Anvil: Verifying liveness of cluster management controllers
Modern clouds depend crucially on an extensible ecosystem of thousands of controllers,
each managing critical systems (eg, a ZooKeeper cluster). A controller continuously …
each managing critical systems (eg, a ZooKeeper cluster). A controller continuously …
Datacenter {RPCs} can be general and fast
It is commonly believed that datacenter networking software must sacrifice generality to
attain high performance. The popularity of specialized distributed systems designed …
attain high performance. The popularity of specialized distributed systems designed …
SoK: Computer-aided cryptography
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …
formal, machine-checkable approaches to the design, analysis, and implementation of …
Leveraging Rust types for modular specification and verification
Rust's type system ensures memory safety: well-typed Rust programs are guaranteed to not
exhibit problems such as dangling pointers, data races, and unexpected side effects through …
exhibit problems such as dangling pointers, data races, and unexpected side effects through …
{CertiKOS}: An extensible architecture for building certified concurrent {OS} kernels
Complete formal verification of a non-trivial concurrent OS kernel is widely considered a
grand challenge. We present a novel compositional approach for building certified …
grand challenge. We present a novel compositional approach for building certified …
Proof-of-learning: Definitions and practice
Training machine learning (ML) models typically involves expensive iterative optimization.
Once the model's final parameters are released, there is currently no mechanism for the …
Once the model's final parameters are released, there is currently no mechanism for the …
Komodo: Using verification to disentangle secure-enclave hardware from software
A Ferraiuolo, A Baumann, C Hawblitzel… - Proceedings of the 26th …, 2017 - dl.acm.org
Intel SGX promises powerful security: an arbitrary number of user-mode enclaves protected
against physical attacks and privileged software adversaries. However, to achieve this, Intel …
against physical attacks and privileged software adversaries. However, to achieve this, Intel …
Ivy: safety verification by interactive generalization
Despite several decades of research, the problem of formal verification of infinite-state
systems has resisted effective automation. We describe a system---Ivy---for interactively …
systems has resisted effective automation. We describe a system---Ivy---for interactively …
Interaction trees: representing recursive and impure programs in Coq
Interaction trees (ITrees) are a general-purpose data structure for representing the behaviors
of recursive programs that interact with their environments. A coinductive variant of “free …
of recursive programs that interact with their environments. A coinductive variant of “free …
P4v: Practical verification for programmable data planes
We present the design and implementation of p4v, a practical tool for verifying data planes
described using the P4 programming language. The design of p4v is based on classic …
described using the P4 programming language. The design of p4v is based on classic …