A verified messaging system

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formally Verified System Initialisation

The safety and security of software systems depends on how they are initially configured. Manually writing program code that establishes such an initial configuration is a tedious and error-prone engineering process. In this paper we present an automatic and formally verified initialiser for component-based systems built on the general-purpose microkernel seL4. The construction principles of th...

متن کامل

A Verified Implementation of a Control System

In this paper, a case study consisting of a plant, and associated control laws, is presented. An abstract specification of a control system governing operation of the plant is given in Hoare’s Communicating Sequential Processes (CSP). The control system is known to respect the safety properties required of the plant. Via a series of calculated, verified refinements, an implementation is develop...

متن کامل

ModelPlex: Verified Runtime Validation of Verified Cyber-Physical System Models

Formal verification and validation play a crucial role in making cyber-physical systems (CPS) safe. Formal methods make strong guarantees about the system behavior if accurate models of the system can be obtained, including models of the controller and of the physical dynamics. In CPS, models are essential; but any model we could possibly build necessarily deviates from the real world. If the r...

متن کامل

Towards a Fully Verified File System

Implementation defects in file systems can lead to disastrous data-loss. This situation has drawn the attention of researchers for a long time, yet file system bugs are still very common [4, 6, 8]. Even well established file systems like Ext2 and Ext3, which have not been extended with new features for years, occasionally get patched to fix implementation flaws[3]. Previous work on file system ...

متن کامل

A Distributed Metadata - Private Messaging System

Private communication over the Internet continues to be a difficult problem. Even if messages are encrypted, it is hard to deliver them without revealing metadata about which pairs of users are communicating. Scalable systems such as Tor are susceptible to traffic analysis. In contrast, the largest-scale systems with metadata privacy require passing all messages through a single server, which p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the ACM on Programming Languages

سال: 2017

ISSN: 2475-1421

DOI: 10.1145/3133911