Anvil: Verifying liveness of cluster management controllers

X Sun, W Ma, JT Gu, Z Ma, T Chajed, J Howell… - … USENIX Symposium on …, 2024 - usenix.org
Modern clouds depend crucially on an extensible ecosystem of thousands of controllers,
each managing critical systems (eg, a ZooKeeper cluster). A controller continuously …

Datacenter {RPCs} can be general and fast

A Kalia, M Kaminsky, D Andersen - 16th USENIX Symposium on …, 2019 - usenix.org
It is commonly believed that datacenter networking software must sacrifice generality to
attain high performance. The popularity of specialized distributed systems designed …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Leveraging Rust types for modular specification and verification

V Astrauskas, P Müller, F Poli… - Proceedings of the ACM on …, 2019 - dl.acm.org
Rust's type system ensures memory safety: well-typed Rust programs are guaranteed to not
exhibit problems such as dangling pointers, data races, and unexpected side effects through …

{CertiKOS}: An extensible architecture for building certified concurrent {OS} kernels

R Gu, Z Shao, H Chen, XN Wu, J Kim… - … USENIX Symposium on …, 2016 - usenix.org
Complete formal verification of a non-trivial concurrent OS kernel is widely considered a
grand challenge. We present a novel compositional approach for building certified …

Proof-of-learning: Definitions and practice

H Jia, M Yaghini, CA Choquette-Choo… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Training machine learning (ML) models typically involves expensive iterative optimization.
Once the model's final parameters are released, there is currently no mechanism for the …

Komodo: Using verification to disentangle secure-enclave hardware from software

A Ferraiuolo, A Baumann, C Hawblitzel… - Proceedings of the 26th …, 2017 - dl.acm.org
Intel SGX promises powerful security: an arbitrary number of user-mode enclaves protected
against physical attacks and privileged software adversaries. However, to achieve this, Intel …

Ivy: safety verification by interactive generalization

O Padon, KL McMillan, A Panda, M Sagiv… - Proceedings of the 37th …, 2016 - dl.acm.org
Despite several decades of research, the problem of formal verification of infinite-state
systems has resisted effective automation. We describe a system---Ivy---for interactively …

Interaction trees: representing recursive and impure programs in Coq

L Xia, Y Zakowski, P He, CK Hur, G Malecha… - Proceedings of the …, 2019 - dl.acm.org
Interaction trees (ITrees) are a general-purpose data structure for representing the behaviors
of recursive programs that interact with their environments. A coinductive variant of “free …

P4v: Practical verification for programmable data planes

J Liu, W Hallahan, C Schlesinger, M Sharif… - Proceedings of the …, 2018 - dl.acm.org
We present the design and implementation of p4v, a practical tool for verifying data planes
described using the P4 programming language. The design of p4v is based on classic …