Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Klaus von Gleissenthall"'
Autor:
Levin N. Winter, Florena Buse, Daan de Graaf, Klaus von Gleissenthall, Burcu Kulahcioglu Ozkan
Publikováno v:
Proceedings of the ACM on Programming Languages, 7(OOPSLA(1))
Proceedings of the ACM on Programming Languages, 7(OOPSLA1):101, 757-788. Association for Computing Machinery (ACM)
Winter, L N, Buse, F, De Graaf, D, Von Gleissenthall, K & Kulahcioglu Ozkan, B 2023, ' Randomized Testing of Byzantine Fault Tolerant Algorithms ', Proceedings of the ACM on Programming Languages, vol. 7, no. OOPSLA1, 101, pp. 757-788 . https://doi.org/10.1145/3586053
Proceedings of the ACM on Programming Languages, 7(OOPSLA1):101, 757-788. Association for Computing Machinery (ACM)
Winter, L N, Buse, F, De Graaf, D, Von Gleissenthall, K & Kulahcioglu Ozkan, B 2023, ' Randomized Testing of Byzantine Fault Tolerant Algorithms ', Proceedings of the ACM on Programming Languages, vol. 7, no. OOPSLA1, 101, pp. 757-788 . https://doi.org/10.1145/3586053
Byzantine fault-tolerant algorithms promise agreement on a correct value, even if a subset of processes can deviate from the algorithm arbitrarily. While these algorithms provide strong guarantees in theory, in practice, protocol bugs and implementat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e1d6098ec2d252c1c1288fddc93ecbd9
http://resolver.tudelft.nl/uuid:2c31913f-2230-41fc-b5e2-fbeed13beea6
http://resolver.tudelft.nl/uuid:2c31913f-2230-41fc-b5e2-fbeed13beea6
Publikováno v:
CCS
von Gleissenthall, K, Klcl, R G, Stefan, D & Jhala, R 2021, Solver-Aided Constant-Time Hardware Verification . in CCS 2021 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security . Proceedings of the ACM Conference on Computer and Communications Security, vol. 2021, Association for Computing Machinery, pp. 429-444, 27th ACM Annual Conference on Computer and Communication Security, CCS 2021, Virtual, Online, Korea, Republic of, 15/11/21 . https://doi.org/10.1145/3460120.3484810
CCS 2021: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 429-444
STARTPAGE=429;ENDPAGE=444;TITLE=CCS 2021
von Gleissenthall, K, Klcl, R G, Stefan, D & Jhala, R 2021, Solver-Aided Constant-Time Hardware Verification . in CCS 2021 : Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security . Proceedings of the ACM Conference on Computer and Communications Security, vol. 2021, Association for Computing Machinery, pp. 429-444, 27th ACM Annual Conference on Computer and Communication Security, CCS 2021, Virtual, Online, Korea, Republic of, 15/11/21 . https://doi.org/10.1145/3460120.3484810
CCS 2021: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 429-444
STARTPAGE=429;ENDPAGE=444;TITLE=CCS 2021
We present Xenon, a solver-aided, interactive method for formally verifying that Verilog hardware executes in constant-time. Xenon scales to realistic hardware designs by drastically reducing the effort needed to localize the root cause of verificati
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::af858411b27c9ac547e3c199a2642396
https://doi.org/10.1145/3460120.3484810
https://doi.org/10.1145/3460120.3484810
Publikováno v:
Proceedings of the ACM on Programming Languages, 3(POPL):59, 1-30. Association for Computing Machinery (ACM)
von Gleissenthal, K, Klcl, R G, Bakst, A, Stefan, D & Jhala, R 2019, ' Pretend synchrony: synchronous verification of asynchronous distributed programs ', Proceedings of the ACM on Programming Languages, vol. 3, no. POPL, 59, pp. 1-30 . https://doi.org/10.1145/3290372
von Gleissenthal, K, Klcl, R G, Bakst, A, Stefan, D & Jhala, R 2019, ' Pretend synchrony: synchronous verification of asynchronous distributed programs ', Proceedings of the ACM on Programming Languages, vol. 3, no. POPL, 59, pp. 1-30 . https://doi.org/10.1145/3290372
We present pretend synchrony , a new approach to verifying distributed systems, based on the observation that while distributed programs must execute asynchronously, we can often soundly treat them as if they were synchronous when verifying their cor
Autor:
Sunjay Cauligi, Marco Vassena, Ranjit Jhala, Dean M. Tullsen, Deian Stefan, Craig Disselkoen, Rami Gökhan Kıcı, Klaus von Gleissenthall
Publikováno v:
Vassena, M, Disselkoen, C, von Gleissenthall, K, Cauligi, S, Klcl, R G, Jhala, R, Tullsen, D & Stefan, D 2021, ' Automatically eliminating speculative leaks from cryptographic code with blade ', Proceedings of the ACM on Programming Languages, vol. 5, no. POPL, 49, pp. 1-30 . https://doi.org/10.1145/3434330
Proceedings of the ACM on Programming Languages, 5(POPL):49, 1-30. Association for Computing Machinery (ACM)
Proceedings of the ACM on Programming Languages, 5(POPL):49, 1-30. Association for Computing Machinery (ACM)
We introduce Blade, a new approach to automatically and efficiently eliminate speculative leaks from cryptographic code. Blade is built on the insight that to stop leaks via speculative execution, it suffices to cut the dataflow from expressions that
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::603a7cd743d1a11259db2d4e6c7c1be1
http://arxiv.org/abs/2005.00294
http://arxiv.org/abs/2005.00294
Publikováno v:
PLDI
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation
von Gleissenthal, K, Bjørner, N & Rybalchenko, A 2016, Cardinalities and universal quantifiers for verifying parameterized systems . in Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation . PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, ACM . < https://dl.acm.org/doi/abs/10.1145/2908080.2908129?casa_token=foVc7H6n7b0AAAAA:XidSoU1QMVntJ1ZAE_U8Dh3HtSXZ4QHc5kY6IRBbab3b0kgsvZlKyc6Uik6lYPynnoYgFzDOMX8HSw >
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation
von Gleissenthal, K, Bjørner, N & Rybalchenko, A 2016, Cardinalities and universal quantifiers for verifying parameterized systems . in Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation . PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, ACM . < https://dl.acm.org/doi/abs/10.1145/2908080.2908129?casa_token=foVc7H6n7b0AAAAA:XidSoU1QMVntJ1ZAE_U8Dh3HtSXZ4QHc5kY6IRBbab3b0kgsvZlKyc6Uik6lYPynnoYgFzDOMX8HSw >
Parallel and distributed systems rely on intricate protocols to manage shared resources and synchronize, i.e., to manage how many processes are in a particular state. Effective verification of such systems requires universally quantification to reaso
Publikováno v:
VPT@CAV
Some security properties go beyond what is expressible in terms of anindividual execution of a single program. In particular, many securitypolicies in cryptography can be naturally phrased as relationalproperties of two open probabilistic programs. W
Publikováno v:
Bakst, A, von Gleissenthal, K, Klcl, R G & Jhala, R 2017, ' Verifying distributed programs via canonical sequentialization ', Proceedings of the ACM on Programming Languages, vol. 1, no. OOPSLA, 110, pp. 1-27 . https://doi.org/10.1145/3133934
Proceedings of the ACM on Programming Languages, 1(OOPSLA):110, 1-27. Association for Computing Machinery (ACM)
Proceedings of the ACM on Programming Languages, 1(OOPSLA):110, 1-27. Association for Computing Machinery (ACM)
We introduce canonical sequentialization, a new approach to verifying unbounded, asynchronous, message-passing programs at compile-time. Our approach builds upon the following observation: due the combinatorial explosion in complexity, programmers do
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6ff2f0a8520efc0a0127fbeee538ae5d
https://research.vu.nl/en/publications/bcb44971-10ff-4c1b-a4fd-c792e9870272
https://research.vu.nl/en/publications/bcb44971-10ff-4c1b-a4fd-c792e9870272
Publikováno v:
Computer Aided Verification ISBN: 9783319216898
CAV (1)
Computer Aided Verification-27th International Conference
von Gleissenthal, K, Köpf, B & Rybalchenko, A 2015, Symbolic Polytopes for Quantitative Interpolation and Verification . in Computer Aided Verification-27th International Conference . Springer LNCS . < https://link.springer.com/chapter/10.1007/978-3-319-21690-4_11 >
CAV (1)
Computer Aided Verification-27th International Conference
von Gleissenthal, K, Köpf, B & Rybalchenko, A 2015, Symbolic Polytopes for Quantitative Interpolation and Verification . in Computer Aided Verification-27th International Conference . Springer LNCS . < https://link.springer.com/chapter/10.1007/978-3-319-21690-4_11 >
Proving quantitative properties of programs, such as bounds on resource usage or information leakage, often leads to verification conditions that involve cardinalities of sets. Existing approaches for dealing with such verification conditions operate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::81cfafc56956aeb5f3875de6b03b4a72
https://doi.org/10.1007/978-3-319-21690-4_11
https://doi.org/10.1007/978-3-319-21690-4_11
Publikováno v:
An Epistemic Perspective on Consistency of Concurrent Computations.
Publikováno v:
CONCUR 2013 – Concurrency Theory ISBN: 9783642401831
CONCUR
CONCUR
Consistency properties of concurrent computations, e.g., sequential consistency, linearizability, or eventual consistency, are essential for devising correct concurrent algorithms. In this paper, we present a logical formalization of such consistency
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4ece90ace31bbac968c9d8c82b482388
https://doi.org/10.1007/978-3-642-40184-8_16
https://doi.org/10.1007/978-3-642-40184-8_16