SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

IronFleet: proving practical distributed systems correct

C Hawblitzel, J Howell, M Kapritsos, JR Lorch… - Proceedings of the 25th …, 2015 - dl.acm.org
Distributed systems are notorious for harboring subtle bugs. Verification can, in principle,
eliminate these bugs a priori, but verification has historically been difficult to apply at full …

The Linux scheduler: a decade of wasted cores

JP Lozi, B Lepers, J Funston, F Gaud… - Proceedings of the …, 2016 - dl.acm.org
As a central part of resource management, the OS thread scheduler must maintain the
following, simple, invariant: make sure that ready threads are scheduled on available cores …

Scaling symbolic evaluation for automated verification of systems code with Serval

L Nelson, J Bornholt, R Gu, A Baumann… - Proceedings of the 27th …, 2019 - dl.acm.org
This paper presents Serval, a framework for developing automated verifiers for systems
software. Serval provides an extensible infrastructure for creating verifiers by lifting …

Hyperkernel: Push-button verification of an OS kernel

L Nelson, H Sigurbjarnarson, K Zhang… - Proceedings of the 26th …, 2017 - dl.acm.org
This paper describes an approach to designing, implementing, and formally verifying the
functional correctness of an OS kernel, named Hyperkernel, with a high degree of proof …

{VeriSMo}: A verified security module for confidential {VMs}

Z Zhou, W Chen, S Gong, C Hawblitzel… - 18th USENIX Symposium …, 2024 - usenix.org
Hardware vendors have introduced confidential VM architectures (eg, AMD SEV-SNP, Intel
TDX and Arm CCA) in recent years. They eliminate the trust in the hypervisor and lead to the …

Honeycomb: Secure and Efficient {GPU} Executions via Static Validation

H Mai, J Zhao, H Zheng, Y Zhao, Z Liu, M Gao… - … USENIX Symposium on …, 2023 - usenix.org
Graphics Processing Units (GPUs) unlock emerging use cases like large language models
and autonomous driving. They process a large amount of sensitive data, where security is of …

A survey of practical formal methods for security

T Kulik, B Dongol, PG Larsen, HD Macedo… - Formal aspects of …, 2022 - dl.acm.org
In today's world, critical infrastructure is often controlled by computing systems. This
introduces new risks for cyber attacks, which can compromise the security and disrupt the …

{MiniBox}: A {Two-Way} Sandbox for x86 Native Code

Y Li, J McCune, J Newsome, A Perrig, B Baker… - 2014 USENIX annual …, 2014 - usenix.org
This paper presents MiniBox, the first two-way sandbox for x86 native code, that not only
protects a benign OS from a misbehaving application, but also protects an application from a …

Developing verified programs with Dafny

KRM Leino - Proceedings of the 2012 ACM conference on High …, 2012 - dl.acm.org
Reasoning about programs is a fundamental skill that every software engineer needs. This
tutorial provides participants an opportunity to get hands-on experience with Dafny, a tool …