN notices  
This approach opens up the possibility of being able to certify code produced by any compiler from any source language, which gives the code producers more freedom in choosing the language in which they  ...  We show how to determine statically whether it is safe for untrusted machine code to be loaded into a trusted host system.  ...  Acknowledgments We thank Rastislav Bodik, Jianjun Chen, Brian Wylie, Ari Tamches, and Philip Roth for their feedback on the paper.  ... 
doi:10.1145/358438.349313 fatcat:d7vbme6htjctpmdbqxcphaxyda

Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance [article]

Weijie Liu, Wenhao Wang, Xiaofeng Wang, Xiaozhu Meng, Yaosong Lu, Hongbo Chen, Xinyu Wang, Qingtao Shen, Kai Chen, Haixu Tang, Yi Chen, Luyi Xing
2020 arXiv   pre-print
To this end, this paper presents CAT, a new model for TEE-based confidential attestation.  ...  For this purpose, the data-processing program is supposed to be open to the owner, so its functionality can be evaluated before trust can be established.  ...  Building Bootstrap Enclave Following the design in Section 4.4, we implemented a Dynamic Loading after RA mechanism for the bootstrap enclave.  ... 
arXiv:2007.10513v1 fatcat:p23pajyac5hhvcszvc5els4ap4

Automated and certified conformance to responsiveness policies

Joseph C. Vanderwaart, Karl Crary
2005 Proceedings of the 2005 ACM SIGPLAN international workshop on Types in languages design and implementation - TLDI '05  
We also describe a compilation strategy for a generalpurpose programming language that can enforce and certify conformance to such policies automatically without any sophisticated program analyses.  ...  This paper presents a certified code solution to a problem in grid computing, namely, controlling the CPU usage of untrusted programs.  ...  As far as space is concerned, Hofmann's language forbids programs to allocate new storage, and the linear type system is used to allow already-allocated space to be reused in a type-safe way.  ... 
doi:10.1145/1040294.1040302 dblp:conf/tldi/VanderwaartC05 fatcat:yqmm2dzzbzc5hlogb4rkfxof2y

JRes

Grzegorz Czajkowski, Thorsten von Eicken
1998 SIGPLAN notices  
Across the board, Java has emerged as the language of choice for Internet-oriented software.  ...  Recent research ideas concerning dynamic operating system extensibility are finding their way into the commercial domain, resulting in designs of extensible databases and Web servers.  ...  ACKNOWLEDGEMENTS The authors are grateful to Chi-Chao Chang, Chris Hawblitzel, Li Gong, Greg Morrisett, and Praveen Seshadri for for comments and discussions.  ... 
doi:10.1145/286942.286944 fatcat:6fhqbv2jzrfcbngubwvb4avm6a

JRes

Grzegorz Czajkowski, Thorsten von Eicken
1998 Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications - OOPSLA '98  
Across the board, Java has emerged as the language of choice for Internet-oriented software.  ...  Recent research ideas concerning dynamic operating system extensibility are finding their way into the commercial domain, resulting in designs of extensible databases and Web servers.  ...  ACKNOWLEDGEMENTS The authors are grateful to Chi-Chao Chang, Chris Hawblitzel, Li Gong, Greg Morrisett, and Praveen Seshadri for for comments and discussions.  ... 
doi:10.1145/286936.286944 dblp:conf/oopsla/CzajkowskiE98 fatcat:txv5cpjmuvaqhja3wwfwlkyqme

Automated Certification of Non-Interference in Rewriting Logic [chapter]

Mauricio Alba-Castro, María Alpuente, Santiago Escobar
2009 Lecture Notes in Computer Science  
In this paper we propose a certification technique for noninterference of Java programs based on rewriting logic, a very general logical and semantic framework efficiently implemented in the high-level  ...  The security certificate is automatically generated by the software producer.In [1] we proposed an abstract PCC methodology for certifying Java source code that is based on rewriting logic.  ...  In [14] , a sufficiently large subset of full Java 1.4 language is specified in Maude, including multithreading, inheritance, polymorphism, object references, and dynamic object allocation.  ... 
doi:10.1007/978-3-642-03240-0_16 fatcat:b6witn5lznfahld67y6sepqzom

A Modified SMO Algorithm for SVM Regression and Its Application in Quality Prediction of HP-LDPE [chapter]

Hengping Zhao, Jinshou Yu
2005 Lecture Notes in Computer Science  
-Policy Coordination Committee PCC -Portland Cement Concrete PCC -Primary Combustion Chamber PCCB -Pollution Control Coordinating Board PCCW -Public Citizens Congress Watch PCDD -Polychlorinated  ...  -Cincinnati Disk Storage Annual Report STORET -Storage and Retrieval of Water-Related Data STORM -Storage, Treatment, Overflow, Runoff Model jjdsenv@att.net website: www.jjdsenvironmental.com STROLE -  ... 
doi:10.1007/11539087_79 fatcat:ydvvlhkkh5grhh7r6rv66y2tia

SAFE-OPS: An approach to embedded software security

Joseph Zambreno, Alok Choudhary, Rahul Simha, Bhagi Narahari, Nasir Memon
2005 ACM Transactions on Embedded Computing Systems  
Results demonstrate that this framework can be the successful basis for the development of embedded applications that meet a wide range of security and performance requirements.  ...  ACKNOWLEDGMENTS The authors would like to thank the anonymous referees for their valuable feedback on the earlier drafts of this paper.  ...  This creates difficulties for the developer who wants to secure an entire application, but is dependent on statically compiled 3rd-party libraries for the generation of executables.  ... 
doi:10.1145/1053271.1053279 fatcat:d5yzwdjhtzdhhoezgs4kli4pla

Principled scavenging

Stefan Monnier, Bratin Saha, Zhong Shao
2001 SIGPLAN notices  
Building on an idea by Wang and Appel, we present a series of new techniques for writing type-safe stop-and-copy garbage collectors.  ...  Building on an idea by Wang and Appel, we present a series of new techniques for writing type-safe stop-and-copy garbage collectors.  ...  But all these certifying-compiler projects (e.g., PCC, TAL) still crucially rely on the correctness of a tracing garbage collector for their safety.  ... 
doi:10.1145/381694.378817 fatcat:3ppb2w2dsja4pjtjxcx6y2muje
« Previous Showing results 1 — 15 out of 201 results