Demystifying attestation in intel trust domain extensions via formal verification

MU Sardar, S Musaev, C Fetzer - IEEE access, 2021 - ieeexplore.ieee.org
In August 2020, Intel asked the research community for feedback on the newly offered
architecture extensions, called Intel Trust Domain Extensions (TDX), which give more control …

A calculus of atomic actions

T Elmas, S Qadeer, S Tasiran - ACM SIGPLAN Notices, 2009 - dl.acm.org
We present a proof calculus and method for the static verification of assertions and
procedure specifications in shared-memory concurrent programs. The key idea in our …

Natural proofs for structure, data, and separation

X Qiu, P Garg, A Ştefănescu, P Madhusudan - ACM SIGPLAN Notices, 2013 - dl.acm.org
We propose natural proofs for reasoning with programs that manipulate data-structures
against specifications that describe the structure of the heap, the data stored within it, and …

Specification and verification challenges for sequential object-oriented programs

GT Leavens, KRM Leino, P Müller - Formal Aspects of Computing, 2007 - Springer
The state of knowledge in how to specify sequential programs in object-oriented languages
such as Java and C# and the state of the art in automated verification tools for such …

Nested interpolants

M Heizmann, J Hoenicke, A Podelski - ACM Sigplan Notices, 2010 - dl.acm.org
In this paper, we explore the potential of the theory of nested words for partial correctness
proofs of recursive programs. Our conceptual contribution is a simple framework that allows …

Verification as learning geometric concepts

R Sharma, S Gupta, B Hariharan, A Aiken… - Static Analysis: 20th …, 2013 - Springer
We formalize the problem of program verification as a learning problem, showing that
invariants in program verification can be regarded as geometric concepts in machine …

Alloy*: A general-purpose higher-order relational constraint solver

A Milicevic, JP Near, E Kang, D Jackson - Formal Methods in System …, 2019 - Springer
The last decade has seen a dramatic growth in the use of constraint solvers as a
computational mechanism, not only for analysis of software, but also at runtime. Solvers are …

Horn-ICE learning for synthesizing invariants and contracts

P Ezudheen, D Neider, D D'Souza, P Garg… - Proceedings of the …, 2018 - dl.acm.org
We design learning algorithms for synthesizing invariants using Horn implication
counterexamples (Horn-ICE), extending the ICE-learning model. In particular, we describe a …

SolType: refinement types for arithmetic overflow in solidity

B Tan, B Mariano, SK Lahiri, I Dillig… - Proceedings of the ACM on …, 2022 - dl.acm.org
As smart contracts gain adoption in financial transactions, it becomes increasingly important
to ensure that they are free of bugs and security vulnerabilities. Of particular relevance in this …

A formally verified NAT

A Zaostrovnykh, S Pirelli, L Pedrosa… - Proceedings of the …, 2017 - dl.acm.org
We present a Network Address Translator (NAT) written in C and proven to be semantically
correct according to RFC 3022, as well as crash-free and memory-safe. There exists a lot of …