LVI: Hijacking transient execution through microarchitectural load value injection

J Van Bulck, D Moghimi, M Schwarz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The recent Spectre attack first showed how to inject incorrect branch targets into a victim
domain by poisoning microarchitectural branch prediction history. In this paper, we …

Don't sit on the fence: A static analysis approach to automatic fence insertion

J Alglave, D Kroening, V Nimal, D Poetzl - ACM Transactions on …, 2017 - dl.acm.org
Modern architectures rely on memory fences to prevent undesired weakenings of memory
consistency. As the fences' semantics may be subtle, the automation of their placement is …

A formalization of Java's concurrent access modes

J Bender, J Palsberg - Proceedings of the ACM on Programming …, 2019 - dl.acm.org
Java's memory model was recently updated and expanded with new access modes. The
accompanying documentation for these access modes is intended to make strong …

Can we monitor all multithreaded programs?

A El-Hokayem, Y Falcone - … , RV 2018, Limassol, Cyprus, November 10–13 …, 2018 - Springer
Runtime Verification (RV) is a lightweight formal method which consists in verifying that an
execution of a program is correct wrt a specification. The specification formalizes with …

Fence synthesis under the c11 memory model

S Singh, D Sharma, I Jaju, S Sharma - International Symposium on …, 2022 - Springer
Abstract The C/C++ 11 (C11) standard offers a spectrum of ordering guarantees on memory
access operations. The combinations of such orderings pose a challenge in developing …

Polynomial-time fence insertion for structured programs

M Taheri, A Pourdamghani… - … Symposium on Distributed …, 2019 - drops.dagstuhl.de
To enhance performance, common processors feature relaxed memory models that reorder
instructions. However, the correctness of concurrent programs is often dependent on the …

[图书][B] Distributed Coordination and Computation Synthesis

F Houshmand - 2023 - search.proquest.com
Ensuring that our increasingly complicated distributed systems are simultaneously reliable
and efficient is challenging. Rigorous formal analyses can help make the design and …

Transaction protocol verification with labeled synchronization logic

M Lesani - NASA Formal Methods: 11th International Symposium …, 2019 - Springer
Synchronization algorithms that provide the transaction interface are intricate. We present an
algorithm description language that explicitly captures the type of the used synchronization …

[PDF][PDF] Program analysis under relaxed memory concurrency

S Singh - 2023 - cse.iitd.ac.in
Concurrency is ubiquitous. Concurrent processing improves the speed of execution, and
offers better resource utilization. However, the analysis of concurrent programs is …

[PDF][PDF] Low-level Concurrent Programming Using the Relaxed Memory Calculus

MJ Sullivan - 2017 - reports-archive.adm.cs.cmu.edu
Abstract The Relaxed Memory Calculus (RMC) is a novel approach for portable lowlevel
concurrent programming in the presence of the the relaxed memory behavior caused by …