Access Restriction

Author Rungta, Neha
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract The growing popularity of verification competitions such as VerifyThis Verification Competition and the Competition on Software Verification (SV-COMP), both, incentivize as well as reward tool developers. VerifyThis 2016 was held in Eindhoven colocated with the European Joint Conferences on Theory and Practice of Software (ETAPS) 2016. The competition presents challenges to evaluate a broad range of tools such as Danfy, KeY, VeriFast, CIVL, among others. The first article in the newsletter "CIVL Solutions to VerifyThis 2016 Challenges" by Stephen F. Siegel at University of Delaware presents the solutions to the challenges using The Concurrency Intermediate Verification Language (CIVL) verifier. CIVL supports of a variety of techniques based on symbolic execution and model checking to verify sequential and concurrent programs. The article presents an overview of the framework, a description of the challenges, and how CIVL performs on the benchmarks. The second article "Security by Compilation: An Automated Approach to Comprehensive Side-channel resistance" by Chao Wang from University of Southern California and Patrick Schaumont from Virginia Tech leverage formal verification and program synthesis to detect side challenge attacks on mobile devices. The approach is evaluated on implementations of MAC-Keccak, AES and other cryptographic algorithms. This article bridges the security and verification forums of the newsletter.
Description Affiliation: Amazon Web Services, Inc. (Rungta, Neha)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Publisher Date 2016-02-17
Publisher Place New York
Journal ACM SIGLOG News (SIGL)
Volume Number 4
Issue Number 2
Page Count 1
Starting Page 54
Ending Page 54

Open content in new tab

   Open content in new tab
Source: ACM Digital Library