Security in hardware assisted virtualization for cloud computing—State of the art issues and challenges

B Asvija, R Eswari, MB Bijoy - Computer Networks, 2019 - Elsevier
The advantages of virtualization technology have resulted in its wide spread adoption in
cloud computing infrastructures. However it has also introduced a new set of security threats …

RefinedC: automating the foundational verification of C code with refined ownership types

M Sammler, R Lepigre, R Krebbers… - Proceedings of the …, 2021 - dl.acm.org
Given the central role that C continues to play in systems software, and the difficulty of
writing safe and correct C code, it remains a grand challenge to develop effective formal …

Verified low-level programming embedded in F

J Protzenko, JK Zinzindohoué, A Rastogi… - Proceedings of the …, 2017 - dl.acm.org
We present Low*, a language for low-level programming and verification, and its application
to high-assurance optimized cryptographic libraries. Low* is a shallow embedding of a …

[PDF][PDF] The C standard formalized in Coq

RJ Krebbers - 2015 - repository.ubn.ru.nl
The C programming language was created by Thompson and Ritchie around 1970 as the
implementation language of the Unix operating system [Rit93]. The development of Unix …

Generating verified LLVM from Isabelle/HOL

P Lammich - … Conference on Interactive Theorem Proving (ITP …, 2019 - drops.dagstuhl.de
We present a framework to generate verified LLVM programs from Isabelle/HOL. It is based
on a code generator that generates LLVM text from a simplified fragment of LLVM, shallowly …

Cogent: uniqueness types and certifying compilation

L O'CONNOR, Z Chen, C Rizkallah… - Journal of Functional …, 2021 - cambridge.org
This paper presents a framework aimed at significantly reducing the cost of proving
functional correctness for low-level operating systems components. The framework is …

Verified characteristic formulae for CakeML

A Guéneau, MO Myreen, R Kumar… - … ESOP 2017, Held as Part of …, 2017 - Springer
Characteristic Formulae (CF) offer a productive, principled approach to generating
verification conditions for higher-order imperative programs, but so far the soundness of CF …

A formal C memory model supporting integer-pointer casts

J Kang, CK Hur, W Mansky, D Garbuzov… - ACM SIGPLAN …, 2015 - dl.acm.org
The ISO C standard does not specify the semantics of many valid programs that use non-
portable idioms such as integer-pointer casts. Recent efforts at formal definitions and verified …

Refinement through restraint: Bringing down the cost of verification

L O'Connor, Z Chen, C Rizkallah, S Amani, J Lim… - ACM SIGPLAN …, 2016 - dl.acm.org
We present a framework aimed at significantly reducing the cost of verifying certain classes
of systems software, such as file systems. Our framework allows for equational reasoning …

Verified hardware/software co-assurance: Enhancing safety and security for critical systems

DS Hardin - 2020 IEEE International Systems Conference …, 2020 - ieeexplore.ieee.org
Experienced developers of safety-critical and security-critical systems have long
emphasized the importance of applying the highest degree of scrutiny to a system's I/O …