199 Hits in 4.5 sec

The Specification, Verification, and Implementation of a High-Assurance Data Structure: An ACL2 Approach

David S. Hardin
2013 2013 46th Hawaii International Conference on System Sciences  
We present a complete specification and formal verification of a high-assurance data structure, namely an arraybased set (or alternatively, a multiset), of arbitrary size, using the ACL2 theorem prover  ...  This particular data structure is a sanitized version of one that was used in a high-assurance development at Rockwell Collins.  ...  One goal of our research program, then, is to find a way to bridge the gap between the formal verification environment and the high-assurance implementation environment, allowing us to implement verifiable  ... 
doi:10.1109/hicss.2013.541 dblp:conf/hicss/Hardin13 fatcat:562c7kpbfzhu5lzzmgyinflx3e

Efficient, formally verifiable data structures using ACL2 single-threaded objects for high-assurance systems

David S. Hardin, Samuel S. Hardin
2009 Proceedings of the Eighth International Workshop on the ACL2 Theorem Prover and its Applications - ACL2 '09  
At the highest Evaluation Assurance Level (EAL) of the Common Criteria, such data structures must be formally specified, and proven to meet their specifications.  ...  However, such data structures are in the main not appropriate for direct implementation in high-confidence software systems, both because of their unbounded nature, and also due to the complexity of the  ...  CONCLUSION We have demonstrated how formally verified data structures, specifically queueing data structures of the sort commonly employed in high-assurance system design, and initially developed in a  ... 
doi:10.1145/1637837.1637853 fatcat:b7ephfsyc5estliot2c5voqs7e

Android Platform Modeling and Android App Verification in the ACL2 Theorem Prover [chapter]

Eric Smith, Alessandro Coglio
2016 Lecture Notes in Computer Science  
Our approach can prove virtually any true property about an app, with high assurance.  ...  Our approach is sound, precise, and high-assurance, in contrast to existing approaches for vetting Android apps.  ...  But the ACL2 logic and our Android model can express other kinds of assertions over the deeply embedded apps.  ... 
doi:10.1007/978-3-319-29613-5_11 fatcat:s7zqxdbnejhszjiyblwm4c5rpa

Verifying the FM9801 microarchitecture

W.A. Hunt, J. Sawada
1999 IEEE Micro  
Using the ACL2 theorem-proving system, we mechanically proved that the MA description implemented the ISA specification.  ...  Our approach Formal verification is an alternative to the simulation process. It mathematically analyzes the hardware design and verifies that it is functioning correctly.  ...  fication at the level we have presented here; however, this level of verification is arguably the area of the design process that needs the most assistance.  ... 
doi:10.1109/40.768503 fatcat:yazz23rfzjfzbpzwgu54v62ifi

Conference Report: COMPASS '96 - The Eleventh Annual Conference on Computer Assurance, Gaithersburg, MD - June 17-21, 1996

K. Ferraiolo, L.M. Ippolito
1996 Journal of Research of the National Institute of Standards and Technology  
Acknowledgments The following COMPASS '96 Conference Committee and Board members contributed to this report: Paul Anderson, Space and Naval Warfare Systems Command; Bonnie Danner, TRW Government Information  ...  Services Division; and Uma Satyen, MITRE Corporation.  ...  He asserted that this approach allows a transparent formulation of properties and structuring of their proofs.  ... 
doi:10.6028/jres.101.075 pmid:27805078 pmcid:PMC4900807 fatcat:avx7ulw2tjeo7b3zquvp4ix7la

A flexible formal verification framework for industrial scale validation

Anna Slobodova, Jared Davis, Sol Swords, Warren Hunt
2011 Ninth ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMPCODE2011)  
This paper describes the formal verification framework we have built on top of publicly-available tools.  ...  In recent years, leading microprocessor companies have made huge investments to improve the reliability of their products.  ...  Niklas Een gave us an early access to Berkeley ZZ and provided the means to integrate his tool in our framework and enabled SAT result verification.  ... 
doi:10.1109/memcod.2011.5970515 dblp:conf/memocode/SlobodovaDSH11 fatcat:5vahhzcds5falllz5xqsvqraqq

High-Assurance Separation Kernels: A Survey on Formal Methods [article]

Yongwang Zhao, David Sanan, Fuyuan Zhang, Yang Liu
2017 arXiv   pre-print
However, this field lacks a survey to systematically study, compare, and analyze related work. On the other hand, high-assurance separation kernels by formal methods still face big challenges.  ...  In this paper, an analytical framework is first proposed to clarify the functionalities, implementations, properties and standards, and formal methods application of separation kernels.  ...  The LOC includes the specification and proof a,b,c Only LOC of specification is available. between the high-level design and the implementation or use software model checking to analyze the implementation  ... 
arXiv:1701.01535v1 fatcat:wivlgaqkmffc5nb2kalmpy77sy

Design Validation by Symbolic Simulation and Equivalence Checking: A Case Study in Memory Optimization for Image Manipulation [chapter]

Kong Woei Susanto, Tim Todman, Jose Gabriel Coutinho, Wayne Luk
2009 Lecture Notes in Computer Science  
The research challenge for formal verification is to develop an efficient design validation flow and increase the quality of the validation.  ...  This approach is based on a symbolic simulation technique to obtain the design properties and automatically check them using an equivalence checker.  ...  Acknowledgment The authors thank the ACL2 developers and SRI for making the ACL2 and Yices system available.  ... 
doi:10.1007/978-3-540-95891-8_46 fatcat:lovjlavdpvf6jlw4i7tbj42trq

Use of Formal Verification at Centaur Technology [chapter]

Warren A. Hunt, Sol Swords, Jared Davis, Anna Slobodova
2010 Design and Verification of Microprocessor Systems for High-Assurance Applications  
Our toolflow uses the ACL2 theorem-proving system as a design database and a verification engine.  ...  This process captures a design as an ACL2 object that can be interpreted by an ACL2-based HDL simulator.  ...  We would also like to thank Bob Boyer for development of much of the technology behind EMOD and the ACL2 BDD package, Terry Parks for developing a very detailed floating-point addition specification, and  ... 
doi:10.1007/978-1-4419-1539-9_3 fatcat:qczrzp6ah5a5lmq75hllk6oymq

Combining ACL2 and an automated verification tool to verify a multiplier

Erik Reeber, Jun Sawada
2006 Proceedings of the sixth international workshop on the ACL2 theorem prover and its applications - ACL2 '06  
We have extended the ACL2 theorem prover to automatically prove properties of VHDL circuits with IBM's Internal SixthSense verification system.  ...  The property we ultimately verify corresponds to the correctness of the component that produces a pair of bit-vectors whose summation is equal to the product.  ...  VERIFICATION OF THE BOOTH EN-CODING We verify the Booth encoding by creating three ACL2 models of a Booth encoder, which we call the high-level model, the low-level model, and the BV model.  ... 
doi:10.1145/1217975.1217990 dblp:conf/acl2/ReeberS06 fatcat:bxilzo3umbb6loowwbbuijrkbq

An industrial strength theorem prover for a logic based on Common Lisp

M. Kaufmann, J.S. Moore
1997 IEEE Transactions on Software Engineering  
ACL2 is a re-implemented extended version of Boyer and Moore's Nqthm and Kaufmann's Pc-Nqthm, intended for large scale verification projects.  ...  We enumerate many other important features of ACL2 and we briefly summarize two industrial applications: a model of the Motorola CAP digital signal processing chip and the proof of the correctness of the  ...  This paper is an extended version the paper "ACL2: An Industrial Strength Version of Nqthm," which appeared in  ... 
doi:10.1109/32.588534 fatcat:bzb42znaqrfg7jn4ybn4ptyk5y

Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks [chapter]

Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt
2006 Lecture Notes in Computer Science  
With respect to this family of protocols, our approach defines a global security requirement for a network that characterizes the "good" behavior of individual nodes to assure the global property.  ...  We describe a formal approach to modeling and reasoning about autoconfiguration protocols to support the detection of malicious insider nodes.  ...  Automated Verification with ACL2 ACL2 is a re-implemented extended version of Nqthm [5] , intended for large scale verification efforts.  ... 
doi:10.1007/11679219_3 fatcat:ikixg7arabgg7jrfygsikodrei

A survey on formal specification and verification of separation kernels [article]

Yongwang Zhao
2016 arXiv   pre-print
This paper presents an overview of formal specification and verification of separation kernels.  ...  The application of separation kernels in critical domain demands the correctness of the kernel by formal verification. To the best of our knowledge, there is no survey paper on this topic.  ...  We outline them in high-level including formal specification, models, and verification approaches.  ... 
arXiv:1508.07066v3 fatcat:o6rltzjp4vf4jeifjddfbtmuv4

Formal Reasoning About Intrusion Detection Systems [chapter]

Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl Levitt
2004 Lecture Notes in Computer Science  
Intrusion detection is an appealing approach to improving the security of systems. The goal of intrusion detection is to detect attacks with low false positive rate and low false negative rate.  ...  New approach is needed to evaluate the effectiveness of the intrusion detection systems (IDSs). To my wife, Xiaohan Gu, and my daughter, Sophia Song. -iii-Acknowledgments  ...  Structures and functions in ACL2 are used to formalize declarative components of the framework, including an abstract system model, audit data, detection rules of IDSs, assumptions, and security requirements  ... 
doi:10.1007/978-3-540-30143-1_15 fatcat:s3idznmfrbfoxjrjubd7m2leyi

Java Program Verification via a JVM Deep Embedding in ACL2 [chapter]

Hanbing Liu, J. Strother Moore
2004 Lecture Notes in Computer Science  
In this paper, we show that one can "deep-embed" the Java bytecode language, a fairly complicated language with a rich semantics, into the first order logic of ACL2 by modeling a realistic JVM.  ...  This reasoning can be done in a direct and intuitive way without incurring the extra burden that has often been associated with hand proofs, or proofs that make use of less automated proof assistance.  ...  We would also like to thank our group members in Austin Serita Van Groningen, Robert Krug and Omar El-Domeiri, for their efforts in "debugging" the paper with us.  ... 
doi:10.1007/978-3-540-30142-4_14 fatcat:23ja576y6rh4vb3vhqczooljx4
« Previous Showing results 1 — 15 out of 199 results