Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles 2021
DOI: 10.1145/3477132.3483540
|View full text |Cite
|
Sign up to set email alerts
|

Using Lightweight Formal Methods to Validate a Key-Value Storage Node in Amazon S3

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 43 publications
(20 citation statements)
references
References 20 publications
0
20
0
Order By: Relevance
“…Now in order to enable compositional checking in our IPA framework, we strengthen the definition of the refinement relation with additional requirement on the mapping between actions. Similar enhancement of the refinement relation is also used in the existing work [6]. First we present the formal definition of refinement between protocols:…”
Section: Formal Definition Of Interaction-preservationmentioning
confidence: 99%
“…Now in order to enable compositional checking in our IPA framework, we strengthen the definition of the refinement relation with additional requirement on the mapping between actions. Similar enhancement of the refinement relation is also used in the existing work [6]. First we present the formal definition of refinement between protocols:…”
Section: Formal Definition Of Interaction-preservationmentioning
confidence: 99%
“…These two frontends are complementary. They enable a lightweight approach that helps developers iterate quickly on new code, while still offering stronger confidence as the code gets "closer to production" [10].…”
Section: Lessons Learnedmentioning
confidence: 99%
“…We use and apply a varied set of automated reasoning techniques at AWS. For example, we use (i) bounded model checking [35] to verify memory safety properties of boot code running in AWS data centers and of real-time operating system used in IoT devices [22,25,26], (ii) proof assistants such as EasyCrypt [12] and domain-specific languages such as Cryptol [38] to verify cryptographic protocols [3,4,23], (iii) HOL-Lite [33] to verify the BigNum implementation [2], (iv) P [28] to test key storage components in Amazon S3 [18], and (v) Dafny [37] to verify key authorization and crypto libraries [1]. Automated reasoning capabilities for external AWS users leverage (i) data-flow analysis [17] to prove correct usage of cloud APIs [29,40], (ii) monotonic SAT theories [14] to check properties of network configurations [5,13], and (iii) theories for strings and automaton in SMT solvers [16,39,46] to provide security for access controls [6,19].…”
Section: Introductionmentioning
confidence: 99%