🦞🌯 Lobster Roll

Thread

A New Form of Verification on Bluesky (bsky.social)

Stories related to "A New Form of Verification on Bluesky" across the full archive.

Construction and Formal Verification of Fault-Tolerant, Distributed, Mutual Exclusion (2017) (icfp17.sigplan.org)
Formal Verification of Distributed Checkpointing Using Event-B (2015) (aircconline.com)
Abstract: "The development of complex system makes challenging task for correct software development. Due to faulty specification, software may involve errors. The traditional testing methods are not sufficient to verify the correctness of such complex system. In order to capture correct system re...
Building A "Simple" Distributed System - Formal Verification (jack-vanlightly.com)
A New Form of Verification on Bluesky (bsky.social)
Security Protocol Specification and Verification with AnBx (2016) (imm.dtu.dk)
An Empirical Study of the Correctness of Formally-Verified, Distributed Systems (locore.cs.washington.edu)
PCID is now a critical performance/security feature on x86 (groups.google.com)
Identifying Security Critical Properties for the Dynamic Verification of a Processor (2017) (cs.unc.edu)
Verification of a Practical Hardware Security Architecture via Static Information Flow Analysis (cse.psu.edu)
Abstract: "Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementing these mechanisms correctly has proved difficult, undermining the root of security. This work introduces an effective way to formally verify important properties of such hardware security m...
Formal Specification, Verification, and Implementation of Fault-Tolerant Systems (2015) (pdfs.semanticscholar.org)
Abstract: "Distributed programs are known to be extremely difficult to implement, test, verify, and maintain. This is due in part to the large number of possible unforeseen interactions among components, and to the difficulty of precisely specifying what the programs should accomplish in a formal la...
Design-by-Contract for Specification and Conformance Testing of Distributed Software (2014) (researchgate.net)
Abstract: "Increasing effort in development of high quality distributed systems requires ground methodological base. Design by Contract approach looks very promising as a candidate since it helps to obtain component-wise specification and design, to separate concerns between developers, and makes de...
A Formal Security Analysis of the Signal Messaging Protocol (eprint.iacr.org)
Updated from the [previous](https://lobste.rs/s/ynmmxa/formal_security_analysis_signal) post on Lobsters: > V2.0 (2017-10-09) Major updates. > * Added simplified protocol flow diagram to aid intuition. > * Clarified and further explained the freshness predicates. > * Clarified and further e...
Smartphone Performance and Security Enhancements Through Wi-Fi Firmware Modifications (firmwaresecurity.com)
The Surprising Security Benefits of End-to-End Formal Proofs (cccblog.org)
Noria: dynamic, partially-stateful data-flow for high-performance web applications (usenix.org)
A while ago, I [asked](https://lobste.rs/s/cqnzl5/lobste_rs_access_pattern_statistics_for) about traffic statistics for lobste.rs for a research project. Finally, the result of that work has now been published as the linked system, which speeds up lobste.rs by ~5x over that provided by MySQL. The so...
CoSMeDis: Distributed Social Media with Formally-Verified Confidentiality (ieee-security.org)
Abstract: "We present the design, implementation and information flow verification of CoSMeDis, a distributed social media platform. The system consists of an arbitrary number of communicating nodes, deployable at different locations over the Internet. Its registered users can post content and e...
Verdi: Formally Verifying Distributed Systems (verdi.uwplse.org)
An introduction to Formal Verification for Software Systems (moritz.systems)
Voucher System verification using TLA+ (moritz.systems)
Improving Distributed Caching Performance and Efficiency at Pinterest (medium.com)
Formal CHERI: design-time proof of full-scale architecture security properties (lightbluetouchpaper.org)
OpenBSD formal driver verification with SeL4 (arxiv.org)
Formally verifying security properties of CHERI processors (cheriot.org)
How we use formal modeling, lightweight simulations, and chaos testing to design reliable distributed systems (datadoghq.com)
Quantum Holograms Transform Light Into Unbreakable Security (scitechdaily.com)
Quantum entanglement, one of the strangest and most powerful aspects of physics, has just been taken to a new level with the use of metasurfaces. Researchers have discovered a way to create quantum holograms, where entangled photons encode intricate information with unprecedented precision. By lever...
Thoughts on Bluesky Verification (steveklabnik.com)
New Rule: Every website must disclose their password storage format on the signup page. (gizmodo.com)
Scared to disclose? It's too weak.
Stripe's 3rd Capture the Flag will focus on distributed systems instead of security (stripe.com)
I had wondered about this in the past - how to actually teach people about distributed systems architecture when you don't have the opportunity to work on a system that generates a ton of traffic. I am interested to see how they will structure the challenges. I assume they are not going to be sen...
Advances in Distributed Security (2003) (szabo.best.vwh.net)
A simple distributed algorithm for small idempotent information (antirez.com)