Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Repairing sequential consistency in C/C++ 11
The C/C++ 11 memory model defines the semantics of concurrent memory accesses in
C/C++, and in particular supports racy" atomic" accesses at a range of different consistency …
C/C++, and in particular supports racy" atomic" accesses at a range of different consistency …
Alloy: a language and tool for exploring software designs
D Jackson - Communications of the ACM, 2019 - dl.acm.org
Alloy: a language and tool for exploring software designs Page 1 66 COMMUNICATIONS OF
THE ACM | SEPTEMBER 2019 | VOL. 62 | NO. 9 contributed articles ALLOY IS A language and …
THE ACM | SEPTEMBER 2019 | VOL. 62 | NO. 9 contributed articles ALLOY IS A language and …
Simplifying ARM concurrency: multicopy-atomic axiomatic and operational models for ARMv8
ARM has a relaxed memory model, previously specified in informal prose for ARMv7 and
ARMv8. Over time, and partly due to work building formal semantics for ARM concurrency, it …
ARMv8. Over time, and partly due to work building formal semantics for ARM concurrency, it …
Axiomatic hardware-software contracts for security
We propose leakage containment models (LCMs)---novel axiomatic security contracts which
support formally reasoning about the security guarantees of programs when they run on …
support formally reasoning about the security guarantees of programs when they run on …
Bridging the gap between programming languages and hardware weak memory models
We develop a new intermediate weak memory model, IMM, as a way of modularizing the
proofs of correctness of compilation from concurrent programming languages with weak …
proofs of correctness of compilation from concurrent programming languages with weak …
Checkmate: Automated synthesis of hardware exploits and security litmus tests
Recent research has uncovered a broad class of security vulnerabilities in which
confidential data is leaked through programmer-observable microarchitectural state. In this …
confidential data is leaked through programmer-observable microarchitectural state. In this …
MeltdownPrime and SpectrePrime: Automatically-synthesized attacks exploiting invalidation-based coherence protocols
The recent Meltdown and Spectre attacks highlight the importance of automated verification
techniques for identifying hardware security vulnerabilities. We have developed a tool for …
techniques for identifying hardware security vulnerabilities. We have developed a tool for …
A formal analysis of the NVIDIA PTX memory consistency model
D Lustig, S Sahasrabuddhe, O Giroux - Proceedings of the Twenty …, 2019 - dl.acm.org
This paper presents the first formal analysis of the official memory consistency model for the
NVIDIA PTX virtual ISA. Like other GPU memory models, the PTX memory model is weakly …
NVIDIA PTX virtual ISA. Like other GPU memory models, the PTX memory model is weakly …
Weak persistency semantics from the ground up: Formalising the persistency semantics of ARMv8 and transactional models
Emerging non-volatile memory (NVM) technologies promise the durability of disks with the
performance of volatile memory (RAM). To describe the persistency guarantees of NVM …
performance of volatile memory (RAM). To describe the persistency guarantees of NVM …
Synthesizing memory models from framework sketches and litmus tests
A memory consistency model specifies which writes to shared memory a given read may
see. Ambiguities or errors in these specifications can lead to bugs in both compilers and …
see. Ambiguities or errors in these specifications can lead to bugs in both compilers and …