• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 142
Next 10 →

Improved Tool Support for Machine-Code Decompilation in HOL4

by Anthony Fox
"... The HOL4 interactive theorem prover provides a sound logical environment for reasoning about machine-code programs. The rigour of HOL's LCF-style kernel naturally guarantees very high levels of assurance, but it does present challenges when it comes implementing efficient proof tools. This pape ..."
Abstract - Add to MetaCart
The HOL4 interactive theorem prover provides a sound logical environment for reasoning about machine-code programs. The rigour of HOL's LCF-style kernel naturally guarantees very high levels of assurance, but it does present challenges when it comes implementing efficient proof tools

Machine-code verification for multiple architectures: An application of decompilation into logic

by Magnus O. Myreen, Michael J. C. Gordon, Konrad Slind - In Formal Methods in Computer Aided Design (FMCAD , 2008
"... Abstract — Realistic formal specifications of machine languages for commercial processors consist of thousands of lines of definitions. Current methods support trustworthy proofs of the correctness of programs for one such specification. However, these methods provide little or no support for reusin ..."
Abstract - Cited by 17 (9 self) - Add to MetaCart
for reusing proofs of the same algorithm implemented in different machine languages. We describe an approach, based on proof-producing decompilation, which both makes machine-code verification tractable and supports proof reuse between different languages. We briefly present examples based on detailed models

Decompilation into logic — improved

by Magnus O Myreen , Michael J C Gordon , Konrad Slind , USA Rockwell Collins - In FMCAD’12. ACM/IEEE , 2012
"... Abstract-This paper presents improvements to a technique which aids verification of machine-code programs. This technique, called decompilation into logic, allows the verifier to only deal with tractable extracted models of the machine code rather than the concrete code itself. Our improvements mak ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract-This paper presents improvements to a technique which aids verification of machine-code programs. This technique, called decompilation into logic, allows the verifier to only deal with tractable extracted models of the machine code rather than the concrete code itself. Our improvements

Proof Pearl: A Verified Bignum Implementation in x86-64 Machine Code

by Magnus O. Myreen, Gregorio Curello
"... Abstract. Verification of machine code can easily deteriorate into an endless clutter of low-level details. This paper presents a case study which shows that machine-code verification does not necessitate ghastly lowlevel proofs. The case study we describe is the construction of an x86-64 implementa ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
for arrays and previously developed tools, namely, a proof-producing decompiler and compiler. The work presented in this paper has been developed in the HOL4 theorem prover. The case study resulted in 800 lines of verified 64-bit x86 machine code. 1

Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning

by Stefan Axelsson, Dejan Baca, Robert Feldt, Darius Sidlauskas, Denis Kacan
"... Code review is often suggested as a means of improv-ing code quality. Since humans are poor at repetitive tasks, some form of tool support is valuable. To that end we de-veloped a prototype tool to illustrate the novel idea of ap-plying machine learning (based on Normalised Compres-sion Distance) to ..."
Abstract - Add to MetaCart
Code review is often suggested as a means of improv-ing code quality. Since humans are poor at repetitive tasks, some form of tool support is valuable. To that end we de-veloped a prototype tool to illustrate the novel idea of ap-plying machine learning (based on Normalised Compres-sion Distance

Formal certification of code-based cryptographic proofs

by Gilles Barthe, Benjamin Grégoire, Santiago Zanella - 4 th Workshop on Formal and Computational Cryptography (FCC , 2008
"... As cryptographic proofs have become essentially unverifiable, cryptographers have argued in favor of developing techniques that help tame the complexity of their proofs. Game-based techniques provide a popular approach in which proofs are structured as sequences of games, and in which proof steps es ..."
Abstract - Cited by 84 (25 self) - Add to MetaCart
precisely and to carry out proofs systematically, typical proofs are so long and involved that formal verification is necessary to achieve a high degree of confidence. We present CertiCrypt, a framework that enables the machine-checked construction and verification of code-based proofs. CertiCrypt is built

Study on transformation method of numerically-controlled machine tool

by Meng Baojin, Qinhuangdao Institude Of Technology, Hebei Qinghuangdao
"... Abstract.In the research of the transformation method of numerically-controlled machine tool (NC machine), due to the current methods exist the problem of that for solving process is complex and the optimization process is easy to fall into local optimal solution, a transformation method of NC machi ..."
Abstract - Add to MetaCart
machine based on improved particle swarm optimization algorithm is presented. Firstly, particle swarm algorithm and the training parameters of support vector machine (SVM) are fused, to set up the prediction model of transformation state based optimization SVM for NC machine. And then the genetic

Improved M-ary Signal Detection using Support Vector Machine Classifiers

by J. P. Dubois, M. Abdul-latif
"... Abstract—Support Vector Machine (SVM) is a statistical learning tool that was initially developed by Vapnik in 1979 and later developed to a more complex concept of structural risk minimization (SRM). SVM is playing an increasing role in applications to detection problems in various engineering prob ..."
Abstract - Add to MetaCart
Abstract—Support Vector Machine (SVM) is a statistical learning tool that was initially developed by Vapnik in 1979 and later developed to a more complex concept of structural risk minimization (SRM). SVM is playing an increasing role in applications to detection problems in various engineering

Verified Software: Theories, Tools, Experiments, Vision of a Grand Challenge Project

by Tony Hoare , Jay Misra - Lecture Notes in Computer Science 4171
"... Summary. The ideal of correct software has long been the goal of research in Computer Science. We now have a good theoretical understanding of how to describe what programs do, how they do it, and why they work. This understanding has already been applied to the design, development and manual verif ..."
Abstract - Cited by 22 (0 self) - Add to MetaCart
logical proof to give an automatic check of the correctness of programs submitted to it. Prototypes for the program verifier will be based on a sound and complete theory of programming; they will be supported by a range of program construction and analysis tools; and the entire toolset will be evaluated

Summer Manager

by Christopher D. Richards, Advisor Andrew, Advisor Richard, W. Sproat
"... Developed system to encode safety invariants for machine code programs using principles from mathematical logic. Research Assistant 2000–2005 Developed Foundational Proof-Carrying Code for certifying safety of machine-code programs. Maintained 140,000-line code base (Twelf—logic programming and theo ..."
Abstract - Add to MetaCart
and theorem proving) and developed supporting tools (Awk). Proved theorems in machine-checked formal logic. Improved type systems for machine code. Plaintiffs in Gusciora v. Corzine (N.J. Super. Ct. Law Div.) Summer 2008 Expert Study Group Member (pro bono) Analyzed security and accuracy of Sequoia AVC
Next 10 →
Results 1 - 10 of 142
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University