Filters








160 Hits in 4.2 sec

Using ACL2 in the Design of Efficient, Verifiable Data Structures for High-Assurance Systems [article]

David Hardin
2018 pre-print
In order to provide efficient implementations of high-level data structures used in autonomous systems with the high assurance needed for accreditation, we have developed a verifying compilation technique  ...  In this paper, we detail our high-assurance data structure design approach, including examples in ACL2 of common algebraic data types implemented using this design approach, proofs of correctness for those  ...  data structures used in autonomous systems with the high assurance needed for accreditation.  ... 
doi:10.4204/eptcs.280.5 arXiv:1810.04312v1 fatcat:ba7a5txnjrfy3oistfinj57du4

Efficient, formally verifiable data structures using ACL2 single-threaded objects for high-assurance systems

David S. Hardin, Samuel S. Hardin
2009 Proceedings of the Eighth International Workshop on the ACL2 Theorem Prover and its Applications - ACL2 '09  
However, such data structures are in the main not appropriate for direct implementation in high-confidence software systems, both because of their unbounded nature, and also due to the complexity of the  ...  Finally, we show how this translated data structure code can be compiled into efficient machine code for a common embedded microprocessor using a verified compiler, and executed on an EAL6+ verified operating  ...  CONCLUSION We have demonstrated how formally verified data structures, specifically queueing data structures of the sort commonly employed in high-assurance system design, and initially developed in a  ... 
doi:10.1145/1637837.1637853 fatcat:b7ephfsyc5estliot2c5voqs7e

The Specification, Verification, and Implementation of a High-Assurance Data Structure: An ACL2 Approach

David S. Hardin
2013 2013 46th Hawaii International Conference on System Sciences  
This particular data structure is a sanitized version of one that was used in a high-assurance development at Rockwell Collins.  ...  We present a complete specification and formal verification of a high-assurance data structure, namely an arraybased set (or alternatively, a multiset), of arbitrary size, using the ACL2 theorem prover  ...  more closely follows "normal" design rules for high assurance.  ... 
doi:10.1109/hicss.2013.541 dblp:conf/hicss/Hardin13 fatcat:562c7kpbfzhu5lzzmgyinflx3e

A flexible formal verification framework for industrial scale validation

Anna Slobodova, Jared Davis, Sol Swords, Warren Hunt
2011 Ninth ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMPCODE2011)  
This framework gives us the flexibility to work on myriad different problems that occur in microprocessor design.  ...  In recent years, leading microprocessor companies have made huge investments to improve the reliability of their products.  ...  ACKNOWLEDGEMENT We would like to thank Matt Kaufmann for his continuous support of ACL2 and Gary Byers for his support of GCL.  ... 
doi:10.1109/memcod.2011.5970515 dblp:conf/memocode/SlobodovaDSH11 fatcat:5vahhzcds5falllz5xqsvqraqq

A robust machine code proof framework for highly secure applications

David S. Hardin, Eric W. Smith, William D. Young
2006 Proceedings of the sixth international workshop on the ACL2 theorem prover and its applications - ACL2 '06  
As part of the Secure, High-Assurance Development Environment program, we have produced in ACL2 an executable formal model of the Rockwell Collins AAMP7G microprocessor at the instruction set level, in  ...  The AAMP7G, currently in use in Rockwell Collins secure system products, supports strict time and space partitioning in hardware, and has received a U.S.  ...  Thanks also to Sandip Ray for his work in the area of compositional cutpoint reasoning. We appreciate the comments of the anonymous reviewers, which resulted in a stronger paper.  ... 
doi:10.1145/1217975.1217978 dblp:conf/acl2/HardinSY06 fatcat:vntwmgkhuzakdbxwyi4ylty4am

An industrial strength theorem prover for a logic based on Common Lisp

M. Kaufmann, J.S. Moore
1997 IEEE Transactions on Software Engineering  
In addition to the sophisticated inference engine it provides, ACL2 provides extremely efficient evaluation, allowing formal models often to serve as simulators for the systems described.  ...  See the URL http://www-formal.stanford.edu/clt/ARS/ars-db.html for a data base of automated reasoning systems, including brief descriptions and links to the home pages of the systems mentioned and many  ...  We are also especially grateful to Bishop Brock for providing valuable feedback based on his heavy use of ACL2 for many months.  ... 
doi:10.1109/32.588534 fatcat:bzb42znaqrfg7jn4ybn4ptyk5y

Design Validation by Symbolic Simulation and Equivalence Checking: A Case Study in Memory Optimization for Image Manipulation [chapter]

Kong Woei Susanto, Tim Todman, Jose Gabriel Coutinho, Wayne Luk
2009 Lecture Notes in Computer Science  
The research challenge for formal verification is to develop an efficient design validation flow and increase the quality of the validation.  ...  In this paper, we propose an automated validation flow to check the functional equivalence of the source design and its optimized version.  ...  Acknowledgment The authors thank the ACL2 developers and SRI for making the ACL2 and Yices system available.  ... 
doi:10.1007/978-3-540-95891-8_46 fatcat:lovjlavdpvf6jlw4i7tbj42trq

Conference Report: COMPASS '96 - The Eleventh Annual Conference on Computer Assurance, Gaithersburg, MD - June 17-21, 1996

K. Ferraiolo, L.M. Ippolito
1996 Journal of Research of the National Institute of Standards and Technology  
Acknowledgments The following COMPASS '96 Conference Committee and Board members contributed to this report: Paul Anderson, Space and Naval Warfare Systems Command; Bonnie Danner, TRW Government Information  ...  Such assessments could be used for further improving the HMI design and hence the safety of the system.  ...  ACL2 allows rapid prototyping of models of systems, efficient execution of those models, and proofs of deep theorems about those models, but can be labor-intensive.  ... 
doi:10.6028/jres.101.075 pmid:27805078 pmcid:PMC4900807 fatcat:avx7ulw2tjeo7b3zquvp4ix7la

Combining ACL2 and an automated verification tool to verify a multiplier

Erik Reeber, Jun Sawada
2006 Proceedings of the sixth international workshop on the ACL2 theorem prover and its applications - ACL2 '06  
We have used this extension to verify a multiplier used in an industrial floating point unit.  ...  We have extended the ACL2 theorem prover to automatically prove properties of VHDL circuits with IBM's Internal SixthSense verification system.  ...  We use the combination of ACL2 and SixthSense for reasoning hardware design in VHDL. Meanwhile, we specify all the properties to be checked in the ACL2 logic.  ... 
doi:10.1145/1217975.1217990 dblp:conf/acl2/ReeberS06 fatcat:bxilzo3umbb6loowwbbuijrkbq

Use of Formal Verification at Centaur Technology [chapter]

Warren A. Hunt, Sol Swords, Jared Davis, Anna Slobodova
2010 Design and Verification of Microprocessor Systems for High-Assurance Applications  
Our toolflow uses the ACL2 theorem-proving system as a design database and a verification engine.  ...  We have verified the integer multiplication unit, and we are in the process of verifying microcode sequences that perform arithmetic operations.  ...  We would also like to thank Bob Boyer for development of much of the technology behind EMOD and the ACL2 BDD package, Terry Parks for developing a very detailed floating-point addition specification, and  ... 
doi:10.1007/978-1-4419-1539-9_3 fatcat:qczrzp6ah5a5lmq75hllk6oymq

Development of a Translator from LLVM to ACL2

David S. Hardin, Jennifer A. Davis, David A. Greve, Jedidiah R. McClurg
2014 Electronic Proceedings in Theoretical Computer Science  
In our current work a library of formally verified software components is to be created, and assembled, using the Low-Level Virtual Machine (LLVM) intermediate form, into subsystems whose top-level assurance  ...  relies on the assurance of the individual components.  ...  Acknowledgments We thank the anonymous referees for their helpful comments. This work was sponsored in part by the United States Department of Defense.  ... 
doi:10.4204/eptcs.152.13 fatcat:kp2yfi324fb6bjdnqvts7qdfti

Simulation and formal verification of x86 machine-code programs that make system calls

Shilpi Goel, Warren A. Hunt, Matt Kaufmann, Soumava Ghosh
2014 2014 Formal Methods in Computer-Aided Design (FMCAD)  
The resulting model, implemented in the ACL2 theorem-proving system, allows both formal analysis and efficient simulation of x86 machine-code programs; the logical mode characterizes an external environment  ...  Specifically, we add support for system calls to our formal, executable model of the user-level x86 instruction-set architecture (ISA).  ...  Heule for his invaluable feedback on the paper. This work is supported by DARPA under contract number N66001-10-2-4087.  ... 
doi:10.1109/fmcad.2014.6987600 dblp:conf/fmcad/GoelHKG14 fatcat:bnhveulfyvaxtn6y2oja62ncqe

High-Assurance Separation Kernels: A Survey on Formal Methods [article]

Yongwang Zhao, David Sanan, Fuyuan Zhang, Yang Liu
2017 arXiv   pre-print
On the other hand, high-assurance separation kernels by formal methods still face big challenges.  ...  They are introduced to decouple the analysis of applications in partitions from the analysis of the kernel itself.  ...  Due to criticality of high-assurance systems, there are mandatory verification and validation (V&V) activities in their design and analysis process to ensure that the systems fully meet their functional  ... 
arXiv:1701.01535v1 fatcat:wivlgaqkmffc5nb2kalmpy77sy

Making induction manifest in modular ACL2

Carl Eastlund, Matthias Felleisen
2009 Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of declarative programming - PPDP '09  
The second novelty consists of the first proofs of soundness and expressivity for Modular ACL2; we also reaffirm the usefulness of our system with updated benchmarks.  ...  In previous work, we equipped ACL2 with modules, interfaces, and explicit linking and measured our system with a series of experiments.  ...  and suggestions, to Sky O'Mara for help with the implementation of Modular ACL2; and to T.  ... 
doi:10.1145/1599410.1599424 dblp:conf/ppdp/EastlundF09 fatcat:gthhirdkfvcdxj233ojumz4ioy

Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks [chapter]

Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt
2006 Lecture Notes in Computer Science  
With respect to this family of protocols, our approach defines a global security requirement for a network that characterizes the "good" behavior of individual nodes to assure the global property.  ...  This approach, novel to the field of intrusion detection, can, in principle, yield an intrusion detection system that detects any attack, even unknown attacks, that can imperil the global security requirement  ...  In the mechanization of our framework, structures and functions in ACL2 are used to formalize declarative components of the framework, including an abstract network model, formal specifications of DRCP  ... 
doi:10.1007/11679219_3 fatcat:ikixg7arabgg7jrfygsikodrei
« Previous Showing results 1 — 15 out of 160 results