Virtualizing mixed-criticality systems: A survey on industrial trends and issues

M Cinque, D Cotroneo, L De Simone… - Future Generation …, 2022 - Elsevier
Virtualization is gaining attraction in the industry as it promises a flexible way to integrate,
manage, and re-use heterogeneous software components with mixed-criticality levels, on a …

Perceptions on the state of the art in verification and validation in cyber-physical systems

X Zheng, C Julien, M Kim, S Khurshid - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
It is widely held that debugging cyber-physical systems (CPS) is challenging; many strongly
held beliefs exist regarding how CPS are currently debugged and tested and the suitability …

A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

Q Ge, Y Yarom, D Cock, G Heiser - Journal of Cryptographic Engineering, 2018 - Springer
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

IronFleet: proving practical distributed systems correct

C Hawblitzel, J Howell, M Kapritsos, JR Lorch… - Proceedings of the 25th …, 2015 - dl.acm.org
Distributed systems are notorious for harboring subtle bugs. Verification can, in principle,
eliminate these bugs a priori, but verification has historically been difficult to apply at full …

{CertiKOS}: An extensible architecture for building certified concurrent {OS} kernels

R Gu, Z Shao, H Chen, XN Wu, J Kim… - … USENIX Symposium on …, 2016 - usenix.org
Complete formal verification of a non-trivial concurrent OS kernel is widely considered a
grand challenge. We present a novel compositional approach for building certified …

Komodo: Using verification to disentangle secure-enclave hardware from software

A Ferraiuolo, A Baumann, C Hawblitzel… - Proceedings of the 26th …, 2017 - dl.acm.org
Intel SGX promises powerful security: an arbitrary number of user-mode enclaves protected
against physical attacks and privileged software adversaries. However, to achieve this, Intel …

[图书][B] The age of Em: Work, love, and life when robots rule the earth

R Hanson - 2016 - books.google.com
Robots may one day rule the world, but what is a robot-ruled Earth like? Many think the first
truly smart robots will be brain emulations or ems. Scan a human brain, then run a model …

ISA Semantics for ARMv8-a, RISC-v, and CHERI-MIPS

A Armstrong, T Bauereiss, B Campbell, A Reid… - Proceedings of the …, 2019 - dl.acm.org
Architecture specifications notionally define the fundamental interface between hardware
and software: the envelope of allowed behaviour for processor implementations, and the …

Ironclad apps:{End-to-End} security via automated {Full-System} verification

C Hawblitzel, J Howell, JR Lorch, A Narayan… - … USENIX Symposium on …, 2014 - usenix.org
An Ironclad App lets a user securely transmit her data to a remote machine with the
guarantee that every instruction executed on that machine adheres to a formal abstract …