Filters








1,467 Hits in 9.9 sec

Program Verification in the Presence of I/O [chapter]

Hugo Férée, Johannes Åman Pohjola, Ramana Kumar, Scott Owens, Magnus O. Myreen, Son Ho
2018 Lecture Notes in Computer Science  
Specifically, we extend CakeML with a low-level model of file I/O, and verify a high-level file I/O library in terms of the model.  ...  In this paper, we present infrastructure for developing and verifying impure functional programs with I/O and imperative file handling.  ...  Acknowledgments The first and fourth authors were supported by EPSRC Grant EP/N028759/1, UK. The second and fifth authors were partly supported by the Swedish Re-  ... 
doi:10.1007/978-3-030-03592-1_6 fatcat:g43b575tcfct3my7exiyd42vtu

Algorithmic verification of procedural programs in the presence of code variability

Siavash Soleimanifard, Dilian Gurov
2016 Science of Computer Programming  
implementation of cvpp and ProMoVer, and to Stefan Schwoon for adapting the input language of Moped to our needs.  ...  Acknowledgments We are indebted to Wojciech Mostowski, Erik Poll and Roberto Guanciale for their help in finding suitable case studies, to Afshin Amighi and Pedro de Carvalho Gomes for helping with the  ...  As a basis, we used the product line described in Example 8 /** * @variation_point : * EnterProd * @ v a r i a t i o n _ p o i n t _ i n t e r f a c e : * provided enterProd * @v a r i a t i o n _ p o  ... 
doi:10.1016/j.scico.2015.08.010 fatcat:c7nrpyz65nfkjo4drugtsxrhja

Algorithmic Verification of Procedural Programs in the Presence of Code Variability [chapter]

Siavash Soleimanifard, Dilian Gurov
2015 Lecture Notes in Computer Science  
implementation of cvpp and ProMoVer, and to Stefan Schwoon for adapting the input language of Moped to our needs.  ...  Acknowledgments We are indebted to Wojciech Mostowski, Erik Poll and Roberto Guanciale for their help in finding suitable case studies, to Afshin Amighi and Pedro de Carvalho Gomes for helping with the  ...  As a basis, we used the product line described in Example 8 /** * @variation_point : * EnterProd * @ v a r i a t i o n _ p o i n t _ i n t e r f a c e : * provided enterProd * @v a r i a t i o n _ p o  ... 
doi:10.1007/978-3-319-15317-9_20 fatcat:beqsoxyqanczznzai56a2mzhh4

MPI I/O Analysis and Error Detection with MARMOT [chapter]

Bettina Krammer, Matthias S. Müller, Michael M. Resch
2004 Lecture Notes in Computer Science  
Due to the complexity of parallel programming in general, and of handling parallel I/O in particular, there is a need for tools that support the application development process.  ...  In this paper we describe the MARMOT tool that uncovers some of these errors and we also analyze to what extent it is possible to do so for MPI I/O.  ...  Acknowledgments The development of MARMOT is partially supported by the European Commissionion through the IST-2001-32243 project "CrossGrid".  ... 
doi:10.1007/978-3-540-30218-6_36 fatcat:pcjsfv6phvbyddtan6ztuhxxay

Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security

Mohit Tiwari, Jason K. Oberg, Xun Li, Jonathan Valamehr, Timothy Levin, Ben Hardekopf, Ryan Kastner, Frederic T. Chong, Timothy Sherwood
2011 Proceeding of the 38th annual international symposium on Computer architecture - ISCA '11  
, pipelined operation, and I/O with traditional devices.  ...  High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the  ... 
doi:10.1145/2000064.2000087 dblp:conf/isca/TiwariOLVLHKCS11 fatcat:n4fu5qhf2zdktmnly66wx4ihli

Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security

Mohit Tiwari, Jason K. Oberg, Xun Li, Jonathan Valamehr, Timothy Levin, Ben Hardekopf, Ryan Kastner, Frederic T. Chong, Timothy Sherwood
2011 SIGARCH Computer Architecture News  
, pipelined operation, and I/O with traditional devices.  ...  High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the  ... 
doi:10.1145/2024723.2000087 fatcat:touo4wpb3zbedmxuwa6hesdlpi

AutoFrame: Automatic Frame Inference for Object-Oriented Languages [article]

Victor Rivera, Bertrand Meyer
2019 arXiv   pre-print
and algorithms library which was previously (with the manually written frame clauses) verified for functional correctness using a mechanical program prover; and (2) the automatic generation (in less than  ...  Automatic program verification has made tremendous strides, but is not yet for the masses. How do we make it less painful?  ...  Acknowledgements We are indebted to colleagues who collaborated on the previous iterations of the Alias calculus work, particular Sergey Velder for many important suggestions regarding the theory, and  ... 
arXiv:1808.08751v4 fatcat:bbtmyw6fsjenhiukcwpkstl4je

Symbolic Verification of Cache Side-channel Freedom [article]

Sudipta Chattopadhyay, Abhik Roychoudhury
2018 arXiv   pre-print
At the core of our framework is a novel symbolic verification technique based on automated abstraction refinement of cache semantics.  ...  For a given program, a cache configuration and an attack model, our CACHEFIX framework either verifies the cache side-channel freedom of the program or synthesizes a series of patches to ensure cache side-channel  ...  Concretely, the set of runtime actions generated are as follows: ν 1 , max i ∈[1,k ] o io 1 , . . . , ν k , max i ∈[1,k] o io k (25) In practice, when a program is run with input I , we check whether  ... 
arXiv:1807.04701v1 fatcat:cjukpybayvdcbpbf5wzypbck5y

Simulation and formal verification of x86 machine-code programs that make system calls

Shilpi Goel, Warren A. Hunt, Matt Kaufmann, Soumava Ghosh
2014 2014 Formal Methods in Computer-Aided Design (FMCAD)  
We demonstrate the capabilities of our model with the mechanical verification of a machinecode program, produced by the GCC compiler, that computes the number of characters, lines, and words in an input  ...  We present an approach to modeling and verifying machine-code programs that exhibit non-determinism.  ...  Heule for his invaluable feedback on the paper. This work is supported by DARPA under contract number N66001-10-2-4087.  ... 
doi:10.1109/fmcad.2014.6987600 dblp:conf/fmcad/GoelHKG14 fatcat:bnhveulfyvaxtn6y2oja62ncqe

Moat

Rohit Sinha, Sriram Rajamani, Sanjit Seshia, Kapil Vaswani
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
In this paper, we introduce a new approach to formally model these primitives and formally verify properties of so-called enclave programs that use them.  ...  However, vulnerabilities in the application itself, such as the incorrect use of SGX instructions or memory safety errors, can be exploited to divulge secrets.  ...  This research is supported in part by SRC contract 2460.001 and NSF STARSS grant 1528108. We gratefully acknowledge Brent ByungHoon Kang and the anonymous reviewers for their insightful feedback.  ... 
doi:10.1145/2810103.2813608 dblp:conf/ccs/SinhaRSV15 fatcat:gypmcdgasbfopf6k4mpn7i55f4

On software verification for sensor nodes

Doina Bucur, Marta Kwiatkowska
2011 Journal of Systems and Software  
dereferences), this tool chain is able to verify application-specific assertions,includinglow-level assertions upon the state of the registers and peripherals.  ...  The difficulties lie with (i) being able to automatically extract standard C models out of the particular flavours of embedded C used in sensor programming solutions, and (ii) decreasing the resulting  ...  Selected I/O pins and their connections on TelosB motes.  ... 
doi:10.1016/j.jss.2011.04.054 fatcat:oi3lrh2pinfjnflhst2lqxluii

An analysis of ordnance software using the MALPAS tools

K. Hayman
1990 Fifth Annual Conference on Computer Assurance, Systems Integrity, Software Safety and Process Security.  
In addition to the variables allocated in RAM by the program, such objects as the microprocessor registers, accumulator, I/O ports and status flags had to be considered in the IL model.  ...  The solution found for this problem was to model such things as the status flags, registers and I/O ports locally in the routines that use them, wherever this was possible.  ... 
doi:10.1109/cmpass.1990.175404 fatcat:p4udgistbravjg3bemrhpf25zm

A robust machine code proof framework for highly secure applications

David S. Hardin, Eric W. Smith, William D. Young
2006 Proceedings of the sixth international workshop on the ACL2 theorem prover and its applications - ACL2 '06  
As part of the Secure, High-Assurance Development Environment program, we have produced in ACL2 an executable formal model of the Rockwell Collins AAMP7G microprocessor at the instruction set level, in  ...  The AAMP7G, currently in use in Rockwell Collins secure system products, supports strict time and space partitioning in hardware, and has received a U.S.  ...  Thanks also to Sandip Ray for his work in the area of compositional cutpoint reasoning. We appreciate the comments of the anonymous reviewers, which resulted in a stronger paper.  ... 
doi:10.1145/1217975.1217978 dblp:conf/acl2/HardinSY06 fatcat:vntwmgkhuzakdbxwyi4ylty4am

A case study on the lightweight verification of a multi-threaded task server

Néstor Cataño, Ijaz Ahmed, Radu I. Siminiceanu, Jonathan Aldrich
2014 Science of Computer Programming  
In a first stage, we employed the Plural tool, which is designed to perform lightweight verification of Java programs using a Data Flow Analysis (DFA) framework, to specify and verify the MTTS.  ...  Pulse translates Plural specifications into an abstract state-machine model that captures the semantics of all the possible concurrent programs implementing the given specifications, and uses the evmdd-smc  ...  The process of verifying the MTTS application with Plural revealed a series of issues related to good programming practices and design decisions made in the MTTS that Novabase's engineers used to evolve  ... 
doi:10.1016/j.scico.2013.01.004 fatcat:eslxggi3djg6bjwkcyjyz3vleq

Report of the HPC Correctness Summit, Jan 25--26, 2017, Washington, DC [article]

Ganesh Gopalakrishnan and Paul D. Hovland and Costin Iancu and Sriram Krishnamoorthy and Ignacio Laguna and Richard A. Lethin and Koushik Sen and Stephen F. Siegel and Armando Solar-Lezama
2017 arXiv   pre-print
In this study, we detail one of the most significant productivity challenges in achieving this goal, namely the increasing proclivity to bugs, especially in the face of growing hardware and software heterogeneity  ...  Maintaining leadership in HPC requires the ability to support simulations at large scales and fidelity.  ...  In the same vein, the inability to control the evolving semantics of libraries and programming languages must be kept in mind, requiring cooperation among participant communities.  ... 
arXiv:1705.07478v1 fatcat:2rebouk2tvbqhcfthfhz5abd7i
« Previous Showing results 1 — 15 out of 1,467 results