SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Using Crash Hoare logic for certifying the FSCQ file system

H Chen, D Ziegler, T Chajed, A Chlipala… - Proceedings of the 25th …, 2015 - dl.acm.org
FSCQ is the first file system with a machine-checkable proof (using the Coq proof assistant)
that its implementation meets its specification and whose specification includes crashes …

Scaling symbolic evaluation for automated verification of systems code with Serval

L Nelson, J Bornholt, R Gu, A Baumann… - Proceedings of the 27th …, 2019 - dl.acm.org
This paper presents Serval, a framework for develo** automated verifiers for systems
software. Serval provides an extensible infrastructure for creating verifiers by lifting …

{vTZ}: virtualizing {ARM}{TrustZone}

Z Hua, J Gu, Y **a, H Chen, B Zang… - 26th USENIX Security …, 2017 - usenix.org
ARM TrustZone, a security extension that provides a secure world, a trusted execution
environment (TEE), to run security-sensitive code, has been widely adopted in mobile …

A study of security isolation techniques

R Shu, P Wang, SA Gorski III, B Andow… - ACM Computing …, 2016 - dl.acm.org
Security isolation is a foundation of computing systems that enables resilience to different
forms of attacks. This article seeks to understand existing security isolation techniques by …

Simple and precise static analysis of untrusted linux kernel extensions

E Gershuni, N Amit, A Gurfinkel, N Narodytska… - Proceedings of the 40th …, 2019 - dl.acm.org
Extended Berkeley Packet Filter (eBPF) is a Linux subsystem that allows safely executing
untrusted user-defined extensions inside the kernel. It relies on static analysis to protect the …

Validating JIT compilers via compilation space exploration

C Li, Y Jiang, C Xu, Z Su - Proceedings of the 29th Symposium on …, 2023 - dl.acm.org
This paper introduces the novel concept of compilation space, which facilitates the thorough
validation of just-in-time (JIT) compilers in modern language virtual machines (LVMs). The …

Kernel extension verification is untenable

J Jia, R Sahu, A Oswald, D Williams, MV Le… - Proceedings of the 19th …, 2023 - dl.acm.org
The emergence of verified eBPF bytecode is ushering in a new era of safe kernel
extensions. In this paper, we argue that eBPF's verifier---the source of its safety guarantees …

Cross-checking semantic correctness: The case of finding file system bugs

C Min, S Kashyap, B Lee, C Song, T Kim - Proceedings of the 25th …, 2015 - dl.acm.org
Today, systems software is too complex to be bug-free. To find bugs in systems software,
developers often rely on code checkers, like Linux's Sparse. However, the capability of …

Verifying the verifier: ebpf range analysis verification

H Vishwanathan, M Shachnai, S Narayana… - … on Computer Aided …, 2023 - Springer
This paper proposes an automated method to check the correctness of range analysis used
in the Linux kernel's eBPF verifier. We provide the specification of soundness for range …