Security in hardware assisted virtualization for cloud computing—State of the art issues and challenges
B Asvija, R Eswari, MB Bijoy - Computer Networks, 2019 - Elsevier
The advantages of virtualization technology have resulted in its wide spread adoption in
cloud computing infrastructures. However it has also introduced a new set of security threats …
cloud computing infrastructures. However it has also introduced a new set of security threats …
RefinedC: automating the foundational verification of C code with refined ownership types
Given the central role that C continues to play in systems software, and the difficulty of
writing safe and correct C code, it remains a grand challenge to develop effective formal …
writing safe and correct C code, it remains a grand challenge to develop effective formal …
Verified low-level programming embedded in F
We present Low*, a language for low-level programming and verification, and its application
to high-assurance optimized cryptographic libraries. Low* is a shallow embedding of a …
to high-assurance optimized cryptographic libraries. Low* is a shallow embedding of a …
[PDF][PDF] The C standard formalized in Coq
RJ Krebbers - 2015 - repository.ubn.ru.nl
The C programming language was created by Thompson and Ritchie around 1970 as the
implementation language of the Unix operating system [Rit93]. The development of Unix …
implementation language of the Unix operating system [Rit93]. The development of Unix …
Generating verified LLVM from Isabelle/HOL
P Lammich - … Conference on Interactive Theorem Proving (ITP …, 2019 - drops.dagstuhl.de
We present a framework to generate verified LLVM programs from Isabelle/HOL. It is based
on a code generator that generates LLVM text from a simplified fragment of LLVM, shallowly …
on a code generator that generates LLVM text from a simplified fragment of LLVM, shallowly …
Cogent: uniqueness types and certifying compilation
This paper presents a framework aimed at significantly reducing the cost of proving
functional correctness for low-level operating systems components. The framework is …
functional correctness for low-level operating systems components. The framework is …
Verified characteristic formulae for CakeML
Characteristic Formulae (CF) offer a productive, principled approach to generating
verification conditions for higher-order imperative programs, but so far the soundness of CF …
verification conditions for higher-order imperative programs, but so far the soundness of CF …
A formal C memory model supporting integer-pointer casts
The ISO C standard does not specify the semantics of many valid programs that use non-
portable idioms such as integer-pointer casts. Recent efforts at formal definitions and verified …
portable idioms such as integer-pointer casts. Recent efforts at formal definitions and verified …
Refinement through restraint: Bringing down the cost of verification
We present a framework aimed at significantly reducing the cost of verifying certain classes
of systems software, such as file systems. Our framework allows for equational reasoning …
of systems software, such as file systems. Our framework allows for equational reasoning …
Verified hardware/software co-assurance: Enhancing safety and security for critical systems
DS Hardin - 2020 IEEE International Systems Conference …, 2020 - ieeexplore.ieee.org
Experienced developers of safety-critical and security-critical systems have long
emphasized the importance of applying the highest degree of scrutiny to a system's I/O …
emphasized the importance of applying the highest degree of scrutiny to a system's I/O …