Results 1 - 10
of
91
Conflicts in Policy-based Distributed Systems Management
- IEEE Transactions on Software Engineering
, 1999
"... Modern distributed systems contain a large number of objects, and must be capable of evolving, without shutting down the complete system, to cater for changing requirements. There is a need for distributed, automated management agents whose behavior also has to dynamically change to reflect the evol ..."
Abstract
-
Cited by 253 (17 self)
- Add to MetaCart
at the organizational level (c.f. goals) and then refined to implementable actions. We are concerned with two types of policies. Authorization policies specify what activities a manager is permitted or forbidden to do to a set of target objects and are similar to security accesscontrol policies. Obligation policies
Automated Code Generator Verification Based on Algebraic Laws
, 1995
"... ing from Machine Details In order to derive a verified compiler, Muller-Olm first defines the effect of target machine (in this case transputer) instructions by simple source language processes, consisting mainly of delays indicating time consumption (as taken from the reference manual [Inm88]), as ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
]), assignments to variables representing the machine state, and some assertions. As an example, let us look at the definition of the effect of "jump" instructions: E 0 (j) w \Delta 3 ; IP; A; B; C; OReg:= IP + OReg; ?; ?; ?; 0 (1) This refinement relationship expresses that one may assume at least (w
Verification of C Programs Using Automated Reasoning
"... Much of the embedded software development market has necessarily tight constraints on program size and processor power, hence developers use handwritten C rather than autocode. They rely primarily on testing to find errors in their code. We have an established software development tool known commerc ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
, this is not helpful to developers of embedded software who are constrained to write code by hand. We therefore decided to investigate whether automated reasoning could provide a similar degree of success in the verification of annotated C code. We present our preliminary findings.
Mind the gap: A verification framework for low-level C.
, 2009
"... Abstract. This paper presents the formal Isabelle/HOL framework we use to prove refinement between an executable, monadic specification and the C implementation of the seL4 microkernel. We describe the refinement framework itself, the automated tactics it supports, and the connection to our previou ..."
Abstract
-
Cited by 12 (7 self)
- Add to MetaCart
Abstract. This paper presents the formal Isabelle/HOL framework we use to prove refinement between an executable, monadic specification and the C implementation of the seL4 microkernel. We describe the refinement framework itself, the automated tactics it supports, and the connection to our
Abstraction and assume-guarantee reasoning for automated software verification
, 2004
"... Compositional verification and abstraction are the key techniques to address the state explosion problem associated with model checking of concurrent software. A promising compositional approach is to prove properties of a system by checking properties of its components in an assume-guarantee style. ..."
Abstract
-
Cited by 10 (4 self)
- Add to MetaCart
. This article proposes a framework for performing abstraction and assume-guarantee reasoning of concurrent C code in an incremental and fully automated fashion. The framework uses predicate abstraction to extract and refine finite state models of software and it uses an automata learning algorithm
Secure distributed programming with value-dependent types
- In: Proceedings of the 13th ACM SIGPLAN International Conference on Functional Programming (ICFP
, 2011
"... Distributed applications are difficult to program reliably and securely. Dependently typed functional languages promise to prevent broad classes of errors and vulnerabilities, and to enable program verification to proceed side-by-side with development. However, as recursion, effects, and rich librar ..."
Abstract
-
Cited by 80 (15 self)
- Add to MetaCart
to libraries for concurrency, networking, cryptography, and interoperability with C#, F#, and the other.NET languages. The compiler produces verifiable binaries with 60 % code size overhead for proofs and types, as much as a 45x improvement over the Fine compiler, while still enabling efficient bytecode
ASPIER: An Automated Framework for Verifying Security Protocol Implementations
"... Abstract—We present ASPIER – the first framework that combines software model checking with a standard protocol security model to automatically analyze authentication and secrecy properties of protocol implementations in C. The technical approach extends the iterative abstraction-refinement methodol ..."
Abstract
-
Cited by 37 (0 self)
- Add to MetaCart
consisting of up to 3 servers and 3 clients. We have also implemented two distinct methods for reasoning about attacker message derivations, and evaluated them in the context of OpenSSL verification. ASPIER detected the “version-rollback ” vulnerability in OpenSSL 0.9.6c source code and successfully verified
Theta Reference Manual
, 1995
"... This document describes a new programming language called Theta. Theta is a sequential, strongly-typed, object-oriented language. It provides separate mechanisms for type hierarchy, inheritance, and parametric polymorphism. It also provides separate mechanisms for specifications, which define the in ..."
Abstract
-
Cited by 79 (9 self)
- Add to MetaCart
the interfaces of new abstractions, and code that implements the new abstractions, and it allows multiple implementations of types and routines. It has a module mechanism that encapsulates the details of type and routine implementations, while allowing related implementations to share implementation
HW/SW interfaces design of a VDSL modem using automatic refinement of a virtual architecture specification into a multiprocessor SoC: a case study
- Proceedings DATE 2002, March 2002
, 2002
"... Multiprocessor system-on-a-chip (SoC) platforms are ideal hardware platforms for implementing nowadayscomplex telecommunication, automotive and network applications. Nevertheless, the design and verification of such applications requires a high degree of automation because the configuration of all t ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Multiprocessor system-on-a-chip (SoC) platforms are ideal hardware platforms for implementing nowadayscomplex telecommunication, automotive and network applications. Nevertheless, the design and verification of such applications requires a high degree of automation because the configuration of all
Model-Carrying Code (MCC): A New Paradigm for Mobile-Code Security
- In Proceedings of the New Security Paradigms Workshop (NSPW
, 2001
"... A new approach to ensuring the security of mobile code is presented. Our approach enables a mobile-code consumer to understand and formally reason about what a piece of mobile code can do; check if the actions of the code are compatible with his/her security policies; and, if so, execute the code. ..."
Abstract
-
Cited by 24 (0 self)
- Add to MetaCart
. The compatibility-checking process is automated, but if there are conflicts, consumers have the opportunity to refine their policies, taking into account the functionality provided by the mobile code. Finally, when the code is executed, our framework uses advanced runtime-monitoring techniques to ensure
Results 1 - 10
of
91