Asphalion: Trustworthy Shielding Against Byzantine FaultsVukotic, Ivana ; Rahli, Vincent ; Verissimo, Paulo ![]() in Vukotic, Ivana; Rahli, Vincent; Verissimo, Paulo (Eds.) Asphalion: Trustworthy Shielding Against Byzantine Faults (2019) Detailed reference viewed: 151 (29 UL) Velisarios: Byzantine Fault-Tolerant Protocols Powered by CoqRahli, Vincent ; Vukotic, Ivana ; Volp, Marcus et alin ESOP 2018 (2018, April) Our increasing dependence on complex and critical information infrastructures and the emerging threat of sophisticated attacks, ask for extended efforts to ensure the correctness and security of these ... [more ▼] Our increasing dependence on complex and critical information infrastructures and the emerging threat of sophisticated attacks, ask for extended efforts to ensure the correctness and security of these systems. Byzantine fault-tolerant state-machine replication (BFT-SMR) provides a way to harden such systems. It ensures that they maintain correctness and availability in an application-agnostic way, provided that the replication protocol is correct and at least n-f out of n replicas survive arbitrary faults. This paper presents Velisarios a logic-of-events based framework implemented in Coq, which we developed to implement and reason about BFT-SMR protocols. As a case study, we present the first machine-checked proof of a crucial safety property of an implementation of the area's reference protocol: PBFT. [less ▲] Detailed reference viewed: 541 (61 UL) Computability Beyond Church-Turing via Choice Sequences; ; et al in LICS 2018 (2018) Detailed reference viewed: 110 (9 UL) A Verified Theorem Prover Backend Supported by a Monotonic LibraryRahli, Vincent ; ; in LPAR 2018 (2018) Detailed reference viewed: 114 (6 UL) Probabilistic Formal Methods Applied to Blockchain’s Consensus Protocol; ; Rahli, Vincent et alScientific Conference (2018) Detailed reference viewed: 122 (8 UL) Validating Brouwer's Continuity Principle for Numbers Using Named ExceptionsRahli, Vincent ; in Mathematical Structures in Computer Science (2017) Detailed reference viewed: 130 (3 UL) Bar Induction: The Good, the Bad, and the UglyRahli, Vincent ; ; in Thirty-Second Annual ACM/IEEE Symposium on Logic in Computer Science (LICS) (2017) Detailed reference viewed: 192 (21 UL) EventML: Specification, Verification, and Implementation of Crash-Tolerant State Machine Replication SystemsRahli, Vincent ; ; et alin Science of Computer Programming (2017) Detailed reference viewed: 127 (4 UL) Formally Verified Differential Dynamic Logic; Rahli, Vincent ; Vukotic, Ivana et alin CPP 2017 (2017) Detailed reference viewed: 396 (56 UL) Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption ControlVolp, Marcus ; ; Decouchant, Jérémie et alScientific Conference (2016, December 12) Intel SGX is the latest processor architecture promising secure code execution despite large, complex and hence potentially vulnerable legacy operating systems (OSs). However, two recent works identified ... [more ▼] Intel SGX is the latest processor architecture promising secure code execution despite large, complex and hence potentially vulnerable legacy operating systems (OSs). However, two recent works identified vulnerabilities that allow an untrusted management OS to extract secret information from Intel SGX's enclaves, and to violate their integrity by exploiting concurrency bugs. In this work, we re-investigate delayed preemption (DP) in the context of Intel SGX. DP is a mechanism originally proposed for L4-family microkernels as disable-interrupt replacement. Recapitulating earlier results on language-based information-flow security, we illustrate the construction of leakage-free code for enclaves. However, as long as adversaries have fine-grained control over preemption timing, these solutions are impractical from a performance/complexity perspective. To overcome this, we resort to delayed preemption, and sketch a software implementation for hypervisors providing enclaves as well as a hardware extension for systems like SGX. Finally, we illustrate how static analyses for SGX may be extended to check confidentiality of preemption-delaying programs. [less ▲] Detailed reference viewed: 344 (29 UL) A Nominal Exploration of IntuitionismRahli, Vincent ; in The 5th ACM SIGPLAN Conference on Certified Programs and Proofs (CPP 2016) (2016) Detailed reference viewed: 154 (13 UL) Exercising Nuprl's Open-EndednessRahli, Vincent ![]() in The 5th International Congress on Mathematical Software (2016) Detailed reference viewed: 155 (8 UL) Skalpel: A Constraint-Based Type Error Slicer for Standard MLRahli, Vincent ; ; et alin Journal of Symbolic Computation (2016) Detailed reference viewed: 205 (26 UL) Formal Specification, Verification, and Implementation of Fault-Tolerant Systems using EventMLRahli, Vincent ; ; et alin EASST (2015) Detailed reference viewed: 111 (16 UL) Skalpel: A Type Error Slicer for Standard MLRahli, Vincent ; ; et alin Electronic Notes in Theoretical Computer Science (2015) Detailed reference viewed: 118 (2 UL) Coq as a Metatheory for Nuprl with Bar InductionRahli, Vincent ; Scientific Conference (2015) Detailed reference viewed: 107 (34 UL) Towards a Formally Verified Proof Assistant; Rahli, Vincent ![]() in Interactive Theorem Proving - 5th International Conference, ITP 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 14-17, 2014. Proceedings (2014) Detailed reference viewed: 148 (5 UL) Towards a Formally Verified Proof Assistant (technical report); Rahli, Vincent ![]() Report (2014) Detailed reference viewed: 69 (2 UL) Developing Correctly Replicated Databases Using Formal Tools; Rahli, Vincent ; et alin DSN 2014 (2014) Detailed reference viewed: 147 (5 UL) A Type Theory with Partial Equivalence Relations as Types; ; et al Scientific Conference (2014) Detailed reference viewed: 69 (5 UL) |
||