Hard, machine-supported formal verification of software is at a turning point. Recent years have seen theorem proving tools maturing with a number of successful, real-life applications. At the same time, small high-performance OS kernels, which can drastically reduce the size of the trusted computing base, have become more popular. We argue that the combination of those two trends makes it feasible, and desirable, to formally verify production-quality operating systems -- now
In this talk we will demonstrate the use of formal verification techniques for embedded systems soft...
Case studies for formal software verification can be divided into two categories: while (i) unsound ...
Two main kinds of tools available for formal software verification are point tools and general-purpo...
completed and in this article I’m showing what we have proved and what that means for security. The ...
Abstract. This paper gives a high-level introduction to the topic of formal, interactive, machine-ch...
We present recent work on building and scaling trustworthy systems with formal, machine-checkable pr...
There is increasing pressure on providing a high degree of assurance of operation system’s security ...
The functional correctness of safety- and security-critical software is of utmost importance. Nowada...
Errors caused by the interaction of computer systems with the physical world are hard to mitigate bu...
Thesis (Ph.D.)--University of Washington, 2020Systems software interfaces with hardware, multiplexes...
Program verification assumes a formal program specification. In software-intensive systems, such spe...
This paper reports a study of verification in the high-level design phase of operating system develo...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
Abstract. Operating system kernels are complex, critical, and difficult to test systems. The imperat...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
In this talk we will demonstrate the use of formal verification techniques for embedded systems soft...
Case studies for formal software verification can be divided into two categories: while (i) unsound ...
Two main kinds of tools available for formal software verification are point tools and general-purpo...
completed and in this article I’m showing what we have proved and what that means for security. The ...
Abstract. This paper gives a high-level introduction to the topic of formal, interactive, machine-ch...
We present recent work on building and scaling trustworthy systems with formal, machine-checkable pr...
There is increasing pressure on providing a high degree of assurance of operation system’s security ...
The functional correctness of safety- and security-critical software is of utmost importance. Nowada...
Errors caused by the interaction of computer systems with the physical world are hard to mitigate bu...
Thesis (Ph.D.)--University of Washington, 2020Systems software interfaces with hardware, multiplexes...
Program verification assumes a formal program specification. In software-intensive systems, such spe...
This paper reports a study of verification in the high-level design phase of operating system develo...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
Abstract. Operating system kernels are complex, critical, and difficult to test systems. The imperat...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
In this talk we will demonstrate the use of formal verification techniques for embedded systems soft...
Case studies for formal software verification can be divided into two categories: while (i) unsound ...
Two main kinds of tools available for formal software verification are point tools and general-purpo...