Results 1 - 10
of
142
Improved Tool Support for Machine-Code Decompilation in HOL4
"... The HOL4 interactive theorem prover provides a sound logical environment for reasoning about machine-code programs. The rigour of HOL's LCF-style kernel naturally guarantees very high levels of assurance, but it does present challenges when it comes implementing efficient proof tools. This pape ..."
Abstract
- Add to MetaCart
The HOL4 interactive theorem prover provides a sound logical environment for reasoning about machine-code programs. The rigour of HOL's LCF-style kernel naturally guarantees very high levels of assurance, but it does present challenges when it comes implementing efficient proof tools
Machine-code verification for multiple architectures: An application of decompilation into logic
- In Formal Methods in Computer Aided Design (FMCAD
, 2008
"... Abstract — Realistic formal specifications of machine languages for commercial processors consist of thousands of lines of definitions. Current methods support trustworthy proofs of the correctness of programs for one such specification. However, these methods provide little or no support for reusin ..."
Abstract
-
Cited by 17 (9 self)
- Add to MetaCart
for reusing proofs of the same algorithm implemented in different machine languages. We describe an approach, based on proof-producing decompilation, which both makes machine-code verification tractable and supports proof reuse between different languages. We briefly present examples based on detailed models
Decompilation into logic — improved
- In FMCAD’12. ACM/IEEE
, 2012
"... Abstract-This paper presents improvements to a technique which aids verification of machine-code programs. This technique, called decompilation into logic, allows the verifier to only deal with tractable extracted models of the machine code rather than the concrete code itself. Our improvements mak ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract-This paper presents improvements to a technique which aids verification of machine-code programs. This technique, called decompilation into logic, allows the verifier to only deal with tractable extracted models of the machine code rather than the concrete code itself. Our improvements
Proof Pearl: A Verified Bignum Implementation in x86-64 Machine Code
"... Abstract. Verification of machine code can easily deteriorate into an endless clutter of low-level details. This paper presents a case study which shows that machine-code verification does not necessitate ghastly lowlevel proofs. The case study we describe is the construction of an x86-64 implementa ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
for arrays and previously developed tools, namely, a proof-producing decompiler and compiler. The work presented in this paper has been developed in the HOL4 theorem prover. The case study resulted in 800 lines of verified 64-bit x86 machine code. 1
Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning
"... Code review is often suggested as a means of improv-ing code quality. Since humans are poor at repetitive tasks, some form of tool support is valuable. To that end we de-veloped a prototype tool to illustrate the novel idea of ap-plying machine learning (based on Normalised Compres-sion Distance) to ..."
Abstract
- Add to MetaCart
Code review is often suggested as a means of improv-ing code quality. Since humans are poor at repetitive tasks, some form of tool support is valuable. To that end we de-veloped a prototype tool to illustrate the novel idea of ap-plying machine learning (based on Normalised Compres-sion Distance
Formal certification of code-based cryptographic proofs
- 4 th Workshop on Formal and Computational Cryptography (FCC
, 2008
"... As cryptographic proofs have become essentially unverifiable, cryptographers have argued in favor of developing techniques that help tame the complexity of their proofs. Game-based techniques provide a popular approach in which proofs are structured as sequences of games, and in which proof steps es ..."
Abstract
-
Cited by 84 (25 self)
- Add to MetaCart
precisely and to carry out proofs systematically, typical proofs are so long and involved that formal verification is necessary to achieve a high degree of confidence. We present CertiCrypt, a framework that enables the machine-checked construction and verification of code-based proofs. CertiCrypt is built
Study on transformation method of numerically-controlled machine tool
"... Abstract.In the research of the transformation method of numerically-controlled machine tool (NC machine), due to the current methods exist the problem of that for solving process is complex and the optimization process is easy to fall into local optimal solution, a transformation method of NC machi ..."
Abstract
- Add to MetaCart
machine based on improved particle swarm optimization algorithm is presented. Firstly, particle swarm algorithm and the training parameters of support vector machine (SVM) are fused, to set up the prediction model of transformation state based optimization SVM for NC machine. And then the genetic
Improved M-ary Signal Detection using Support Vector Machine Classifiers
"... Abstract—Support Vector Machine (SVM) is a statistical learning tool that was initially developed by Vapnik in 1979 and later developed to a more complex concept of structural risk minimization (SRM). SVM is playing an increasing role in applications to detection problems in various engineering prob ..."
Abstract
- Add to MetaCart
Abstract—Support Vector Machine (SVM) is a statistical learning tool that was initially developed by Vapnik in 1979 and later developed to a more complex concept of structural risk minimization (SRM). SVM is playing an increasing role in applications to detection problems in various engineering
Verified Software: Theories, Tools, Experiments, Vision of a Grand Challenge Project
- Lecture Notes in Computer Science 4171
"... Summary. The ideal of correct software has long been the goal of research in Computer Science. We now have a good theoretical understanding of how to describe what programs do, how they do it, and why they work. This understanding has already been applied to the design, development and manual verif ..."
Abstract
-
Cited by 22 (0 self)
- Add to MetaCart
logical proof to give an automatic check of the correctness of programs submitted to it. Prototypes for the program verifier will be based on a sound and complete theory of programming; they will be supported by a range of program construction and analysis tools; and the entire toolset will be evaluated
Summer Manager
"... Developed system to encode safety invariants for machine code programs using principles from mathematical logic. Research Assistant 2000–2005 Developed Foundational Proof-Carrying Code for certifying safety of machine-code programs. Maintained 140,000-line code base (Twelf—logic programming and theo ..."
Abstract
- Add to MetaCart
and theorem proving) and developed supporting tools (Awk). Proved theorems in machine-checked formal logic. Improved type systems for machine code. Plaintiffs in Gusciora v. Corzine (N.J. Super. Ct. Law Div.) Summer 2008 Expert Study Group Member (pro bono) Analyzed security and accuracy of Sequoia AVC
Results 1 - 10
of
142