Filters








270 Hits in 5.7 sec

OS Verification - Now!

Harvey Tuch, Gerwin Klein, Gernot Heiser
2005 USENIX Workshop on Hot Topics in Operating Systems  
Hard, machine-supported formal verification of software is at a turning point. Recent years have seen theorem proving tools maturing with a number of successful, real-life applications.  ...  We argue that the combination of those two trends makes it feasible, and desirable, to formally verify production-quality operating systems -now.  ...  and the ICT Research Centre of Excellence programs.  ... 
dblp:conf/hotos/TuchKH05 fatcat:w3jtvh2cqfb2hcc7gfn7zjdrxy

SPLEMMA

Daniel Romero, Simon Urli, Clément Quinton, Mireille Blay-Fornarino, Philippe Collet, Laurence Duchien, Sébastien Mosser
2013 Proceedings of the 17th International Software Product Line Conference co-located workshops on - SPLC '13 Workshops  
We report on the application of our approach on two spls: YourCast for digital signage systems, and SALOON, which enables generation of configurations for cloud providers. 3 SPLE for Software Product Line  ...  or feature models used for the product derivation.  ...  In YourCast and SALOON, the definition of Interspatial Contributions makes tools generated by SPLEmma check the presence of the required elements as well as their correct structure and basic semantics  ... 
doi:10.1145/2499777.2500709 dblp:conf/splc/0002UQBCDM13 fatcat:satbwoamibfhxb2ivdkeujekf4

Correct by Construction Networks Using Stepwise Refinement

Leonid Ryzhyk, Nikolaj Bjørner, Marco Canini, Jean-Baptiste Jeannin, Cole Schlesinger, Douglas B. Terry, George Varghese
2017 Symposium on Networked Systems Design and Implementation  
We present Cocoon, a framework for SDN development that facilitates both the design and verification of complex networks using stepwise refinement to move from a high-level specification to the final network  ...  For example, an enterprise network, equipped with VLANs, ACLs, and Level 2 and Level 3 Routing, can be decomposed cleanly into abstractions for each mechanism, and the resulting stepwise verification is  ...  of Cocoon verification tools.  ... 
dblp:conf/nsdi/RyzhykBCJSTV17 fatcat:7hu2shh4p5cqhl6brbodn2tvba

The Content Analysis Method for the Information Resources Formation in Electronic Content Commerce Systems

Andrii Berko, Vasyl Andrunyk, Lyubomyr Chyrun, Mykhailo Sorokovskyy, Oksana Oborska, Oksana Oryshchyn, Mykhailo Luchkevych, Oksana Brodovska
2021 International Conference on Computational Linguistics and Intelligent Systems  
A model and a typical generalized architecture of an ECCS are developed.  ...  Strategies for designing and implementing ECCS using an on-line journal and newspaper that reflects the results of theoretical studies are developed.  ...  tools unification for content management, formation, and support [1] [2] [3] .  ... 
dblp:conf/colins/BerkoACSOOLB21 fatcat:ei33df4five5zpnenxiq5d7f4i

An Agent-Based Approach For Hybrid Multi-Cloud Applications

Djamel Benmerzoug
2013 Scalable Computing : Practice and Experience  
These rules are implemented in IP2CPN: the tool we developed to automatically generate Petri nets from protocols specifications.  ...  In this context, Agent Interaction Protocols (IP) are a useful way for structuring communicative interaction among business partners, by organizing messages into relevant contexts and providing a common  ...  The author would like to thank the anonymous reviewers for their valuable comments and suggestions, which were helpful in improving the paper.  ... 
doi:10.12694/scpe.v14i2.843 fatcat:s3sejvxfgbfx7pj5yef77tbfry

Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework

A. Vasudevan, S. Chaki, Limin Jia, J. McCune, J. Newsome, A. Datta
2013 2013 IEEE Symposium on Security and Privacy  
The model checker CBMC automatically verifies 5208 lines of C code in about 80 seconds using less than 2GB of RAM.  ...  We present the design, implementation, and verification of XMHF-an eXtensible and Modular Hypervisor Framework.  ...  This work was partially supported by NSF grants CNS-1018061, CCF-0424422, CNS-0831440, and an AFOSR MURI on Science of Cybersecurity. Copyright 2012 Carnegie Mellon University and IEEE 3 .  ... 
doi:10.1109/sp.2013.36 dblp:conf/sp/VasudevanCJMND13 fatcat:dugdofrzlfeczkkp5bobzqj2ji

Storage Systems are Distributed Systems (So Verify Them That Way!)

Travis Hance, Andrea Lattuada, Chris Hawblitzel, Jon Howell, Rob Johnson, Bryan Parno
2020 USENIX Symposium on Operating Systems Design and Implementation  
To verify distributed systems, prior work introduced a methodology for verifying both the code running on individual machines and the correctness of the overall system when those machines interact via  ...  In building VeriBetrKV, we introduce new techniques to scale automated verification to larger code bases, still without introducing domain-specific logic or tooling.  ...  Sloan Foundation, and the NSF/VMware Partnership on Software Defined Infrastructure as a Foundation for Clean-Slate Computing Security (SDI-CSCS) program under Award No. CNS-1700521.  ... 
dblp:conf/osdi/HanceLHHJP20 fatcat:qawfx4t6fnasfpq5lw63xyy72i

Modeling and Analysis of State-of-the-art VM-based Cloud Management Platforms

Saif U. R. Malik, Samee U. Khan, Sudarshan K. Srinivasan
2013 IEEE Transactions on Cloud Computing  
We have used high-level Petri nets (HLPN) to model and analyze the structural and behavioral properties of the systems.  ...  In this paper, we provide a formal analysis, modeling, and verification of three open source state-of-the-art VM-based cloud management platforms: 1) Eucalyptus, 2) Open Nebula, and 3) Nimbus.  ...  The verification results shown in the paper indicate that the models are correct and feasible as the numbers of VM grow.  ... 
doi:10.1109/tcc.2013.3 fatcat:2knlcnobgrcaxkxfoqsqxaeoai

Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel

Luke Nelson, Jacob Van Geffen, Emina Torlak, Xi Wang
2020 USENIX Symposium on Operating Systems Design and Implementation  
We verify these JITs using Jitterbug, the first framework to provide a precise specification of JIT correctness that is capable of ruling out real-world bugs, and an automated proof strategy that scales  ...  Using Jitterbug, we have designed, implemented, and verified a new BPF JIT for 32-bit RISC-V, found and fixed 16 previously unknown bugs in five other deployed JITs, and developed new JIT optimizations  ...  This work was supported by NSF awards CCF-1651225, CCF-1836724, and CNS-1844807, and by a gift from the VMware University Research Fund.  ... 
dblp:conf/osdi/NelsonGTW20 fatcat:suiucy3jrjhqffsc3guskgdcxq

Adapting Bro into SCADA

Hui Lin, Adam Slagell, Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer
2013 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop on - CSIIRW '13  
Both [1] and [2] emphasize the design of system models or specifications and their formal verification.  ...  Although our work also proposes a protocol validation policy for DNP3, we focus on the design of an applicable framework that can be used in real SCADA systems to provide various runtime semantic analyses  ...  The DNP3 parser, however, exploits a compiler-assisted tool named binpac to shorten the development period and to ensure logical correctness [6] .  ... 
doi:10.1145/2459976.2459982 dblp:conf/csiirw/LinSMKI13 fatcat:joi4lt2i2ng6johvihsrxtxwgi

KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration [article]

Mubin Ul Haque, M. Mehdi Kholoosi, M. Ali Babar
2021 arXiv   pre-print
Our solution leverages keyword and learning models to systematically capture, link, and correlate heterogeneous and multi-vendor configuration space in a unified structure for supporting automation of  ...  We also demonstrate the utilization of the knowledge graph for automated misconfiguration mitigation in a Kubernetes cluster.  ...  integration of security tools using semantic knowledge,” in International [Online].  ... 
arXiv:2112.12595v1 fatcat:3ddw5irclrgxfooe3chpwzqfpi

HL7 FHIR with SNOMED-CT to Achieve Semantic and Structural Interoperability in Personal Health Data: A Proof-of-Concept Study

Ayan Chatterjee, Nibedita Pahari, Andreas Prinz
2022 Sensors  
Heterogeneity is a problem in storing and exchanging data in a digital health information system (HIS) following semantic and structural integrity.  ...  Fast healthcare interoperable resources (FHIR) as a structural standard may explain other information models, (e.g., personal, physiological, and behavioral data from heterogeneous sources, such as activity  ...  Finally, we discuss semantic and structural interoperability verification methods for our tethered PHR solution.  ... 
doi:10.3390/s22103756 pmid:35632165 pmcid:PMC9147872 fatcat:xneket7mezft7ku3qfjsi62pcy

Reducing crash recoverability to reachability

Eric Koskinen, Junfeng Yang
2016 Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL 2016  
In this paper we first provide a hierarchical formal model of what it means for a program to be crash recoverable.  ...  We have applied our tool to benchmark examples drawn from industrial file systems and databases, including GDBM, LevelDB, LMDB, PostgreSQL, SQLite, VMware and ZooKeeper.  ...  Yang's contribution to this paper was supported in part by AFRL FA8650-11-C-7190 and FA8750-10-2-0253; ONR N00014-12-1-0166; NSF CCF-1162021, CNS-1054906; an NSF CAREER award; an AFOSR YIP award; and a  ... 
doi:10.1145/2837614.2837648 dblp:conf/popl/KoskinenY16 fatcat:efsqlnqemfbspmzefmvqcmnv2q

Reducing crash recoverability to reachability

Eric Koskinen, Junfeng Yang
2016 SIGPLAN notices  
In this paper we first provide a hierarchical formal model of what it means for a program to be crash recoverable.  ...  We have applied our tool to benchmark examples drawn from industrial file systems and databases, including GDBM, LevelDB, LMDB, PostgreSQL, SQLite, VMware and ZooKeeper.  ...  Yang's contribution to this paper was supported in part by AFRL FA8650-11-C-7190 and FA8750-10-2-0253; ONR N00014-12-1-0166; NSF CCF-1162021, CNS-1054906; an NSF CAREER award; an AFOSR YIP award; and a  ... 
doi:10.1145/2914770.2837648 fatcat:rppzouxvpzhyhkfwt6pmflv35u

Proactive Security Analysis of Changes in Virtualized Infrastructures

Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
Our approach combines such a model of operations with an information flow analysis suited for isolation as well as a policy verifier for a variety of security and operational policies.  ...  We achieve this by contributing the first formal model of cloud management operations that captures their impact on the infrastructure in the form of graph transformations.  ...  We thank our shepherd John McDermott and the anonymous reviewers for insightful comments, as well as Arend Rensink for supporting us with GROOVE.  ... 
doi:10.1145/2818000.2818034 dblp:conf/acsac/BleikertzVGM15 fatcat:abu37usihjbzfc4u3ndlyubtfi
« Previous Showing results 1 — 15 out of 270 results