TacTok: Semantics-aware proof synthesis

E First, Y Brun, A Guha - Proceedings of the ACM on Programming …, 2020 - dl.acm.org
Formally verifying software correctness is a highly manual process. However, because
verification proof scripts often share structure, it is possible to learn from existing proof scripts …

eWASM: Practical Software Fault Isolation for Reliable Embedded Devices

G Peach, R Pan, Z Wu, G Parmer… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
As we connect more microcontrollers to the Internet and employ them to control the physical
world around us, their reliability and security are increasingly important. Many …

Scalable validation of binary lifters

S Dasgupta, S Dinesh, D Venkatesh, VS Adve… - Proceedings of the 41st …, 2020 - dl.acm.org
Validating the correctness of binary lifters is pivotal to gain trust in binary analysis, especially
when used in scenarios where correctness is important. Existing approaches focus on …

Validation of abstract side-channel models for computer architectures

H Nemati, P Buiras, A Lindner, R Guanciale… - … Aided Verification: 32nd …, 2020 - Springer
Observational models make tractable the analysis of information flow properties by providing
an abstraction of side channels. We introduce a methodology and a tool, Scam-V, to validate …

CompCertELF: verified separate compilation of C programs into ELF object files

Y Wang, X Xu, P Wilke, Z Shao - Proceedings of the ACM on …, 2020 - dl.acm.org
We present CompCertELF, the first extension to CompCert that supports verified compilation
from C programs all the way to a standard binary file format, ie, the ELF object format …

A verified packrat parser interpreter for parsing expression grammars

C Blaudeau, N Shankar - Proceedings of the 9th ACM SIGPLAN …, 2020 - dl.acm.org
Parsing expression grammars (PEGs) offer a natural opportunity for building verified parser
interpreters based on higher-order parsing combinators. PEGs are expressive …

[PDF][PDF] Automatically partition software into least privilege components using dynamic data dependency analysis.(2013)

Y Wu, J Sun, Y Liu, JS Dong - Proceedings of the 2013 28th IEEE/ACM … - core.ac.uk
The principle of least privilege requires that software components should be granted only
necessary privileges, so that compromising one component does not lead to compromising …

[图书][B] Computer Aided Verification: 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21–24, 2020, Proceedings, Part II

SK Lahiri, C Wang - 2020 - library.oapen.org
The open access two-volume set LNCS 12224 and 12225 constitutes the refereed
proceedings of the 32st International Conference on Computer Aided Verification, CAV …

überSpark: Practical, Provable, End-to-End Guarantees on Commodity Heterogenous Interconnected Computing Platforms

A Vasudevan, P Maniatis, R Martins - ACM SIGOPS Operating Systems …, 2020 - dl.acm.org
Today's computing ecosystem, comprising commodity heterogeneous interconnected
computing (CHIC) platforms, is increasingly being employed for critical applications …

Hardware-Software Co-Design for Low-Overhead System Security

D Townley - 2020 - search.proquest.com
Security threats against computing systems continue to proliferate, motivating new
approaches for detection and mitigation. Though promising, many recently proposed …