Synthesizing Certified Code

نویسندگان

  • Michael W. Whalen
  • Johann Schumann
  • Bernd Fischer
چکیده

®b ̄±° ̈213l2μ ́·¶1 ̧»oo3Ò1⁄4W¶1 ̧3⁄4 ̄|¿h ̧3⁄4À#1⁄4 Â3⁄4 ̧3⁄4Ã|ÄA¶ŠÅb2l ̧3⁄4Ã|ÄA¶)1⁄4–Æ Æ ̈ ́1 ̄Ç1⁄41⁄23‘Äk¶1 ̄ ° 2lÈ ̄–¿ Àɶ· ́i1⁄4W¶12 À· ̄1⁄2ÊE¶ŽÅ'1⁄41⁄2 ́12kËAÌo1⁄4–Â3⁄4 ̧»¶ŠÍ ̄|¿€1⁄4kÊ! ̄1⁄2 ́1È;1⁄4–Â5Â3⁄42lÎ|2l£ÏnÐç¶1À Ñ 1⁄4–À· ̧3⁄43` ̧Á° ̈2Ò1⁄4f ̧ÁÀ1¶1 ̄f ́12μæ ËAÌ ̧3⁄4 ́12n3l ̄±° 2nÆ ́1 ̄±° ̈Ì 3l2μ ́1Àh¶1 ̄€Æ ́1 ̄Wα ̧Á° 2?Ê! ̄1⁄2 ́1È;1⁄4–Â-ÓoÔ·ÕÒՊ֑×n¶1Ä 1⁄41⁄2¶h¶1Ä 2l ̧» ́ 3μ ̄±° 21À11⁄41⁄2¶1 ̧3⁄4ÀÉoo2μÀ+3l2μ ́·¶i1⁄41⁄2 ̧3⁄4¿?Ë±Ì 1⁄4–Â3⁄4 ̧»¶ŠÍ`Æ ́1 ̄–ÆØ2μ ́·¶1 ̧3⁄42lÀlÏ'Ù5Ä 2lÀ·21Æ ́1 ̄A ̄–ÊEÀ+À·2μ ́1Î|2 1⁄41⁄2ÀfÚiÛ‘Ô‘Ü£Ý ÞbÚ1ߖ܎ۑ×hÅ%Ä ̧Á3iĘ3Ò1⁄4–¿€ÑØ233‘Ä 2l3‘à|2Ò° ̧Á¿ ° 2lÆØ2μ¿o° 2μ¿±¶1»ÍAÏmá ̈ ̧3⁄4¿ 3μ2 3μ ̄±° 2f3l2μ ́·¶1 ̧»o 3Ò1⁄41⁄2¶1 ̧3⁄4 ̄|¿„Ì À·2lÀ ¶1Ä 2hÀ11⁄41⁄2È 2fÌ ¿ ° 2μ ́1Â»Í ̈ ̧3⁄4¿ Ãn¶12μ3‘Ä ¿ ̄|Â3⁄4 ̄–ÖÍq1⁄4–À Æ ̈ ́1 ̄|Ã1⁄2 ́i1⁄4–ÈdÎÇ2‘ ́1 ̧3⁄4o 3Ò1⁄41⁄2¶1 ̧3⁄4 ̄–¿¦â5 ̧»¶;1⁄41⁄2Â3⁄4À· ̄n ́12ÒËAÌ ̧» ́12lÀ È;1⁄4–¿A͘° 2‘¶i1⁄4– ̧3⁄4Â3⁄42Ò°^1⁄41⁄2¿ ¿ ̄–æ ¶i1⁄4W¶1 ̧3⁄4 ̄|¿ À`ã£2|Ï Ã Ï3⁄4â~Â3⁄4 ̄A ̄|Æ ̧3⁄4¿±Î|1⁄4W ́1 ̧.1⁄41⁄2¿A¶1Àiä-¶1 ̄fÈ;1⁄41⁄2àÇ2 ¶1Ä 2 Æ ̈ ́1 ̄A ̄–Ê!À\ÆØ ̄|À·À· ̧3⁄4Ñ Â3⁄42|Ï å) ̄ÒÅ52lÎÇ2‘ ́ÒâoÈ;1⁄4–¿±Ì 1⁄4–Â3⁄4»Íh1⁄4–° ° ̧3⁄4¿ à ¶1Ä 2lÀ·2‚1⁄41⁄2¿ ¿ ̄1⁄2¶i1⁄41⁄2¶1 ̧3⁄4 ̄|¿ À#¶1 ̄ ¶1Ä 2-3l ̄±° 21 ̧3⁄4À ¶1 ̧3⁄4È 2μæç3l ̄–¿ À·Ì È ̧Á¿ à 1⁄41⁄2¿o°k2‘ ́· ́1 ̄– ́·æçÆ ́1 ̄–¿ 2|Ï è 2‚1⁄4|° °± ́12lÀ·À)¶1Ä ̧3⁄4À+Æ ́1 ̄–Ñ Â3⁄42lÈ ÑAÍh3l ̄–È Ñ ̧Á¿ ̧3⁄4¿ à 3l ̄±° ̈2\3l2‘ ́·¶1 ̧3⁄4o 3Ò1⁄41⁄2¶1 ̧3⁄4 ̄–¿ Å% ̧»¶1Ä 1⁄4–Ì ¶1 ̄–È;1⁄41⁄2¶1 ̧3⁄435Æ ̈ ́1 ̄|Ö ́i1⁄41⁄2È ÀÉÍ ̈¿±¶1Ä 2lÀ· ̧3⁄4ÀlÏ è 2†Æ ́1 ̄–ÆØ ̄|À·2%1⁄4–¿ 1⁄4–Æ Æ ́1 ̄Ç1⁄41⁄23‘Ä ¶1 ̄kÃ|2l¿ 2μ ́i1⁄41⁄2¶12 À· ̧3⁄4È Ì Â»¶i1⁄4–¿ 2μ ̄|Ì À·Â»ÍAâ¦ÊE ́1 ̄|È 1⁄4`Ä ̧3⁄4Ã|Ä ̈æŽÂ3⁄42lÎ|2lÂKÀ·ÆØ2l3l ̧»oo3Ò1⁄4W¶1 ̧3⁄4 ̄|¿¦â 3μ ̄±° 231⁄4–¿ °qß|ë!ëb1⁄4–¿ ¿ ̄–¶i1⁄4W¶1 ̧3⁄4 ̄|¿ À́12ÒËAÌ ̧3⁄4 ́12l°n¶1 ̄h3l2μ ́·¶1 ̧»Ê.Ín¶1Ä 2 Ã|2l¿ 2μ ́i1⁄41⁄2¶12l° 3μ ̄±° 2|ςå+2‘ ́12|âFÅ52 ° ̈2lÀ·3μ ́1 ̧3⁄4ÑØ2 1⁄433l2μ ́·¶1 ̧»oo3Ò1⁄4W¶1 ̧3⁄4 ̄|¿ 2‘ì ̈¶12μ¿ À· ̧3⁄4 ̄|¿ê ̄–Ê'í+îØïØð ñ#òAóšô ̈õ–â±1⁄4rÀÉÍ ̈¿A¶1Ä 2μÀ· ̧ÁÀK¶1 ̄A ̄| Å%Ä ̧3⁄43‘Ä31⁄41⁄2Ì ¶1 ̄|È;1⁄4W¶1 ̧3⁄43Ò1⁄4–Â3⁄4Â»Í Ã–2l¿ 2μ ́i1⁄4W¶12lÀ53l ̄–È æ Æ Â3⁄42μìZ° 1⁄4W¶i1⁄4˜1⁄4–¿o1⁄41⁄2Â»Í À· ̧3⁄4ÀhÆ ̈ ́1 ̄|Ã1⁄2 ́i1⁄4–È ÀkÊ. ́1 ̄|ȟ3μ ̄|È Æo1⁄41⁄23μ¶`À·ÆØ2l3l ̧»oo3Ò1⁄4W¶1 ̧3⁄4 ̄|¿ ÀlÏ í)îFïoð¦ñ#ò±ó¦ô ̈õ~3μ ̄|¿A¶i1⁄4– ̧3⁄4¿ À¦À·Ì ÷ 3μ ̧Á2μ¿±¶öÄ ̧3⁄4Ã|Ä ̈æŽÂ3⁄42lÎ|2lÂA° ̄–È;1⁄4– ̧3⁄4¿-౿ ̄ÒÅ%Â3⁄42Ò° Ö2 ¶1 ̄êÃ|2μ¿ 2μ ́i1⁄4W¶12h° 2‘¶i1⁄4– ̧3⁄4Â3⁄42Ò°^1⁄41⁄2¿ ¿ ̄–¶i1⁄41⁄2¶1 ̧3⁄4 ̄–¿ ÀlπÙ5Ä ̧3⁄4À 1⁄41⁄2Â3⁄4ÂÁ ̄ÒÅ%À Ì À\¶1 ̄êÌ À·2`1⁄4 Ö2l¿ 2‘ ́i1⁄4–»æçÆ Ì ́1ÆØ ̄–À·21ÎÇ2μ ́1 ̧»oo3Ò1⁄4W¶1 ̧3⁄4 ̄|¿f3l ̄–¿o° ̧»¶1 ̧3⁄4 ̄|¿kÃ|2l¿ 2μ ́i1⁄41⁄2¶1 ̄1⁄2 ́+¶1 ̄ Æ ̈ ́1 ̄±° Ì 3μ2 1⁄4)À·2μ¶K ̄–ÊØÆ ̈ ́1 ̄A ̄–ÊØ ̄–Ñ Â3⁄4 ̧3⁄4ÃÇ1⁄4W¶1 ̧Á ̄–¿ À~ ̧3⁄4¿\o ́1Àɶ·æç ̄1⁄2 ́i° 2μ ́•Â3⁄4 ̄–Ã| ̧3⁄43|φÙ5Ä 25 ̄–Ñ Â3⁄4 ̧3⁄4ÃÇ1⁄4W¶1 ̧Á ̄–¿ À 1⁄4W ́12)¶1Ä 2l¿;° ̧3⁄4À·3iÄo1⁄41⁄2 ́1Ö2Ò°;Ì À· ̧3⁄4¿ Ã1¶1Ä 2#1⁄4–Ì ̈¶1 ̄|È;1⁄4W¶12Ò° ¶1Ä 2l ̄1⁄2 ́12lÈ Æ ̈ ́1 ̄WÎÇ2μ ́'ù•æ

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Presenting a model for optimized selection of certified public accountants based on compliance with code of ethics for professional accountants with personality trait approach

Abstract Personality is one of the ways to illustrate human’s characteristics which is usually related to some stable features and other hand Many research evidence regarding big five personal traits have been extended during the years. Current research presents a practical model for optimized selection of certified public accountants based on their personal traits. This study is of causal and ...

متن کامل

Building Certified Libraries for PCC: Dynamic Storage Allocation

Proof-Carrying Code (PCC) allows a code producer to provide to a host a program along with its formal safety proof. The proof attests a certain safety policy enforced by the code, and can be mechanically checked by the host. While this language-based approach to code certification is very general in principle, existing PCC systems have only focused on programs whose safety proofs can be automat...

متن کامل

Secure Self-Certified COTS

With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing number of approaches have been proposed to ensure the safety and security of programs. Among those approaches, certified code seems to be the most promising. Unfortunately, as of today, most of the research on certified ...

متن کامل

A Framework for Certified Program Analysis and Its Applications to Mobile-Code Safety

A certified program analysis is an analysis whose implementation is accompanied by a checkable proof of soundness. We present a framework whose purpose is to simplify the development of certified program analyses without compromising the run-time efficiency of the analyses. At the core of the framework is a novel technique for automatically extracting Coq proof-assistant specifications from ML ...

متن کامل

Certified Computation

This paper introduces the notion of certified computation. A certified computation does not only produce a result r, but also a correctness certificate, which is a formal proof that r is correct. This can greatly enhance the credibility of the result: if we trust the axioms and inference rules that are used in the certificate, then we can be assured that r is correct. In effect, we obtain a tru...

متن کامل

Only if the programmer can prove ( through formal machine - checkable proofs ) it ’ s free of bugs with respect to a claim of dependability

Certified software consists of a machine-executable program plus a formal machine-checkable proof that the software is free of bugs with respect to a claim of dependability. The conventional wisdom is that certified software will never be feasible because the dependability of any real software must also rely on that of its underlying operating system and execution environment which is too low-l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002