Thread
Stories related to "A New Form of Verification on Bluesky" across the full archive.
Abstract: "The development of complex system makes challenging task for correct software development. Due to faulty
specification, software may involve errors. The traditional testing methods are not sufficient to verify the
correctness of such complex system. In order to capture correct system re...
An Empirical Study of the Correctness of Formally-Verified, Distributed Systems
(locore.cs.washington.edu)
Verification of a Practical Hardware Security Architecture via Static Information Flow Analysis
(cse.psu.edu)
Abstract: "Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementing these mechanisms correctly has proved difficult, undermining the root of security. This work introduces an effective way to formally verify important properties of such hardware security m...
Formal Specification, Verification, and Implementation of Fault-Tolerant Systems (2015)
(pdfs.semanticscholar.org)
Abstract: "Distributed programs are known to be extremely difficult to implement, test, verify, and maintain. This is due in part to the large number of possible unforeseen interactions among components, and to the difficulty of precisely specifying what the programs should accomplish in a formal la...
Design-by-Contract for Specification and Conformance Testing of Distributed Software (2014)
(researchgate.net)
Abstract: "Increasing effort in development of high quality distributed systems requires ground methodological base. Design by Contract approach looks very promising as a candidate since it helps to obtain component-wise specification and design, to separate concerns between developers, and makes de...
Updated from the [previous](https://lobste.rs/s/ynmmxa/formal_security_analysis_signal) post on Lobsters:
> V2.0 (2017-10-09) Major updates.
> * Added simplified protocol flow diagram to aid intuition.
> * Clarified and further explained the freshness predicates.
> * Clarified and further e...
Smartphone Performance and Security Enhancements Through Wi-Fi Firmware Modifications
(firmwaresecurity.com)
A while ago, I [asked](https://lobste.rs/s/cqnzl5/lobste_rs_access_pattern_statistics_for) about traffic statistics for lobste.rs for a research project. Finally, the result of that work has now been published as the linked system, which speeds up lobste.rs by ~5x over that provided by MySQL. The so...
Abstract: "We present the design, implementation and information
flow verification of CoSMeDis, a distributed social
media platform. The system consists of an arbitrary number
of communicating nodes, deployable at different locations over
the Internet. Its registered users can post content and e...
Formal CHERI: design-time proof of full-scale architecture security properties
(lightbluetouchpaper.org)
Quantum entanglement, one of the strangest and most powerful aspects of physics, has just been taken to a new level with the use of metasurfaces. Researchers have discovered a way to create quantum holograms, where entangled photons encode intricate information with unprecedented precision. By lever...
New Rule: Every website must disclose their password storage format on the signup page.
(gizmodo.com)
Scared to disclose? It's too weak.
I had wondered about this in the past - how to actually teach people about distributed systems architecture when you don't have the opportunity to work on a system that generates a ton of traffic.
I am interested to see how they will structure the challenges. I assume they are not going to be sen...