A verified messaging system
نویسندگان
چکیده
منابع مشابه
Formally Verified System Initialisation
The safety and security of software systems depends on how they are initially configured. Manually writing program code that establishes such an initial configuration is a tedious and error-prone engineering process. In this paper we present an automatic and formally verified initialiser for component-based systems built on the general-purpose microkernel seL4. The construction principles of th...
متن کاملA Verified Implementation of a Control System
In this paper, a case study consisting of a plant, and associated control laws, is presented. An abstract specification of a control system governing operation of the plant is given in Hoare’s Communicating Sequential Processes (CSP). The control system is known to respect the safety properties required of the plant. Via a series of calculated, verified refinements, an implementation is develop...
متن کاملModelPlex: Verified Runtime Validation of Verified Cyber-Physical System Models
Formal verification and validation play a crucial role in making cyber-physical systems (CPS) safe. Formal methods make strong guarantees about the system behavior if accurate models of the system can be obtained, including models of the controller and of the physical dynamics. In CPS, models are essential; but any model we could possibly build necessarily deviates from the real world. If the r...
متن کاملTowards a Fully Verified File System
Implementation defects in file systems can lead to disastrous data-loss. This situation has drawn the attention of researchers for a long time, yet file system bugs are still very common [4, 6, 8]. Even well established file systems like Ext2 and Ext3, which have not been extended with new features for years, occasionally get patched to fix implementation flaws[3]. Previous work on file system ...
متن کاملA Distributed Metadata - Private Messaging System
Private communication over the Internet continues to be a difficult problem. Even if messages are encrypted, it is hard to deliver them without revealing metadata about which pairs of users are communicating. Scalable systems such as Tor are susceptible to traffic analysis. In contrast, the largest-scale systems with metadata privacy require passing all messages through a single server, which p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the ACM on Programming Languages
سال: 2017
ISSN: 2475-1421
DOI: 10.1145/3133911