Design and verification of the arm confidential compute architecture

X Li, X Li, C Dall, R Gu, J Nieh, Y Sait… - 16th USENIX Symposium …, 2022 - usenix.org
The increasing use of sensitive private data in computing is matched by a growing concern
regarding data privacy. System software such as hypervisors and operating systems are …

Formal verification of a multiprocessor hypervisor on arm relaxed memory hardware

R Tao, J Yao, X Li, SW Li, J Nieh, R Gu - Proceedings of the ACM …, 2021 - dl.acm.org
Concurrent systems software is widely-used, complex, and error-prone, posing a significant
security risk. We introduce VRM, a new framework that makes it possible for the first time to …

Spoq: Scaling {Machine-Checkable} Systems Verification in Coq

X Li, X Li, W Qiang, R Gu, J Nieh - 17th USENIX Symposium on …, 2023 - usenix.org
System software is often large and complex, resulting in many vulnerabilities that can
potentially be exploited to compromise the security of a system. Formal verification offers a …

Towards an integrated vehicle management system in driveos

S Sinha, R West - ACM Transactions on Embedded Computing Systems …, 2021 - dl.acm.org
Modern automotive systems feature dozens of electronic control units (ECUs) for chassis,
body and powertrain functions. These systems are costly and inflexible to upgrade, requiring …

Automated verification of an in-production DNS authoritative engine

N Zheng, M Liu, Y **ang, L Song, D Li, F Han… - Proceedings of the 29th …, 2023 - dl.acm.org
This paper presents DNS-V, a verification framework for our in-production DNS authoritative
engine, which is the core of our DNS service. The key idea for automated verification in …

Layered and object-based game semantics

A Oliveira Vale, PA Melliès, Z Shao, J Koenig… - Proceedings of the …, 2022 - dl.acm.org
Large-scale software verification relies critically on the use of compositional languages,
semantic models, specifications, and verification techniques. Recent work on certified …

Formalising the prevention of microarchitectural timing channels by operating systems

R Sison, S Buckley, T Murray, G Klein… - … Symposium on Formal …, 2023 - Springer
Microarchitectural timing channels are a well-known mechanism for information leakage.
Time protection has recently been demonstrated as an operating-system mechanism able to …

A formal approach to design and security verification of operating systems for intelligent transportation systems based on object model

Z Qian, S Zhong, G Sun, X **ng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Operating system in intelligent transportation systems (ITSs) is a complex software system
whose correctness and security are not obvious. There are advances in formal description …

Compositional verification of interacting systems using event monads

B Zhan, Y Lv, S Wang, G Zhao, J Hao… - … on Interactive Theorem …, 2022 - drops.dagstuhl.de
Large software systems are usually divided into multiple components that interact with each
other. How to verify interacting components in a modular way is one of the major problems in …

Jumpstart: Fast critical service resumption for a partitioning hypervisor in embedded systems

A Golchin, R West - 2022 IEEE 28th Real-Time and Embedded …, 2022 - ieeexplore.ieee.org
Complex embedded systems are now supporting the co-existence of multiple OSes to
manage services once assigned to separate embedded microcontrollers. Automotive …