Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2017.This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Cataloged from student-submitted PDF version of thesis.Includes bibliographical references (pages 85-87).Over the last decade, systems software verification has become increasingly practical. Many verified systems have been written in the language of a proof assistant, proved correct, and then made runnable using code extraction. However, due to the rigidity of extraction and the overhead of the target languages, the resulting code's CPU performance can suffer, with limited oppor...
Compilers are a prime target for formal verification, since compiler bugs invalidate higher-level co...
Abstract. The goal of this lecture is to show how modern theorem provers—in this case, the Coq proof...
Designing a tool to ease the development of high-level security or safety systems must consider to f...
This electronic version was submitted by the student author. The certified thesis is available in th...
MCQC is a compiler for extracting verified systems programs to low-level assembly, with no runtime o...
Thesis (Ph.D.)--University of Washington, 2018Modern computer systems rely on the correctness of at ...
Software controls many aspects of our daily lives, thus, software correctness is of utmost importanc...
Using proof assistants to perform formal, mechanical software verification is a powerful technique f...
Abstract. Guaranteeing correctness of compilation is a major precondition for correct software. Code...
Most software systems are described in high-level model or programming languages. Their runtime beha...
In this tool description paper we present a certifying code generation phase. Our code generation ph...
Guaranteeing correctness of compilation is a ma jor precondition for correct software. Code generati...
Guaranteeing correctness of compilation is a major precondition for correct software. Code generatio...
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12167).We present an origina...
Using proof assistants to perform formal, mechanical software verification is a powerful technique f...
Compilers are a prime target for formal verification, since compiler bugs invalidate higher-level co...
Abstract. The goal of this lecture is to show how modern theorem provers—in this case, the Coq proof...
Designing a tool to ease the development of high-level security or safety systems must consider to f...
This electronic version was submitted by the student author. The certified thesis is available in th...
MCQC is a compiler for extracting verified systems programs to low-level assembly, with no runtime o...
Thesis (Ph.D.)--University of Washington, 2018Modern computer systems rely on the correctness of at ...
Software controls many aspects of our daily lives, thus, software correctness is of utmost importanc...
Using proof assistants to perform formal, mechanical software verification is a powerful technique f...
Abstract. Guaranteeing correctness of compilation is a major precondition for correct software. Code...
Most software systems are described in high-level model or programming languages. Their runtime beha...
In this tool description paper we present a certifying code generation phase. Our code generation ph...
Guaranteeing correctness of compilation is a ma jor precondition for correct software. Code generati...
Guaranteeing correctness of compilation is a major precondition for correct software. Code generatio...
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12167).We present an origina...
Using proof assistants to perform formal, mechanical software verification is a powerful technique f...
Compilers are a prime target for formal verification, since compiler bugs invalidate higher-level co...
Abstract. The goal of this lecture is to show how modern theorem provers—in this case, the Coq proof...
Designing a tool to ease the development of high-level security or safety systems must consider to f...