142 Hits in 6.8 sec

Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine [article]

Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet
2021 arXiv   pre-print
We propose RUSTInA, the first automated technique for formally checking inline assembly compliance, with the extra ability to propose (proven) patches and (optimization) refinements in certain cases.  ...  Therefore, the adequacy between the assembly chunk and its interface (named compliance) is of primary importance, as such compliance issues can lead to subtle and hard-to-find bugs.  ...  V) to automatically verify the compliance of inline assembly chunks, to generate a corrective patch for the majority of compliance issues and additionally to suggest interface refinements; • thorough experiments  ... 
arXiv:2102.07485v1 fatcat:shzoxxhnafcxnn6gplqfdhsntm

Comprehensive formal verification of an OS microkernel

Gerwin Klein, June Andronick, Kevin Elphinstone, Toby Murray, Thomas Sewell, Rafal Kolanski, Gernot Heiser
2014 ACM Transactions on Computer Systems  
worst-case execution time analysis of the binary, and an automatic initialiser for user-level systems that connects kernel-level access-control enforcement with reasoning about system behaviour.  ...  We summarise these results and show how they integrate to form a coherent overall analysis, backed by machine-checked, end-to-end theorems.  ...  ACKNOWLEDGMENTS We would like to acknowledge the contribution of the following people in the different parts of this work, spanning multiple years and projects.  ... 
doi:10.1145/2560537 fatcat:wgaqjtqacfen3nd2apj4z4eldm

Portable and Efficient Run-time Monitoring of JavaScript Applications Using Virtual Machine Layering [chapter]

Erick Lavoie, Bruno Dufour, Marc Feeley
2014 Lecture Notes in Computer Science  
Compared to the Firefox interpreter, it is between 5.5× slower and 7× faster, showing the layering approach is competitive with the instrumentation of a browser VM while being faster and simpler than other  ...  In order to limit the performance overhead, a dynamic translation of the client program selectively modifies source elements and run-time feedback optimizes monitoring operations.  ...  They provide the same ability as code patching in assembly.  ... 
doi:10.1007/978-3-662-44202-9_22 fatcat:tvvoghhaz5hbzfhlqhln6ilqla

Camouflage: Hardware-assisted CFI for the ARM Linux kernel [article]

Rémi Denis-Courmont, Hans Liljestrand, Carlos Chinea, Jan-Erik Ekberg
2019 arXiv   pre-print
Furthermore, we show how deployment of such security primitives in the kernel can significantly differ from their user space application.  ...  Specifically, we use the ARMv8.3 pointer authentication (PAuth) extension and present a design that uses it to achieve strong security guarantees with minimal performance penalties.  ...  Acknowledgements This work was supported by the European Research Institute of Huawei Technologies.  ... 
arXiv:1912.04145v1 fatcat:atfqt7oyuva77iito7czlmxzcm

Machine-Checked Proofs for Cryptographic Standards

José Bacelar Almeida, Pierre-Yves Strub, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton
2019 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS '19  
We present a high-assurance and high-speed implementation of the SHA-3 hash function.  ...  The proofs include new EasyCrypt libraries of independent interest for programmable random oracles and modular indifferentiability proofs.  ...  for compliance by inspection.  ... 
doi:10.1145/3319535.3363211 dblp:conf/ccs/AlmeidaBBBDGL0S19 fatcat:ywk5fizlmrcoti6g3uhph7s7h4

Linking Design Decisions to Design Models in Model-Based Software Development [chapter]

Patrick Könemann, Olaf Zimmermann
2010 Lecture Notes in Computer Science  
The realization of design decisions is often manual and tedious work on design models.  ...  Design decisions are continuously made during the development of software systems and are important artifacts for design documentation.  ...  Ekkart Kindler for an exceptional supervision and flawless guidance of my Ph.D. project and for the countless and enlightening discussions despite busy schedules.  ... 
doi:10.1007/978-3-642-15114-9_19 fatcat:5owtl7hvezbjvorgjmffydreiy

Engineering Language-Parametric End-User Programming Environments for DSLs

Mauricio Verano Merino, Jurgen Vinju, Mark van den Brand, Tijs van der Storm
2022 Zenodo  
Given the increasing number of people performing any kind of programming activity, it is important to offer different interfaces depending on the programming task and the background of the users.  ...  In this thesis, we used some of these interfaces; however, we focused on programming languages which are artificial languages consisting of instructions written by humans and executed by computers.  ...  acknowledgements We would like to thank the Twitter hive mind, and Rainer Joswig in particular, for help in navigating the early history of REPLs and the anonymous reviewers for their helpful comments.  ... 
doi:10.5281/zenodo.6302885 fatcat:yr2tjs3rqvef5cftnooxjtbgcu

VNS: Namespace Facility

Jim E. Newton
2008 European Lisp Symposium  
In the last couple of years, we have seen a growing interest in the Lisp programming language and its various dialects, including Common Lisp, Scheme, ISLISP, Dylan, and so on.  ...  Some of the papers of the main track are selected for further review after the symposium and will be considered for publication in a future special issue of the Journal of Universal Computer Science (J.UCS  ...  ACKNOWLEDGEMENTS The work of Mikael Laurson and Mika Kuuskankare has been supported by the Academy of Finland (SA 105557 and SA 114116).  ... 
dblp:conf/els/Newton08 fatcat:srwu4fksnnhrtpohd5jx67eeha

Hints and Principles for Computer System Design [article]

Butler Lampson
2021 arXiv   pre-print
It also gives some principles for system design that are more than just hints, and many examples of how to apply the ideas.  ...  This new long version of my 1983 paper suggests the goals you might have for your system -- Simple, Timely, Efficient, Adaptable, Dependable, Yummy (STEADY) -- and techniques for achieving them -- Approximate  ...  Binary patching was first done in the Informer, a tool for instrumenting an OS kernel; it checked the proposed machine code patch for safety.  ... 
arXiv:2011.02455v3 fatcat:jolyz5lknjdbpjpxjcrx5rh6fa

Abstracts of Papers Presented at the 2008 Pittsburgh Conference

Peter B. Stockwell
2008 Journal of automated methods & management in chemistry (Print)  
in Chemistry Entirely conventional gradient elution instrumentation and columns are assembled in a system which develops a total peak capacity of about 2000 in 30 minutes; this is equivalent to nearly  ...  In this work, a film made using a layer-by-layer method was assembled using hemoglobin and poly[4-vinylpyridine Os(bipyridine)2Cl]-co-ethylamine (POs-EA).  ...  Research Centre at Hyderabad for providing the analytical support to pursue this work, and they are also grateful to colleagues who helped them in this work.  ... 
doi:10.1155/2008/502953 pmid:19365566 pmcid:PMC2665694 fatcat:cwx4g3nawzewreu7iz6vldtj2m

Guidelines for collaborative development of sustainable data treatment software

Joachim Wuttke, Stephen Cottrell, Miguel A. Gonzalez, Anders Kaestner, Anders Markvardsen, Thomas H. Rod, Piotr Rozyczko, Gagik Vardanyan
2022 Journal of Neutron Research  
To foster software quality and sustainability, and to facilitate collaboration, representatives from software groups of European neutron and muon facilities have agreed on a set of guidelines for development  ...  practices, infrastructure, and functional and non-functional product properties.  ...  two anonymous reviewers for valuable input at different stages of this work.  ... 
doi:10.3233/jnr-220002 fatcat:ebjnkpvoczfdhkxdisrxvggw3u

Security issues in cloud environments: a survey

Diogo A. B. Fernandes, Liliana F. B. Soares, João V. Gomes, Mário M. Freire, Pedro R. M. Inácio
2013 International Journal of Information Security  
It also contains a thorough review of the main concepts concerning the security state of cloud environments and discusses several open research topics.  ...  Besides of the issues derived from web technologies and the Internet, clouds introduce new issues that should be cleared out first in order to further allow the number of cloud deployments to increase.  ...  Other techniques include checking for registry values, checking for video or mouse drivers, or even executing especial assembler code [252] .  ... 
doi:10.1007/s10207-013-0208-7 fatcat:55o67epb6zfspchxuzvuduzr4a

The Robotic Multi-Object Focal Plane System of the Dark Energy Spectroscopic Instrument (DESI) [article]

Joseph Harry Silber, Parker Fagrelius, Kevin Fanning, Michael Schubnell, Jessica Nicole Aguilar, Steven Ahlen, Jon Ameel, Otger Ballester, Charles Baltay, Chris Bebek, Dominic Benton Beard, Robert Besuner (+88 others)
2022 arXiv   pre-print
The robots automatically re-target their optical fibers every 10 - 20 minutes, each to a precision of several microns, with a reconfiguration time less than 2 minutes.  ...  DESI will produce the largest 3D map of the universe to date and measure the expansion history of the cosmos.  ...  CEX2020-001058-M, some of which include ERDF funds from the European Union.  ... 
arXiv:2205.09014v1 fatcat:tnspnmxbdnb27bvq2zcabqvp5u

The hArtes Tool Chain [chapter]

Koen Bertels, Ariano Lattanzi, Emanuele Ciavattini, Ferruccio Bettarelli, Maria Teresa Chiaradia, Raffaele Nutricato, Alberto Morea, Anna Antola, Fabrizio Ferrandi, Marco Lattuada, Christian Pilato, Donatella Sciuto (+10 others)
2012 Hardware/Software Co-design for Heterogeneous Multi-core Platforms  
and a screenshot of its graphical user-interface.  ...  It also proposes an initial mapping solution to be refined by the mapping tool.  ... 
doi:10.1007/978-94-007-1406-9_2 fatcat:izopdxmxxnegnotxjvvcqmle3i

Tools Support for Linux Kernel Deductive Verification Workflow

Denis Efremov, Nikita Komarov
2014 unpublished
required for this process and developed by the authors.  ...  In the paper, a case of formal verification of such systema Linux kernel security module -is considered; the chosen toolset, the verification process workflow are reviewed, along with some auxiliary tools  ...  Tool support necessity of worked out verification process workflow and the absence of turnkey solutions led to the development of additional tools.  ... 
doi:10.15514/syrcose-2014-8-6 fatcat:k3bsl3uytncv5aos56w2vyvk6y
« Previous Showing results 1 — 15 out of 142 results