Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2016
Cardinalities and universal quantifiers for verifying parameterized systems
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 599–613https://doi.org/10.1145/2908080.2908129Parallel and distributed systems rely on intricate protocols to manage shared resources and synchronize, i.e., to manage how many processes are in a particular state. Effective verification of such systems requires universally quantification to reason ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6 - research-articleJune 2016
Automatically learning shape specifications
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 491–507https://doi.org/10.1145/2908080.2908125This paper presents a novel automated procedure for discovering expressive shape specifications for sophisticated functional data structures. Our approach extracts potential shape predicates based on the definition of constructors of arbitrary user-...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6 - research-articleJune 2016
SDNRacer: concurrency analysis for software-defined networks
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 402–415https://doi.org/10.1145/2908080.2908124Concurrency violations are an important source of bugs in Software-Defined Networks (SDN), often leading to policy or invariant violations. Unfortunately, concurrency violations are also notoriously difficult to avoid, detect and debug. This paper ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6 - research-articleJune 2016
Ivy: safety verification by interactive generalization
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 614–630https://doi.org/10.1145/2908080.2908118Despite several decades of research, the problem of formal verification of infinite-state systems has resisted effective automation. We describe a system --- Ivy --- for interactively verifying safety of infinite-state systems. Ivy's key principle is ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6 - research-articleJune 2016
A design and verification methodology for secure isolated regions
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 665–681https://doi.org/10.1145/2908080.2908113Hardware support for isolated execution (such as Intel SGX) enables development of applications that keep their code and data confidential even while running in a hostile or compromised host. However, automatically verifying that such applications ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6 - research-articleJune 2016
Verified peephole optimizations for CompCert
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 448–461https://doi.org/10.1145/2908080.2908109Transformations over assembly code are common in many compilers. These transformations are also some of the most bug-dense compiler components. Such bugs could be elim- inated by formally verifying the compiler, but state-of-the- art formally verified ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6 - research-articleJune 2016
Verifying bit-manipulations of floating-point
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 70–84https://doi.org/10.1145/2908080.2908107Reasoning about floating-point is difficult and becomes only more so if there is an interplay between floating-point and bit-level operations. Even though real-world floating-point libraries use implementations that have such mixed computations, no ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6 - research-articleJune 2016
Toward compositional verification of interruptible OS kernels and device drivers
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 431–447https://doi.org/10.1145/2908080.2908101An operating system (OS) kernel forms the lowest level of any system software stack. The correctness of the OS kernel is the basis for the correctness of the entire system. Recent efforts have demonstrated the feasibility of building formally verified ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6 - research-articleJune 2016
End-to-end verification of information-flow security for C and assembly programs
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 648–664https://doi.org/10.1145/2908080.2908100Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today's cybersecurity community. A promising step toward conquering this challenge is to formally verify that the end-to-end ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6 - research-articleJune 2016
Data-driven precondition inference with learned features
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 42–56https://doi.org/10.1145/2908080.2908099We extend the data-driven approach to inferring preconditions for code from a set of test executions. Prior work requires a fixed set of features, atomic predicates that define the search space of possible preconditions, to be specified in advance. In ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6 - research-articleJune 2016
Cartesian hoare logic for verifying k-safety properties
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 57–69https://doi.org/10.1145/2908080.2908092Unlike safety properties which require the absence of a “bad” program trace, k-safety properties stipulate the absence of a “bad” interaction between k traces. Examples of k-safety properties include transitivity, associativity, anti-symmetry, and ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6