16,636 Hits in 11.0 sec

Verification of Data-Aware Processes via Array-Based Systems (Extended Version) [article]

Diego Calvanese, Silvio Ghilardi, Alessandro Gianola, Marco Montali, Andrey Rivkin
2019 arXiv   pre-print
On the other, we are able to exploit SMT technology in implementations, building on the well-known MCMT model checker for array-based systems, and extending it to make all our foundational results fully  ...  We view such artifact systems as array-based systems, which allows us to check safety by adapting backward reachability, establishing for the first time a correspondence with model checking based on Satisfiability-Modulo-Theories  ...  We consider the present work as the starting point for a full line of research dedicated to SMT-based techniques for the effective verification of data-aware processes, addressing richer forms of verification  ... 
arXiv:1806.11459v2 fatcat:j3iv2rnwuvbpzdp6mnlcfie2mq

Petri Nets with Parameterised Data: Modelling and Verification (Extended Version) [article]

Silvio Ghilardi, Alessandro Gianola, Marco Montali, Andrey Rivkin
2020 arXiv   pre-print
We systematically encode catalog-nets into one of the reference frameworks for the (parameterised) verification of data and processes.  ...  Each of such approaches reflects specific demands in the whole process-data integration spectrum.  ...  At the same time, we are currently defining a benchmark for data-aware processes, systematically translating the artifact systems benchmark defined in [19] into corresponding imperative data-aware formalisms  ... 
arXiv:2006.06630v1 fatcat:zwlnuxnkzvflriotykv5yds4wm

Paxos Consensus, Deconstructed and Abstracted (Extended Version) [article]

Álvaro García-Pérez, Alexey Gotsman, Yuri Meshman, Ilya Sergey
2018 arXiv   pre-print
In this work, we address the challenge of specifying and verifying complex Paxos-based systems by (a) devising composable specifications for implementations of Paxos's single-decree version, and (b) engineering  ...  We further reuse this result and show how to obtain a verified implementation of Multi-Paxos from a verified implementation of single-decree Paxos, by a series of novel protocol-aware transformations of  ...  The auxiliary pending thread pool ptp[n] is an array of pairs of Booleans and values of length n, where n is the number of processes in the system.  ... 
arXiv:1802.05969v1 fatcat:roxatjzdcfczhim6elusi26aoi

Gobra: Modular Specification and Verification of Go Programs (extended version) [article]

Felix A. Wolf, Linard Arquint, Martin Clochard, Wytse Oortwijn, João C. Pereira, Peter Müller
2021 arXiv   pre-print
Gobra is based on separation logic and supports a large subset of Go.  ...  This combination of features poses interesting challenges for static verification, most prominently the combination of a mutable heap and advanced concurrency primitives.  ...  This project has received funding from the European Union's Horizon 2020 research and innovation program within the framework of the NGI-POINTER Project funded under grant agreement No 871528.  ... 
arXiv:2105.13840v1 fatcat:2qvkaz5c4ngsvoywt4uvju6y6q

Reductions for Safety Proofs (Extended Version) [article]

Azadeh Farzan, Anthony Vandikas
2019 arXiv   pre-print
In this paper, we propose a general approach to proof simplification of concurrent programs based on exploring generic classes of reductions.  ...  complete Floyd-Hoare style proofs are theoretically beyond the reach of automated verification technology of today.  ...  Safety Proofs (Extended Version) 1:17 Theorem 5.9.  ... 
arXiv:1910.14619v1 fatcat:hpb24zfxgvbkjp3scny57yh7yu

Combined Covers and Beth Definability (Extended Version) [article]

Diego Calvanese and Silvio Ghilardi and Alessandro Gianola and Marco Montali and Andrey Rivkin
2020 arXiv   pre-print
arising in many model-checking applications (in particular, the ones oriented to verification of data-aware processes).  ...  Motivated by applications to the verification of data-aware processes, we proved in a previous paper that covers are strictly related to model completions, a well-known topic in model theory.  ...  However, many interesting examples arising in model-checking verification are multi-sorted: this is the case of array-based systems [15] and in particular of the array-based system used in data-aware  ... 
arXiv:1911.07774v3 fatcat:qz7fwdkqvnf57gfrrulhkxp7ai

Modeling and In-Database Management of Relational, Data-Aware Processes (Extended Version) [article]

Diego Calvanese, Marco Montali, Fabio Patrizi, Andrey Rivkin
2019 arXiv   pre-print
We attack these two challenges by proposing a declarative approach, fully grounded in SQL, that supports the agile modelling of relational data-aware processes directly on top of relational databases.  ...  During the last two decades, it has been increasingly acknowledged that the engineering of information systems usually requires a huge effort in integrating master data and business processes.  ...  model that is enacted. 2 Data-Aware Process Specification Language DAPHNE relies on a declarative, SQL-based data-aware processes specification language (dapSL) to capture processes operating over relational  ... 
arXiv:1810.08062v3 fatcat:2u6wwtbujrbxhcuqmuvxhhixbi

From IP ID to Device ID and KASLR Bypass (Extended Version) [article]

Amit Klein, Benny Pinkas
2019 arXiv   pre-print
Our work examines the generation of this field in Windows (versions 8 and higher), Linux and Android, and shows that the IP ID field enables remote servers to assign a unique ID to each device and thus  ...  In modern Linux and Android versions, this field leaks a kernel address, thus we also break KASLR.  ...  Versions and Linux Kernel Versions The Android operating system is based on the Linux kernel.  ... 
arXiv:1906.10478v2 fatcat:aqxxj4w54bhstbonrts23gy4qq

P^2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling (extended version) [article]

Bo Feng, Alejandro Mera, Long Lu
2019 arXiv   pre-print
Our framework, using a novel technique called P^2IM, abstracts diverse peripherals and handles firmware I/O on the fly based on automatically generated models.  ...  P^2IM is oblivious to peripheral designs and generic to firmware implementations, and therefore, applicable to a wide range of embedded devices.  ...  For example, firmware only checks the data-reception flag of USART when the receiver is enabled via CR.  ... 
arXiv:1909.06472v3 fatcat:zm372wbd75cpzdflxhukplkoam

QuickSilver: A Modeling and Parameterized Verification Framework for Systems with Distributed Agreement (Extended Version) [article]

Nouraldin Jaber
2021 arXiv   pre-print
We address this need for verification of distributed agreement-based systems through our novel modeling and verification framework, QuickSilver, that is not only modular, but also fully automated.  ...  This is unfortunate, as agreement-based distributed services such as data stores, locks, and ledgers are ubiquitous and potentially permit modular, scalable verification approaches that mimic their modular  ...  Any opinions, findings, and conclusions in this paper are those of the authors only and do not necessarily reflect the views of our sponsors.  ... 
arXiv:2004.04613v3 fatcat:i7gnsgkldjhmjl2e7n3nyvjdcm

Certifying Certainty and Uncertainty in Approximate Membership Query Structures – Extended Version [article]

Kiran Gopinathan, Ilya Sergey
2020 arXiv   pre-print
Because of these subtleties, a number of unsound arguments in such proofs have been made over the years.  ...  Correctness proofs of such structures involve subtle reasoning about bounds on probabilities of getting certain outcomes.  ...  Ilya Sergey's work has been supported by the grant of Singapore NRF National Satellite of Excellence in Trustworthy Software Systems (NSoE-TSS) and by Crystal Centre at NUS School of Computing.  ... 
arXiv:2004.13312v1 fatcat:igrbo3tk2rhrlkjselccqbuez4

Covert channels in TCP/IP protocol stack - extended version-

Aleksandra Mileva, Boris Panajotov
2014 Open Computer Science  
For most of the covert channels its data bandwidth is given.  ...  AbstractWe give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol.  ...  Surveys of this type are necessary for following trends in this field.  ... 
doi:10.2478/s13537-014-0205-6 fatcat:tkkyehibpbf3tl5x5bctsqkk6y

FiWi Access Networks Based on Next-Generation PON and Gigabit-Class WLAN Technologies: A Capacity and Delay Analysis (Extended Version) [article]

Frank Aurzada, Martin Lévesque, Martin Maier, Martin Reisslein
2013 arXiv   pre-print
In this paper, we develop an analytical framework for evaluating the capacity and delay performance of a wide range of routing algorithms in converged fiber-wireless (FiWi) broadband access networks based  ...  Our framework is very flexible and incorporates arbitrary frame size distributions, traffic matrices, optical/wireless propagation delays, data rates, and fiber faults.  ...  mesh network (WMN)based FiWi network was demonstrated by means of simulation and experiment for voice, video, and data traffic [4] .  ... 
arXiv:1311.0902v1 fatcat:kxgerl5khra4zkq3xahsmsu47i

Structuring the synthesis of heap-manipulating programs

Nadia Polikarpova, Ilya Sergey
2019 Proceedings of the ACM on Programming Languages (PACMPL)  
linked data structures.  ...  We explain and showcase the use of SSL on characteristic examples, describe the design of SuSLik, and report on our experience of using it to synthesize a series of benchmark programs manipulating heap-based  ...  A HIP and SLEEK verification system. In OOPSLA (Companion). ACM, 9-10.  ... 
doi:10.1145/3290385 fatcat:ixjdyxkr4fewvgbdottph6nvje

Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version [article]

Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens
2020 arXiv   pre-print
This is a very relevant instantiation as several recent papers have shown that interruptibility of enclaves leads to a variety of software-based side-channel attacks.  ...  This paper studies the problem of extending a processor with new features without weakening the security of the isolation mechanisms that the processor offers.  ...  Sancus system that we based our work on.  ... 
arXiv:2001.10881v1 fatcat:dxq3ppl5urczjl5pbt6ruhdj2e
« Previous Showing results 1 — 15 out of 16,636 results