A secure and formally verified Linux KVM hypervisor
Commodity hypervisors are widely deployed to support virtual machines (VMs) on
multiprocessor hardware. Their growing complexity poses a security risk. To enable formal …
multiprocessor hardware. Their growing complexity poses a security risk. To enable formal …
Cloud computing security: foundations and research directions
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …
computation come with security and privacy concerns. This monograph explores the …
GenMC: A Model Checker for Weak Memory Models
M Kokologiannakis, V Vafeiadis - International Conference on Computer …, 2021 - Springer
GenMC is an LLVM-based state-of-the-art stateless model checker for concurrent C/C++
programs. Its modular infrastructure allows it to support complex memory models, such as …
programs. Its modular infrastructure allows it to support complex memory models, such as …
Formal methods in industry
Formal methods encompass a wide choice of techniques and tools for the specification,
development, analysis, and verification of software and hardware systems. Formal methods …
development, analysis, and verification of software and hardware systems. Formal methods …
Formal verification of a multiprocessor hypervisor on arm relaxed memory hardware
Concurrent systems software is widely-used, complex, and error-prone, posing a significant
security risk. We introduce VRM, a new framework that makes it possible for the first time to …
security risk. We introduce VRM, a new framework that makes it possible for the first time to …
[图书][B] Shared-memory synchronization
ML Scott, T Brown - 2013 - Springer
This monograph grows out of nearly 40 years of experience in synchronization and
concurrent data structures. Though written primarily from the perspective of systems …
concurrent data structures. Though written primarily from the perspective of systems …
Predictive monitoring against pattern regular languages
While current bug detection techniques for concurrent software focus on unearthing low-
level issues such as data races or deadlocks, they often fall short of discovering more …
level issues such as data races or deadlocks, they often fall short of discovering more …
Lasagne: a static binary translator for weak memory model architectures
The emergence of new architectures create a recurring challenge to ensure that existing
programs still work on them. Manually porting legacy code is often impractical. Static binary …
programs still work on them. Manually porting legacy code is often impractical. Static binary …
CAAT: Consistency as a Theory
T Haas, R Meyer, H Ponce de León - Proceedings of the ACM on …, 2022 - dl.acm.org
We propose a family of logical theories for capturing an abstract notion of consistency and
show how to build a generic and efficient theory solver that works for all members in the …
show how to build a generic and efficient theory solver that works for all members in the …
Unblocking Dynamic Partial Order Reduction
Existing dynamic partial order reduction (DPOR) algorithms scale poorly on concurrent data
structure benchmarks because they visit a huge number of blocked executions due to …
structure benchmarks because they visit a huge number of blocked executions due to …