Design and verification of the arm confidential compute architecture

X Li, X Li, C Dall, R Gu, J Nieh, Y Sait… - 16th USENIX Symposium …, 2022 - usenix.org
The increasing use of sensitive private data in computing is matched by a growing concern
regarding data privacy. System software such as hypervisors and operating systems are …

Formal verification of a multiprocessor hypervisor on arm relaxed memory hardware

R Tao, J Yao, X Li, SW Li, J Nieh, R Gu - Proceedings of the ACM …, 2021 - dl.acm.org
Concurrent systems software is widely-used, complex, and error-prone, posing a significant
security risk. We introduce VRM, a new framework that makes it possible for the first time to …

Towards an integrated vehicle management system in DriveOS

S Sinha, R West - ACM Transactions on Embedded Computing Systems …, 2021 - dl.acm.org
Modern automotive systems feature dozens of electronic control units (ECUs) for chassis,
body and powertrain functions. These systems are costly and inflexible to upgrade, requiring …

Automated Verification of an In-Production DNS Authoritative Engine

N Zheng, M Liu, Y Xiang, L Song, D Li, F Han… - Proceedings of the 29th …, 2023 - dl.acm.org
This paper presents DNS-V, a verification framework for our in-production DNS authoritative
engine, which is the core of our DNS service. The key idea for automated verification in …

Spoq: Scaling {Machine-Checkable} Systems Verification in Coq

X Li, X Li, W Qiang, R Gu, J Nieh - 17th USENIX Symposium on …, 2023 - usenix.org
System software is often large and complex, resulting in many vulnerabilities that can
potentially be exploited to compromise the security of a system. Formal verification offers a …

Quantitative verification of scheduling heuristics

S Goel, B Mikek, J Aly, V Arun, A Saeed… - arXiv preprint arXiv …, 2023 - arxiv.org
Computer systems use many scheduling heuristics to allocate resources. Understanding
their performance properties is hard because it requires a representative workload and …

Layered and object-based game semantics

A Oliveira Vale, PA Melliès, Z Shao, J Koenig… - Proceedings of the …, 2022 - dl.acm.org
Large-scale software verification relies critically on the use of compositional languages,
semantic models, specifications, and verification techniques. Recent work on certified …

Formalising the prevention of microarchitectural timing channels by operating systems

R Sison, S Buckley, T Murray, G Klein… - … Symposium on Formal …, 2023 - Springer
Microarchitectural timing channels are a well-known mechanism for information leakage.
Time protection has recently been demonstrated as an operating-system mechanism able to …

Jumpstart: Fast critical service resumption for a partitioning hypervisor in embedded systems

A Golchin, R West - 2022 IEEE 28th Real-Time and Embedded …, 2022 - ieeexplore.ieee.org
Complex embedded systems are now supporting the co-existence of multiple OSes to
manage services once assigned to separate embedded microcontrollers. Automotive …

Compositional virtual timelines: verifying dynamic-priority partitions with algorithmic temporal isolation

M Liu, Z Shao, H Chen, MK Yoon, JE Kim - Proceedings of the ACM on …, 2022 - dl.acm.org
Real-time systems power safety-critical applications that require strong isolation among
each other. Such isolation needs to be enforced at two orthogonal levels. On the micro …