Information security is important in academia, industry and government. The use of formal methods in the design and development of computer hardware and software systems greatly increases the confidence in the security of the information on these systems. Interrupt features are included in most microprocessors and are essential for input/output capabilities. This work uses formal methods to develop and verify correctness properties for well behaved microprocessor interrupts. Several microprocessor architectures are studied to identify common interrupt properties. The well behaved interrupt is then defined and further developed using an abstract state machine and the verification proofs were conducted with the Clio verification system. The a...
AbstractMost of the research effort towards verification of concurrent software has focused on multi...
An interrupt is an event that alters the sequence of instructions executed by a processor and requir...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
Information security is important in academia, industry and government. The use of formal methods in...
Abstract—Interrupt behaviors, particularly the external ones, are difficult to verify in a microproc...
In this work we present a verification framework for applications for the embedded system operating ...
Interrupt behaviors, especially the external ones, are diffi-cult to verify in a microprocessor desi...
AbstractThis paper presents an approach to the efficient abstraction of interrupt handling in microc...
The interrupt mechanism in a system-on-chip (SoC) joins the SoCs hardware and software behaviors. We...
Journal ArticleInterrupts are superficially similar to threads, but there are subtle semantic differ...
Interrupt-driven software is difficult to test and debug, especially when interrupts can be nested a...
Abstract—Interrupt-driven software is difficult to test and debug, especially when interrupts can be...
Interrupt-driven software is difficult to test and debug, especially when interrupts can be nested a...
The paper presents the application of formal verification techniques to a real microprocessor. The d...
Pervasive formal verification guarantees highest reliability of complex multi-core computer systems....
AbstractMost of the research effort towards verification of concurrent software has focused on multi...
An interrupt is an event that alters the sequence of instructions executed by a processor and requir...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...
Information security is important in academia, industry and government. The use of formal methods in...
Abstract—Interrupt behaviors, particularly the external ones, are difficult to verify in a microproc...
In this work we present a verification framework for applications for the embedded system operating ...
Interrupt behaviors, especially the external ones, are diffi-cult to verify in a microprocessor desi...
AbstractThis paper presents an approach to the efficient abstraction of interrupt handling in microc...
The interrupt mechanism in a system-on-chip (SoC) joins the SoCs hardware and software behaviors. We...
Journal ArticleInterrupts are superficially similar to threads, but there are subtle semantic differ...
Interrupt-driven software is difficult to test and debug, especially when interrupts can be nested a...
Abstract—Interrupt-driven software is difficult to test and debug, especially when interrupts can be...
Interrupt-driven software is difficult to test and debug, especially when interrupts can be nested a...
The paper presents the application of formal verification techniques to a real microprocessor. The d...
Pervasive formal verification guarantees highest reliability of complex multi-core computer systems....
AbstractMost of the research effort towards verification of concurrent software has focused on multi...
An interrupt is an event that alters the sequence of instructions executed by a processor and requir...
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, v...