79,799 Hits in 2.5 sec

Formalizing and Verifying a Modern Build Language [chapter]

Maria Christakis, K. Rustan M. Leino, Wolfram Schulte
2014 Lecture Notes in Computer Science  
CLOUDMAKE is a software utility that automatically builds executable programs and libraries from source code-a modern MAKE utility.  ...  Its design gives rise to a number of possible optimizations, like cached builds, and the executables to be built are described using a functional programming language.  ...  Conclusion We have formally presented and mechanically verified the central algorithms of CLOUD-MAKE, a modern build language whose design allows for a number of possible optimizations.  ... 
doi:10.1007/978-3-319-06410-9_43 fatcat:3i54ualkovcanmx4q2vk2s6trm

The Application of Formal Methods to Real-World Cryptographic Algorithms, Protocols, and Systems

Nicky Mouha, Asmaa Hailane
2021 Computer  
An alternative is to develop a domain-specific crypto-oriented language, such as Cryptol 16 or Jasmin, and build a targeted verified compiler for it.  ...  The High-Assurance Cryptographic Library (HACL*) (, a verified library of modern cryptographic primitives written in F*, includes modern cryptographic algorithms that are used  ... 
doi:10.1109/mc.2020.3033613 fatcat:qsrdehgerbakbibfkp7jpvx5wa

Methodology and Tools for Development and Verification of formal fUML Models of Requirements and Architecture for Complex Software and Hardware Systems
Методика и средства разработки и верификации формальных fUML моделей требований и архитектуры сложных программно-технических систем

A.V. Samonov, G.N. Samonova
2018 Proceedings of the Institute for System Programming of RAS  
To solve the existing problems, we propose to develop a special unified environment for the development, modeling and testing formal models of requirements and architecture of complex software and hardware  ...  We establish that least provided by model, algorithmic and software solutions are issues related to the development of a complete and correct set of requirements, as well as the formalization and verification  ...  Algorithm for Building a Formal Model Requirements The scheme of the algorithm that implements the second stage of the procedure of building a formal requirements model using the fUML language is shown  ... 
doi:10.15514/ispras-2018-30(5)-8 fatcat:6txv3kcj25bfdnmqgx7sl6l7wu

A Roadmap for High Assurance Cryptography [chapter]

Harry Halpin
2018 Lecture Notes in Computer Science  
A new unified API with both formally verified primitives and an easy-to-use interface is needed to replace OpenSSL in future security-critical applications. 1. first defining clear security goals; 2. then  ...  code; often even without a clear definition of security goals, and essentially everywhere without high-assurance software in the TCB.  ...  Harry Halpin would like to thank Peter Schwabe for many of the original ideas in this paper and for some of the text itself, while taking sole responsibility for any lack of clarity or problems with this  ... 
doi:10.1007/978-3-319-75650-9_6 fatcat:fxwimrpesjddnjfvflveuqbz2q

Position paper: the science of deep specification

Andrew W. Appel, Lennart Beringer, Adam Chlipala, Benjamin C. Pierce, Zhong Shao, Stephanie Weirich, Steve Zdancewic
2017 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
One contribution of 8 to a discussion meeting issue 'Verified trustworthy software systems' . Modern hardware and software are monstrously complex.  ...  (iv) The proof scripts yield formal proof objects in a variant of the calculus of inductive constructions (CiC) for which checking of proofs amounts to type checking and is fully automatic and independent  ...  We thank the graduate students and post-doctoral researchers of our research groups for their contributions, and our external academic and industrial collaborators for their participation.  ... 
doi:10.1098/rsta.2016.0331 pmid:28871056 fatcat:ztgho4isajbchi4bghlegxns7m

Toward a Dependability Case Language and Workflow for a Radiation Therapy System

Michael D. Ernst, Dan Grossman, Jon Jacky, Calvin Loncaric, Stuart Pernsteiner, Zachary Tatlock, Emina Torlak, Xi Wang, Marc Herbstritt
2015 Summit on Advances in Programming Languages  
We present a near-future research agenda for bringing a suite of modern programming-languages verification tools -specifically interactive theorem proving, solver-aided languages, and formally defined  ...  domain-specific languages -to the development of a specific safety-critical system, a radiotherapy medical device.  ...  After all, we can now build substantial formally verified software infrastructure like the CompCert compiler [30] , a reference monitor for a modern web-browser [24] , a full operating system kernel  ... 
doi:10.4230/lipics.snapl.2015.103 dblp:conf/snapl/ErnstGJLPTTW15 fatcat:xvbcnidp2jhz7bp4qc2svmns34

Lessons from the JML Project [chapter]

Gary T. Leavens, Curtis Clifton
2008 Lecture Notes in Computer Science  
Synergy in the JML project comes from a shared specification language, and thus holds several lessons for the verifying compiler grand challenge.  ...  Another important lesson is that, to support such a specification language, the project needs to involve groups doing research on extensible compilers and integrated development environments.  ...  The work of Leavens and Clifton was supported in part by the US National Science Foundation through grants CCF-0428078 and CCF-0429567.  ... 
doi:10.1007/978-3-540-69149-5_15 fatcat:bnaqn7rswne4niosuo55fchxx4

Tutorial: Practical verification of network programs

Nate Foster, Arjun Guha, Mark Reitblatt, Cole Schlesinger
2013 2013 Formal Methods in Computer-Aided Design  
Since OpenFlow-programmable switches conform to a welldefined interface, it is possible to reason about their behavior and even build formal models of their operation.  ...  To address this issue, we will introduce Frenetic, a highlevel language for programming SDN.  ...  CONCLUSION We hope this tutorial will show you how programming languages technology and formal methods can be used to both build networks and verify important network properties.  ... 
doi:10.1109/fmcad.2013.7035518 dblp:conf/fmcad/FosterGRS13 fatcat:ctl3limn3bc6ll7ytzcb4i3xcu

Formal Foundations for Networking (Dagstuhl Seminar 15071)

Nikolaj Bjorner, Nate Foster, Philip Brighten Godfrey, Pamela Zave, Marc Herbstritt
2015 Dagstuhl Reports  
This seminar brought together leading researchers and practitioners from the fields of formal methods, networking, programming languages, and security, to investigate the task of developing formal foundations  ...  How can we exploit these insights to build practical tools for verifying properties in the presence of replicated state, asynchronous communication, and unexpected failures?  ...  It builds an adequate formal model of a whole network and checks every event, such as installation, deletion, or modification of rules, port and switch up and down events, against a set formal requirements  ... 
doi:10.4230/dagrep.5.2.44 dblp:journals/dagstuhl-reports/BjornerFGZ15 fatcat:givomdthwrgrveoenb264jheby

PhD Abstracts

2020 Journal of functional programming  
As a service to the community, twice per year the Journal of Functional Programming publishes the abstracts from PhD dissertations completed during the previous year.  ...  The proposed formalization plays a vital role in formally verifying the solutions of differential equations in both the time and the frequency domain and thus facilitates formal dynamical analysis of these  ...  We apply different strategies to test and formalize two major programming languages: the functional Lambda calculus and the modern object-oriented calculus Featherweight Java.  ... 
doi:10.1017/s0956796820000167 fatcat:dxjjb46ngvbc5pteeekly6rqem

Analysis of the consistency of enterprise architecture models using formal verification methods

Eduard Babkin, Nikita Ponomarev
2017 Business Informatics  
As an enterprise architecture description language, we use the modern open and independent ArchiMate standard.  ...  Therefore, it is necessary to formalize the requirements for architecture and be able to automatically verify them.  ...  As the language of the enterprise architecture description, a modern, open and free language -ArchiMate is used in the work [6] .  ... 
doi:10.17323/1998-0663.2017.3.30.40 fatcat:43yf47uaczakxd3qpeyl3z4zeq

Security and Privacy of Protocols and Software with Formal Methods [chapter]

Fabrizio Biondi, Axel Legay
2016 Lecture Notes in Computer Science  
This track provides numerous contributions to the formal modeling of security and anonymity properties and the creation of tools to verify them on large-scale software projects.  ...  The academic community needs to invest more effort in the formal modelization of security and anonymity properties, providing a deeper understanding of the underlying concepts and challenges and allowing  ...  To overcome these issues, requirements must be specified using a formal and unambiguous language, traced through the system architecture, and automatically verified throughout the development process.  ... 
doi:10.1007/978-3-319-47166-2_61 fatcat:ygef2jw6dneabg7dgdskc26pz4

A Formal Model for Dynamically Adaptable Services [article]

Jorge Fox
2010 arXiv   pre-print
This paper elaborates a well-founded model and theory of DA, introducing formalisms written using COWS. The model is evaluated for reliability and responsiveness properties with the model checker CMC.  ...  This motivates a need to ensure the correct behaviour of the adapted systems, and its continuing compliance to time bounds and other QoS properties.  ...  Formal methods have been in use for a long time in the computer science community and a number of new approaches and formal languages is available.  ... 
arXiv:1011.2652v1 fatcat:qx6ywa5fjjbcbh4wuqjg2vllpa

From a Proven Correct Microkernel to Trustworthy Large Systems [chapter]

June Andronick
2011 Lecture Notes in Computer Science  
The next big step in the challenge of building truly trustworthy systems is to provide a framework for developing secure systems on top of seL4.  ...  The seL4 microkernel was the world's first general-purpose operating system kernel with a formal, machine-checked proof of correctness.  ...  A proven correct OS kernel The challenges in providing a "formally proven correct, general-purpose microkernel" are multiple, but all mainly come down to building a system that is both verifiable and suitable  ... 
doi:10.1007/978-3-642-18070-5_1 fatcat:yeoqx3v4tnf5pakxffeucoslfe

Practical Formal Methods for Real World Cryptography (Invited Talk)

Karthikeyan Bhargavan, Prasad Naldurg, Michael Wagner
2019 Foundations of Software Technology and Theoretical Computer Science  
We describe a tool chain and framework based on the F * programming language to formally specify, verify and compile high-performance cryptographic software that is secure by design.  ...  This tool chain has been used to build a verified cryptographic library called HACL * , and provably secure implementations of sophisticated secure communication protocols like Signal and TLS.  ...  We use the F * programming language and verification framework [43] to build HACL * , a library of verified cryptographic algorithms in C.  ... 
doi:10.4230/lipics.fsttcs.2019.1 dblp:conf/fsttcs/BhargavanN19 fatcat:uyj2x66q5rcr5ns6zidmsto7yi
« Previous Showing results 1 — 15 out of 79,799 results