Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

Leveraging Rust types for modular specification and verification

V Astrauskas, P Müller, F Poli… - Proceedings of the ACM on …, 2019 - dl.acm.org
Rust's type system ensures memory safety: well-typed Rust programs are guaranteed to not
exhibit problems such as dangling pointers, data races, and unexpected side effects through …

Trustworthy ai

JM Wing - Communications of the ACM, 2021 - dl.acm.org
Trustworthy AI Page 1 64 COMMUNICATIONS OF THE ACM | OCTOBER 2021 | VOL. 64 | NO.
10 review articles DOI:10.1145/3448248 The pursuit of responsible AI raises the ante on both …

Evercrypt: A fast, verified, cross-platform cryptographic provider

J Protzenko, B Parno, A Fromherz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We present EverCrypt: a comprehensive collection of verified, high-performance
cryptographic functionalities available via a carefully designed API. The API provably …

Aeneas: Rust verification by functional translation

S Ho, J Protzenko - Proceedings of the ACM on Programming …, 2022 - dl.acm.org
We present Aeneas, a new verification toolchain for Rust programs based on a lightweight
functional translation. We leverage Rust's rich region-based type system to eliminate …

Retrofitting effect handlers onto OCaml

KC Sivaramakrishnan, S Dolan, L White… - Proceedings of the …, 2021 - dl.acm.org
Effect handlers have been gathering momentum as a mechanism for modular programming
with user-defined effects. Effect handlers allow for non-local control flow mechanisms such …

Integration verification across software and hardware for a simple embedded system

A Erbsen, S Gruetter, J Choi, C Wood… - Proceedings of the 42nd …, 2021 - dl.acm.org
The interfaces between layers of a system are susceptible to bugs if developers of adjacent
layers proceed under subtly different assumptions. Formal verification of two layers against …

[PDF][PDF] CCF: A framework for building confidential verifiable replicated services

M Russinovich, E Ashton, C Avanessians… - … , Redmond, WA, USA …, 2019 - alex.shamis.au
We present CCF, a framework to build permissioned confidential blockchains. CCF provides
a simple programming model of a highly-available data store and a universally-verifiable log …

An interactive prover for protocol verification in the computational model

D Baelde, S Delaune, C Jacomme… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Given the central importance of designing secure protocols, providing solid mathematical
foundations and computer-assisted methods to attest for their correctness is becoming …

{EverParse}: Verified secure {Zero-Copy} parsers for authenticated message formats

T Ramananandro, A Delignat-Lavaud… - 28th USENIX Security …, 2019 - usenix.org
We present EverParse, a framework for generating parsers and serializers from tag-length-
value binary message format descriptions. The resulting code is verified to be safe (no …