Repairing sequential consistency in C/C++ 11

O Lahav, V Vafeiadis, J Kang, CK Hur… - ACM SIGPLAN Notices, 2017 - dl.acm.org
The C/C++ 11 memory model defines the semantics of concurrent memory accesses in
C/C++, and in particular supports racy" atomic" accesses at a range of different consistency …

Alloy: a language and tool for exploring software designs

D Jackson - Communications of the ACM, 2019 - dl.acm.org
Alloy: a language and tool for exploring software designs Page 1 66 COMMUNICATIONS OF
THE ACM | SEPTEMBER 2019 | VOL. 62 | NO. 9 contributed articles ALLOY IS A language and …

Simplifying ARM concurrency: multicopy-atomic axiomatic and operational models for ARMv8

C Pulte, S Flur, W Deacon, J French, S Sarkar… - Proceedings of the …, 2017 - dl.acm.org
ARM has a relaxed memory model, previously specified in informal prose for ARMv7 and
ARMv8. Over time, and partly due to work building formal semantics for ARM concurrency, it …

Axiomatic hardware-software contracts for security

N Mosier, H Lachnitt, H Nemati, C Trippel - Proceedings of the 49th …, 2022 - dl.acm.org
We propose leakage containment models (LCMs)---novel axiomatic security contracts which
support formally reasoning about the security guarantees of programs when they run on …

Bridging the gap between programming languages and hardware weak memory models

A Podkopaev, O Lahav, V Vafeiadis - Proceedings of the ACM on …, 2019 - dl.acm.org
We develop a new intermediate weak memory model, IMM, as a way of modularizing the
proofs of correctness of compilation from concurrent programming languages with weak …

Checkmate: Automated synthesis of hardware exploits and security litmus tests

C Trippel, D Lustig, M Martonosi - 2018 51st Annual IEEE/ACM …, 2018 - ieeexplore.ieee.org
Recent research has uncovered a broad class of security vulnerabilities in which
confidential data is leaked through programmer-observable microarchitectural state. In this …

MeltdownPrime and SpectrePrime: Automatically-synthesized attacks exploiting invalidation-based coherence protocols

C Trippel, D Lustig, M Martonosi - arxiv preprint arxiv:1802.03802, 2018 - arxiv.org
The recent Meltdown and Spectre attacks highlight the importance of automated verification
techniques for identifying hardware security vulnerabilities. We have developed a tool for …

A formal analysis of the NVIDIA PTX memory consistency model

D Lustig, S Sahasrabuddhe, O Giroux - Proceedings of the Twenty …, 2019 - dl.acm.org
This paper presents the first formal analysis of the official memory consistency model for the
NVIDIA PTX virtual ISA. Like other GPU memory models, the PTX memory model is weakly …

Weak persistency semantics from the ground up: Formalising the persistency semantics of ARMv8 and transactional models

A Raad, J Wickerson, V Vafeiadis - Proceedings of the ACM on …, 2019 - dl.acm.org
Emerging non-volatile memory (NVM) technologies promise the durability of disks with the
performance of volatile memory (RAM). To describe the persistency guarantees of NVM …

Synthesizing memory models from framework sketches and litmus tests

J Bornholt, E Torlak - ACM SIGPLAN Notices, 2017 - dl.acm.org
A memory consistency model specifies which writes to shared memory a given read may
see. Ambiguities or errors in these specifications can lead to bugs in both compilers and …