Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs 2019
DOI: 10.1145/3293880.3294102
|View full text |Cite
|
Sign up to set email alerts
|

Formally verified big step semantics out of x86-64 binaries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…The K framework also enables one to represent our semantics as SMT theories, which allows others to easily reuse our semantics for their own purposes. Indeed, we have translated our semantics to Stoke [111] which can serve as a drop-in replacement of Heule et al's semantics [87] and can immediately benefit tools built on Stoke (e.g., [112]).…”
Section: Usablementioning
confidence: 99%
See 1 more Smart Citation
“…The K framework also enables one to represent our semantics as SMT theories, which allows others to easily reuse our semantics for their own purposes. Indeed, we have translated our semantics to Stoke [111] which can serve as a drop-in replacement of Heule et al's semantics [87] and can immediately benefit tools built on Stoke (e.g., [112]).…”
Section: Usablementioning
confidence: 99%
“…A contemporary work by Roessle et al [112] presents a method to extract the big step semantics of a binary program using the small step instruction semantics extracted mostly from Strata 1 plus some manually drafted support for branching instructions and stack operations. Like Strata, their specification is executable only for the non-floating-point instructions.…”
Section: Defining Formal Semantics Of X86-64mentioning
confidence: 99%
“…This produced highly reliable semantics: they compared the semantics to manually written semantics based on the Intel reference manuals, and found that in the few cases where they differed the Intel manuals were wrong. Roessle et al embedded these semantics into the Isabelle/HOL theorem prover and tested the formal Isabelle semantics against live x86 hardware [49]. This formal machine model is the base of our verification effort.…”
Section: Verification Tools Usedmentioning
confidence: 99%
“…The machine model must provide a step function that provides semantics for instructions. We have used the machine model of Roessle et al [26], which is built upon the work of Heule et al [9]. Heule et al used machine learning to derive semantics by executing instructions on an actual x86-64 machine.…”
Section: Case Study: Hermitcorementioning
confidence: 99%
“…Figure 1 shows an overview of the contribution's methodology. The approach disassembles a binary using an off-the-shelf disassembler, performs analysis on the binary to extract data for automation, and embeds it into a theorem prover using the symbolic execution toolchain of Roessle et al [26], the machine model of which is based on the work of Heule et al [9]. Within the theorem prover, two things need to be manually defined: an invariant and the set of regions that the function is allowed to write to.…”
Section: Introductionmentioning
confidence: 99%