Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Keystone: An open framework for architecting trusted execution environments
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …
cloud servers and encompass a range of cost, power constraints, and security threat model …
Trustworthy ai
JM Wing - Communications of the ACM, 2021 - dl.acm.org
Trustworthy AI Page 1 64 COMMUNICATIONS OF THE ACM | OCTOBER 2021 | VOL. 64 | NO.
10 review articles DOI:10.1145/3448248 The pursuit of responsible AI raises the ante on both …
10 review articles DOI:10.1145/3448248 The pursuit of responsible AI raises the ante on both …
Leveraging Rust types for modular specification and verification
Rust's type system ensures memory safety: well-typed Rust programs are guaranteed to not
exhibit problems such as dangling pointers, data races, and unexpected side effects through …
exhibit problems such as dangling pointers, data races, and unexpected side effects through …
Aeneas: Rust verification by functional translation
We present Aeneas, a new verification toolchain for Rust programs based on a lightweight
functional translation. We leverage Rust's rich region-based type system to eliminate …
functional translation. We leverage Rust's rich region-based type system to eliminate …
Evercrypt: A fast, verified, cross-platform cryptographic provider
We present EverCrypt: a comprehensive collection of verified, high-performance
cryptographic functionalities available via a carefully designed API. The API provably …
cryptographic functionalities available via a carefully designed API. The API provably …
Retrofitting effect handlers onto OCaml
Effect handlers have been gathering momentum as a mechanism for modular programming
with user-defined effects. Effect handlers allow for non-local control flow mechanisms such …
with user-defined effects. Effect handlers allow for non-local control flow mechanisms such …
Integration verification across software and hardware for a simple embedded system
The interfaces between layers of a system are susceptible to bugs if developers of adjacent
layers proceed under subtly different assumptions. Formal verification of two layers against …
layers proceed under subtly different assumptions. Formal verification of two layers against …
[PDF][PDF] CCF: A framework for building confidential verifiable replicated services
M Russinovich, E Ashton… - … , WA, USA, Tech …, 2019 - raw.githubusercontent.com
We present CCF, a framework to build permissioned confidential blockchains. CCF provides
a simple programming model of a highly-available data store and a universally-verifiable log …
a simple programming model of a highly-available data store and a universally-verifiable log …
An interactive prover for protocol verification in the computational model
Given the central importance of designing secure protocols, providing solid mathematical
foundations and computer-assisted methods to attest for their correctness is becoming …
foundations and computer-assisted methods to attest for their correctness is becoming …
{EverParse}: Verified secure {Zero-Copy} parsers for authenticated message formats
We present EverParse, a framework for generating parsers and serializers from tag-length-
value binary message format descriptions. The resulting code is verified to be safe (no …
value binary message format descriptions. The resulting code is verified to be safe (no …