International audienceComputing relies on architecture specifications to decouple hardware and software development. Historically these have been prose documents, with all the problems that entails, but research over the last ten years has developed rigorous and executable-as-test-oracle specifications of mainstream architecture instruction sets and "user-mode" concurrency, clarifying architectures and bringing them into the scope of programming-language semantics and verification. However, the system semantics, of instruction-fetch and cache maintenance, exceptions and interrupts, and address translation, remains obscure, leaving us without a solid foundation for verification of security-critical systems software. In this paper we establis...
In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA...
We describe the formal verification of a hardware subsystem consisting of a memory management unit a...
The majority of errors within a software project are introduced during the requirements and design p...
AbstractComputing relies on architecture specifications to decouple hardware and software developmen...
International audienceIn this paper we develop semantics for key aspects of the ARMv8 multiprocessor...
This work was partly funded by the EPSRC Programme Grant REMS: Rigorous Engineering for Mainstream S...
Copyright is held by the owner/author(s). In this paper we develop semantics for key aspects of the ...
AbstractArchitecture specifications such as Armv8-A and RISC-V are the ultimate foundation for softw...
Architecture specifications notionally define the fundamental interface between hardware and softwar...
Virtual memory is an essential mechanism for enforcing security boundaries, but its relaxed-memory c...
ARM has a relaxed memory model, previously specified in informal prose for ARMv7 and ARMv8. Over tim...
This paper presents a detailed description of the application of a formal verification methodology ...
We prove the correctness of compilation of relaxed memory accesses and release-acquire fences from t...
International audienceEven if a software is proven sound and secure, an attacker can still insert vu...
Operating system (OS) kernels achieve isolation between user-level processes using multi-level page ...
In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA...
We describe the formal verification of a hardware subsystem consisting of a memory management unit a...
The majority of errors within a software project are introduced during the requirements and design p...
AbstractComputing relies on architecture specifications to decouple hardware and software developmen...
International audienceIn this paper we develop semantics for key aspects of the ARMv8 multiprocessor...
This work was partly funded by the EPSRC Programme Grant REMS: Rigorous Engineering for Mainstream S...
Copyright is held by the owner/author(s). In this paper we develop semantics for key aspects of the ...
AbstractArchitecture specifications such as Armv8-A and RISC-V are the ultimate foundation for softw...
Architecture specifications notionally define the fundamental interface between hardware and softwar...
Virtual memory is an essential mechanism for enforcing security boundaries, but its relaxed-memory c...
ARM has a relaxed memory model, previously specified in informal prose for ARMv7 and ARMv8. Over tim...
This paper presents a detailed description of the application of a formal verification methodology ...
We prove the correctness of compilation of relaxed memory accesses and release-acquire fences from t...
International audienceEven if a software is proven sound and secure, an attacker can still insert vu...
Operating system (OS) kernels achieve isolation between user-level processes using multi-level page ...
In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA...
We describe the formal verification of a hardware subsystem consisting of a memory management unit a...
The majority of errors within a software project are introduced during the requirements and design p...