12,151 Hits in 4.2 sec

Progress in Certifying Hardware Model Checking Results [chapter]

Emily Yu, Armin Biere, Keijo Heljanko
2021 Lecture Notes in Computer Science  
AbstractWe present a formal framework to certify k-induction-based model checking results.  ...  We also present Certifaiger, the resulting certification toolkit, and evaluate it on instances from the hardware model checking competition.  ...  [7] used in the Hardware Model Checking Competition (HWMCC) [5] .  ... 
doi:10.1007/978-3-030-81688-9_17 fatcat:ydbhgfpsvvf2jms4cromk26ejy

Validation and Certification of Safety-Critical Embedded Systems – The DECOS Test Bench [chapter]

Erwin Schoitsch, Egbert Althammer, Henrik Eriksson, Jonny Vinter, Laszlo Gönczy, Andras Pataricza, György Csertan
2006 Lecture Notes in Computer Science  
The Test Bench covers the complete life cycle from the platform-independent models to deployment, including model validation and transformations.  ...  V&V tools use the AUT in its appropriate form (specification, model, software, hardware etc.) -also called 'incarnation' -and produce results.  ...  a progressive integrated manner, as indicated in Fig. 3 .  ... 
doi:10.1007/11875567_28 fatcat:zkwfu5yycbabnae74tynl4btru

Formal Reasoning about the C11 Weak Memory Model

Viktor Vafeiadis
2015 Proceedings of the 2015 Conference on Certified Programs and Proofs - CPP '15  
This abstract introduces the C11 weak memory model, summarises known verification results, and discusses some open problems.  ...  While there exist good robustness checking procedures for hardware memory models against SC (e.g., [4] ), it is still unknown whether similar results could be derived for the release-acquire fragment  ...  Conclusion: Some Open Problems In the last few years, a lot of progress has been made in understanding and reasoning about weak memory models including C11.  ... 
doi:10.1145/2676724.2693181 dblp:conf/cpp/Vafeiadis15 fatcat:r4i6yj74uja6jko2raolnvjxza

Why do some (weird) people inject faults?

João Carreira, João Gabriel Silva
1998 Software engineering notes  
Fortunately work in fault injection has progressed and nowadays this is a technique used by many of the biggest computer manufacturers.  ...  Another approach is to build a simulator of the ~stem and inject faults by bit flipping directly in the simulation model.  ... 
doi:10.1145/272263.272273 fatcat:enqvzxysgrblzh3kyf3fbbvhlm

Dynamic Policy Discovery with Remote Attestation [chapter]

Corin Pitcher, James Riely
2006 Lecture Notes in Computer Science  
Remote attestation allows programs running on trusted hardware to prove their identity (and that of their environment) to programs on other hosts.  ...  Remote attestation can be used to address security concerns if programs agree on the meaning of data in attestations.  ...  A process player on trusted hardware creates a fresh keypair, attests to the public key, then transmits the result to a server.  ... 
doi:10.1007/11690634_8 fatcat:hrmldshmzve5npevp4f7p5v3ga

Fiscal Software Certification - An Italian Experience of Certification Against the Fiscal Legislation

Isabella Biscoglio, Giuseppe Lami, Gianluca Trentanni
2016 Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn  
This paper describes an experience of software certification in the specific fiscal software domain.  ...  As the Italian legislation does not provide it, a Business Process Model (BPM) presenting the fiscal software certification process is illustrated.  ...  hardware and software components of the cash register • the functional model that contains the specification of functionalities implemented in the source code • the end user manual with the description  ... 
doi:10.5220/0005844800540061 dblp:conf/modelsward/BiscoglioLT16 fatcat:uvfmwwu36jaabkbpf5pabnapca

Position paper: the science of deep specification

Andrew W. Appel, Lennart Beringer, Adam Chlipala, Benjamin C. Pierce, Zhong Shao, Stephanie Weirich, Steve Zdancewic
2017 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
Modern hardware and software are monstrously complex.  ...  (iv) The proof scripts yield formal proof objects in a variant of the calculus of inductive constructions (CiC) for which checking of proofs amounts to type checking and is fully automatic and independent  ...  The comments we received from the editor and the anonymous referees were particularly helpful in shaping our presentation.  ... 
doi:10.1098/rsta.2016.0331 pmid:28871056 fatcat:ztgho4isajbchi4bghlegxns7m

Report of the HPC Correctness Summit, Jan 25--26, 2017, Washington, DC [article]

Ganesh Gopalakrishnan and Paul D. Hovland and Costin Iancu and Sriram Krishnamoorthy and Ignacio Laguna and Richard A. Lethin and Koushik Sen and Stephen F. Siegel and Armando Solar-Lezama
2017 arXiv   pre-print
In this study, we detail one of the most significant productivity challenges in achieving this goal, namely the increasing proclivity to bugs, especially in the face of growing hardware and software heterogeneity  ...  We close with the proposal for a two-day workshop in which the problems identified in this report can be more broadly discussed, and specific plans to launch these new research thrusts identified.  ...  Model checking [32] .  ... 
arXiv:1705.07478v1 fatcat:2rebouk2tvbqhcfthfhz5abd7i

The Case for the Precision Timed (PRET) Machine

Stephen A. Edwards, Edward A. Lee
2007 Proceedings - Design Automation Conference  
When timing properties are important in the software and when concurrent execution is affected by timing, the result is brittle designs.  ...  details of the processor and on the context in which the software is executed.  ...  Substantial progress can be made in months; the revolution may take decades.  ... 
doi:10.1109/dac.2007.375165 fatcat:32dbdjco2bbvhm6ef56mg4377e

The case for the precision timed (PRET) machine

Stephen A. Edwards, Edward A. Lee
2007 Proceedings - Design Automation Conference  
When timing properties are important in the software and when concurrent execution is affected by timing, the result is brittle designs.  ...  details of the processor and on the context in which the software is executed.  ...  Substantial progress can be made in months; the revolution may take decades.  ... 
doi:10.1145/1278480.1278545 dblp:conf/dac/EdwardsL07 fatcat:gleykskolbd3zoyly6ici4ggwm

CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels

Ronghui Gu, Zhong Shao, Hao Chen, Xiongnan (Newman) Wu, Jieung Kim, Vilhelm Sjöberg, David Costanzo
2016 USENIX Symposium on Operating Systems Design and Implementation  
Our certified kernel is written in 6500 lines of C and x86 assembly and runs on stock x86 multicore machines.  ...  We have successfully developed a practical concurrent OS kernel and verified its (contextual) functional correctness in Coq.  ...  Hao Chen's work is also supported in part by China Scholarship Council. The U.S.  ... 
dblp:conf/osdi/GuSCWKSC16 fatcat:zprctdrke5ep5otb3ertksd5fy

Automatic Multi-functional Integration Program (AMFIP) towards All-optical Mechanobiology Interrogation [article]

Qin Luo, Justin Zhang, Gaoming Lin, Miao Huang, Mai Tanaka, Sharon Lepler, Juan Guan, Dietmar Siemann, Xin Tang
2021 bioRxiv   pre-print
In summary, AMFIP provides a new open-source and charge-free solution to integrate multiple hardware and software to satisfy the need of automatic imaging operations in the scientific community.  ...  We found that the ratio of YAP expression in nucleus and cytoplasm decreases as the spreading area of cells increases, suggesting that the accumulation of YAP in the nucleus decreases throughout the cell  ...  Together, the results suggest that the YAP N/C ratio in B2B single cells may depend on the (which was not certified by peer review) is the author/funder. All rights reserved.  ... 
doi:10.1101/2021.03.31.437936 fatcat:e3bjbkj6cfgano7yhycd3xtane

Computation Certification as a Service in the Cloud

S. M. Khan, K. W. Hamlen
2013 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing  
This affords a means of high-assurance, serial computation on cloud-aware, mobile devices that mix resourcerich but untrusted hardware with trusted but comparatively resource-impoverished hardware components  ...  Untrusted computations are instrumented with a checkpointing mechanism that yields a proof of computation integrity as the computation progresses.  ...  at load-time and in real-time as the remote computation progresses [5] , [6] , [7] , [8] .  ... 
doi:10.1109/ccgrid.2013.75 dblp:conf/ccgrid/KhanH13 fatcat:a4o2zhrgpvbttj7hfcf22u5zci

Automated software testing as a service

George Candea, Stefan Bucur, Cristian Zamfir
2010 Proceedings of the 1st ACM symposium on Cloud computing - SoCC '10  
DDT [11] showed that this approach requires neither real hardware nor hardware models to test device driversinstead, symbolic hardware returns symbolic values to the software, thus testing it against  ...  There is also opportunity for techniques that provide progressive refinement of the test results, so that a coarse grained result can be returned immediately, followed by increasingly more precise results  ... 
doi:10.1145/1807128.1807153 dblp:conf/cloud/CandeaBZ10 fatcat:imak4cqnm5doln36d5kcemdzty

Programming the CLEARSY Safety Platform with B [chapter]

Thierry Lecomte
2020 Lecture Notes in Computer Science  
This paper exposes the programming model of the CSSP used to develop control & command applications based on digital I/Os.  ...  It relies on the smart integration of the B formal method, redundant code generation and compilation, and a hardware platform that ensures a safe execution of the software.  ...  The work and results described in this article were partly funded by BPI-France (Banque Publique d'Investissement) and Métropole Aix-Marseille as part of the project LCHIP (Low Cost High Integrity Platform  ... 
doi:10.1007/978-3-030-48077-6_9 fatcat:j7viypyddvczbdgraio4lbdbuq
« Previous Showing results 1 — 15 out of 12,151 results