Verdi: a framework for implementing and formally verifying distributed systems

JR Wilcox, D Woos, P Panchekha, Z Tatlock… - Proceedings of the 36th …, 2015 - dl.acm.org
Distributed systems are difficult to implement correctly because they must handle both
concurrency and failures: machines may crash at arbitrary points and networks may reorder …

The Click modular router

E Kohler, R Morris, B Chen, J Jannotti… - ACM Transactions on …, 2000 - dl.acm.org
Clicks is a new software architecture for building flexible and configurable routers. A Click
router is assembled from packet processing modules called elements. Individual elements …

Proactive computing

D Tennenhouse - Communications of the ACM, 2000 - dl.acm.org
Although I lack Licklider's clarity as to what the next 40 years of computation might bring, I
am convinced that the first steps toward a new agenda must include: a fundamental …

Defeating memory corruption attacks via pointer taintedness detection

S Chen, J Xu, N Nakka, Z Kalbarczyk… - … Systems and Networks …, 2005 - ieeexplore.ieee.org
Most malicious attacks compromise system security through memory corruption exploits.
Recently proposed techniques attempt to defeat these attacks by protecting program control …

[图书][B] Reliable distributed systems: technologies, web services, and applications

K Birman - 2006 - books.google.com
An understanding of the techniques used to make distributed computing systems and
networks reliable, fault-tolerant and secure will be crucial to those who design and deploy …

Think: A software framework for component-based operating system kernels

JP Fassino, JB Stefani, J Lawall, G Muller - 2002 USENIX Annual …, 2002 - usenix.org
Building a flexible kernel from components is a promising solution for supporting various
embedded systems. The use of components encourages code re-use and reduces …

Methods and limitations of security policy reconciliation

P McDaniel, A Prakash - ACM Transactions on Information and System …, 2006 - dl.acm.org
A security policy specifies session participant requirements. However, existing frameworks
provide limited facilities for the automated reconciliation of participant policies. This paper …

Automated deduction for verification

N Shankar - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
Automated deduction uses computation to perform symbolic logical reasoning. It has been a
core technology for program verification from the very beginning. Satisfiability solvers for …

[HTML][HTML] Innovations in computational type theory using Nuprl

SF Allen, M Bickford, RL Constable, R Eaton… - Journal of Applied …, 2006 - Elsevier
For twenty years the Nuprl (“new pearl”) system has been used to develop software systems
and formal theories of computational mathematics. It has also been used to explore and …

{CpU}: Component Composition for Systems Software

A Reid, M Flatt, L Stoller, E Eide - Fourth Symposium on Operating …, 2000 - usenix.org
Knit is a new component definition and linking language for systems code. Knit helps make
C code more understandable and reusable by third parties, helps eliminate much of the …