2014
DOI: 10.1017/cbo9781107256552
|View full text |Cite
|
Sign up to set email alerts
|

Program Logics for Certified Compilers

Abstract: Separation logic is the twenty-first-century variant of Hoare logic that permits verification of pointer-manipulating programs. This book covers practical and theoretical aspects of separation logic at a level accessible to beginning graduate students interested in software verification. On the practical side it offers an introduction to verification in Hoare and separation logics, simple case studies for toy languages, and the Verifiable C program logic for the C programming language. On the theoretical side … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
147
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 121 publications
(147 citation statements)
references
References 69 publications
0
147
0
Order By: Relevance
“…Appel [5] uses VST (Verified Software Toolchain) [4] to prove the functional correctness of a machine-level implementation of SHA-256. In a companion effort, Beringer et al [17] connect VST with FCF (Foundational Cryptographic Framework) of Petcher and Morrisett [51], in order to provide a machine-checked proof of reductionist security for a realistic implementation of HMAC.…”
Section: High-assurance Cryptographymentioning
confidence: 99%
See 2 more Smart Citations
“…Appel [5] uses VST (Verified Software Toolchain) [4] to prove the functional correctness of a machine-level implementation of SHA-256. In a companion effort, Beringer et al [17] connect VST with FCF (Foundational Cryptographic Framework) of Petcher and Morrisett [51], in order to provide a machine-checked proof of reductionist security for a realistic implementation of HMAC.…”
Section: High-assurance Cryptographymentioning
confidence: 99%
“…1 http://openssl.org 2 http://https://github.com/awslabs/s2n 3 https://www.bouncycastle.org/ over encrypted data stands out as one of the technologies with the highest potential to change the landscape of secure ITC, namely by improving cloud reliability and thus opening the way for new secure cloud-based applications. Projects that aim to bring secure computation over encrypted data to practice include FRESCO 4 [27], TASTY [38] and Sharemind [21].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For a program analysis tool such as Infer, integration with an organisation's programming culture and process is significant work (see O'Hearn (2015)). For proofs of properties closer to functional correctness or operating system or crypto code, effective integration within a powerful proof assistant is critical (Appel et al 2014). While these contextual questions are important, this paper will focus on the features of the logic and its model that contribute to its success, not on the additional contextual factors which are nonetheless important.…”
Section: Solving a Hard Problemmentioning
confidence: 99%
“…Using the Coq proof assistant as a uniform platform for implementation of logic-based program verification tools is a well-established approach, which by now has been success-fully employed in a number of projects on certified compilers [Leroy 2006;Appel et al 2014] and verified lowlevel code [Shao 2010;Chlipala 2011;Jensen et al 2013], although, with no specific focus on abstractions for finegrained concurrency, such as protocols and auxiliary state.…”
Section: Related and Future Workmentioning
confidence: 99%