Sciweavers

10715 search results - page 59 / 2143
» From Tests to Proofs
Sort
View
CAV
2010
Springer
161views Hardware» more  CAV 2010»
14 years 1 months ago
Directed Proof Generation for Machine Code
We present the algorithms used in MCVETO (Machine-Code VErification TOol), a tool to check whether a stripped machinecode program satisfies a safety property. The verification p...
Aditya V. Thakur, Junghee Lim, Akash Lal, Amanda B...
ASPDAC
2008
ACM
106views Hardware» more  ASPDAC 2008»
13 years 10 months ago
Verifying full-custom multipliers by Boolean equivalence checking and an arithmetic bit level proof
—In this paper we describe a practical methodology to formally verify highly optimized, industrial multipliers. We a multiplier description language which abstracts from low-leve...
Udo Krautz, Markus Wedler, Wolfgang Kunz, Kai Webe...
NOMS
2006
IEEE
14 years 3 months ago
Using Open Source to realise an NGOSS Proof of concept
This paper discusses the aims, objectives and early deliverables from the OpenOSS project which has been set up with the sponsorship of a number of Telecommunications Service Prov...
C. R. Gallen, J. S. Reeve
POPL
1997
ACM
14 years 1 months ago
Proof-Carrying Code
Proof-carrying code is a framework for the mechanical verification of safety properties of machine language programs, but the problem arises of quis custodiat ipsos custodes—wh...
George C. Necula
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 4 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...